Wednesday May 22, 2019
Home Business How to Secure...

How to Secure Business from Data Leakage

Even if you have absolutely nothing to hide, you still need to protect the confidentiality of your data.

0
//
work
It tracks the transfer and listing of files, sudden bursts of Internet communication, visits to sites uncharacteristic for work, etc. Pixabay

The number of incidents related to the loss of confidential information increases every year. Information leakage is a serious danger for many enterprises. It may occur as a result of the intent of third parties or through the negligence of employees. Creating a system for protecting information assets from loss in companies should be carried out on a professional level using modern technical means. For this, it is necessary to have an idea of the leakage channels and methods of blocking these channels, as well as the requirements for modern security systems.

How Information Flows Away

There are plenty of sources through which information leaves the company.

hacking
It is also a bad idea to use the same password for all accounts, ranging from social networks and ending with online banking. Pixbay
  • Computers are the second most common channel after paper documents through which insiders receive confidential information. But, in fact, the computer is no longer a channel for transmitting secret data, but a channel for receiving them. Through it, an insider can access corporate information stored on the company’s server, download it to removable media, or send it via email. The network attached storage can also be hacked. Read more here about this device https://www.bestadvisers.co.uk/network-attached-storage
  • The second source is various instant messengers (Skype, ICQ, etc.), e-mail, open sources (social networks, forums), flash drives, disks, backup copies. As in the case of accidental leaks, and if there was deliberate data transfer, the sources are the same.

To obtain classified information, there is almost an entire industry – illegal and competitive intelligence. The first implies espionage: those who need information, recruit employees of the company or introduce their employees into the staff. Competitive intelligence operates openly – through social networks, interviews, open sources of information.

Practical Tips to Protect Your Commercial Data

Change Passwords to Stronger Ones

The development of Internet fraud and the frequency of data theft has prompted scientists to rank the most unreliable passwords. Analysis of 5 million cracked passwords showed that careless users demonstrate constancy – the first place in the list for several years has been taken by the combination “123456”.

data
Therefore, it is important to monitor your online behavior to protect not only information about yourself but also your own individuality. Pixabay

It is also a bad idea to use the same password for all accounts, ranging from social networks and ending with online banking. In addition, it is undesirable to use brand names, names of famous personalities, and popular phrases, since hackers have been able to guess such passwords for a long time. The strongest passwords are usually long, so better use whole passphrases.

Install a Data Leak Prevention System (DLP)

It tracks the transfer and listing of files, sudden bursts of Internet communication, visits to sites uncharacteristic for work, etc. It also performs a linguistic analysis of correspondence and documents and identifies the danger of leakage using keywords.

Also Read: China Opposes Washington’s Decision On Iran Oil Sanctions

Remember That Privacy Is Worth Protecting

Even if you have absolutely nothing to hide, you still need to protect the confidentiality of your data. Increasingly, our entire life fits in a series of short data that is sold on the Internet. Therefore, it is important to monitor your online behavior to protect not only information about yourself but also your own individuality.

 

Next Story

Beware! Hackers Are Watching Your Every Move As You Shop Online

Be wary of clicking on emails from unknown sources or deals that look too good to be true.

0
Amazon
Cyber criminals use look-alike spam to lure in victims with links to bogus websites. Businesses should train employees on how to "spot a phish". VOA

With more and more Indians going online and generating never-heard-before kind of data, hackers have turned their focus on a country with over 450 million smartphone users and more than 550 million Internet users.

The country has 366 million Internet subscribers in urban locations and 194 million in rural areas, says the latest report by Telecom Regulatory Authority of India (TRAI).

According to Sophos Senior Security Advisor John Shier, organisations are struggling with phishing and other user-focused attacks in India.

hackers
Cyber criminals use look-alike spam to lure in victims with links to bogus websites. Businesses should train employees on how to “spot a phish”.
Pixabay

“Most people don’t believe that computer-based training (CBT) is effective and are looking for ways to improve their defenses against users being tricked into inviting malicious attackers into their network,” Shier said in a statement.

A KPMG report in April revealed that nearly 86 per cent of the consumers in India are concerned about eavesdropping of their conversations or theft or misuse of their messages through their devices.

“The proliferation of connected and IoT devices will have a cross-sector impact on areas around data security and privacy. In response to this, regulators will need to establish mandatory data security requirements,” said Atul Gupta, Leader-IT Advisory and Cyber Security Leader, KPMG in India.

Around 87 per cent of the consumers are concerned that retailers will misuse or improperly distribute their information.

According to Gauri Bajaj, Director, Cybersecurity (APAC), Tata Communications, the adoption of cyber security remains a key challenge.

“The recent spate of cyber attacks only highlight the security risk that takes place both within and without the organisation. It is imperative that employees are sensitised to the risk of security breaches and trained to respond in such a scenario,” Bajaj said.

Not just phones, wearable devices like smartwatches are the next frontier for cyber security.

“The future of wearable tech in the world of AI and predictive technology will be highly individualized, data driven and analytics intensive. One of the bigger applications of this will continue to be in the healthcare and fitness sector.

“However, what is key to make this happen is also building a holistic ecosystem that tracks, guides and designs individualized plans for each individual, at a low cost,” said Vishal Gondal, CEO and founder GOQii.

It isn’t enough to have an IT security team and having a strong culture around security is the next step in maturity for security awareness programmes, say experts.

hackers
According to Sophos Senior Security Advisor John Shier, organisations are struggling with phishing and other user-focused attacks in India. Pixabay

“Use a unique, complex password for banking and other financial online accounts. For others, use a password manager to keep them organised and readily available. Use Two-Factor Authentication (2FA) when available to provide an extra layer of security on accounts,” Shier said.

Be wary of clicking on emails from unknown sources or deals that look too good to be true.

Also Read: Social Media Giant’s CEO Mark Zuckerberg Rejects The Claim ‘Time To Break Up Facebook’

Cyber criminals use look-alike spam to lure in victims with links to bogus websites. Businesses should train employees on how to “spot a phish”.

“Use a layered business security strategy to provide protection at multiple levels to avoid attacks from different angles. Be wary of IoT devices on any network. Change factory default passwords immediately out of the box,” the Sophos executive added. (IANS)