Almost every other week, there are stories about some high-profile organization experiencing a data leak. In the U.S. alone, about 1,802 publicly reported incidents last year resulted in 4.2 billion private records leaking online. This is only the tip of the iceberg since plenty of organizations that suffer leaks won\u2019t usually report it to authorities or make headlines.<\/p>
A data leak occurs when sensitive or confidential data is intentionally or unintentionally disclosed to an unauthorized third party. It usually involves the exposure of sensitive files and data such as customer data, contact information, healthcare data, financial information, social security numbers, credit card information, etc.<\/p>
Leaks can be far more than a temporary terror \u2014 they may change the course of your life. Businesses, governments, and individuals alike can experience huge complications from having sensitive information exposed. Whether you are offline or online, hackers can get to you through the internet, Bluetooth, text messages, or the online services that you use.<\/p>
A small vulnerability can cause a massive data breach without proper attention to detail. And since many people are unaware of how common modern security threats work, they don\u2019t give it enough attention.<\/p>
A data leak is when\u00a0sensitive\u00a0data\u00a0is accidentally exposed physically, on the Internet or in any other form including lost hard drives or laptops. This allows cybercriminals to gain unauthorized access\u00a0to sensitive data without effort. When sensitive data is posted on the dark web following a cyberattack, these events are also classified as data leaks as they help expedite data breaches.<\/p>
The terms\u00a0data breach\u00a0and data leak are often used interchangeably, but that’s incorrect as they’re two separate categories of data compromise.<\/p>
If a cybercriminal identifies a data leak, the exposed data could be used to strategize a successful cyberattack. So by detecting and remediating data leaks before they are discovered, the risk of data breaches is significantly reduced.<\/p>
According to a recent report by the Identity Theft Resource Center (ITRC), in 2021, data compromises went up by almost 70%<\/a>, which is almost 25% more than the previous all-time high record set in 2017. <\/p>
Employees contending with heavy workloads and very stringent deadlines may use workarounds and unapproved third-party applications and solutions to get things done. The resulting infrastructure is called \u201cshadow IT.\u201d Some unsanctioned third-party applications and technology employees are likely to use may include:<\/p>
Although employees using their own systems and devices can help with productivity, the risk is that shadow IT can lead to unauthorized access to data in the cloud, which can result in information leakage, changes to the data by unapproved users, and data corruption. <\/p>
Additionally, shadow IT creates blind spots for IT teams who may not become aware of the data leak until it is too late.\u00a0<\/p>
Phishing continues to be a popular way to attack businesses\u2014because it works. Its tactics can expose and allow exploitation of sensitive company data if an employee:<\/p>
The consequences can range from unauthorized data access to the installation of malware and other malicious files. <\/p>
Despite technological advances, numerous organizations and their employees are still using certain legacy tools, such as external USB drives, desktop email applications, and public printers. While there is nothing inherently wrong with these tools, they can cause a leak. <\/p>
Imagine\u00a0an employee losing a USB drive containing sensitive data in a public place. Or imagine private company documents being printed at home or a public printing center.\u00a0<\/p>
In 2018, Twitter urged its\u00a0330 million users\u00a0to change and update their passwords after a bug exposed them. This was the result of a problem with the hashing process, which Twitter uses to encrypt its users\u2019 passwords. The social networking site claimed it found and fixed the bug, but this is a good example of potential vulnerability exploits.<\/p>
Twitter also suffered a potential breach in\u00a0May 2020, which could have affected businesses using its advertising and analytics platforms. An issue with its\u00a0cache\u00a0saw Twitter admit it was \u201cpossible\u201d that some users\u2019 email addresses, phone numbers, and the final four digits of their credit card numbers could have been accessed.\u00a0<\/p>
The main thing that cyber criminals look for is\u00a0personally identifiable information (PII). Personal information includes social security numbers, credit card numbers and any other personal details that could result in\u00a0identity theft. Note that not all personally identifiable information (PII) is what you would traditionally think of as confidential information. Simple data like a name or the mother’s maiden name are targets too.<\/p>
Another common target is medical or\u00a0protected health information (PHI)\u00a0as defined in the\u00a0US HIPAA standard, “information that is created by a health care provider [and] relates to the past, present, or future physical or mental health or condition of any individual.”<\/p>
This data differs from company to company, but there are usually some common factors involved:<\/p>
Information that is specific to the company can also be exposed. This can be financials for banks and investment groups, medical records for hospitals and insurers or sensitive documents and forms for government entities.<\/p>
Customer information isn’t the only thing. Corporate information can be leaked including:<\/p>
The exposure of this type of information can hamstring company projects, give competitors insight into business operations, and reveal internal culture and personalities. The bigger the company, the more interest there is in this type of data.<\/p>
Analytics rely on large data sets containing multiple information sources that reveal big-picture trends, patterns and trajectories. As important as analytics are for many businesses, the data needed to perform the analytics can be a\u00a0vector of attack\u00a0if not properly secured. Analytics data includes:<\/p>
Analytics gives you a way to understand individuals as a set of data points and predict their next actions with a high degree of accuracy. This may sound abstract but this type of data can be used to sway voters and change the tide of elections by persuading at scale. on can cause reputational damage.<\/p>
This is the most dangerous thing to be exposed in a data leak. Information that is critical to your business and its ability to compete. Trade secrets include: <\/p>
Exposure of this type of data can devalue the products and services your business provides and undo years of research.<\/p>
Mitigation strategies are abundant, but processes can grow in complexity, so it\u2019s wise to partner with cybersecurity services. Cited below is a partial list of some best practices to follow to reduce the risk of data leaks.<\/p>
Most breaches are a result of\u00a0human-caused errors. Organizations must educate employees on the perils of data leaks and best practices when it comes to storing, protecting, transmitting or sharing sensitive data. Regular security awareness training helps employees be more alert, responsible and accountable for data security.<\/p>
It also helps develop security behaviors such as higher sensitivity to phishing attempts, safe browsing and better social media etiquette. All of these help to lower the risk of accidental data leaks.<\/p>
Avoid giving employees blanket access to all data. Limit use of administrator privileges and enable access to only those employees who require it. Restrict data downloads. Create a zero-trust environment so that only authenticated and authorized users have access to critical systems. <\/p>
Also mandate the use of multifactor authentication to reduce the risk of identity theft.<\/p>
Review and classify your data regularly. Focus on sensitive data and use data leakage prevention tools to monitor and control the movement of data. Deploy encryption so that sensitive data can be encrypted and secured while at rest, in transit or in motion. Use data discovery tools to carry out content analysis, tracking the movement of sensitive content across the network. <\/p>
Use mobile device management tools with the ability to remotely wipe devices that have been lost or stolen.<\/p>
Uber,\u00a0Samsung,\u00a0Toyota\u00a0and others have suffered breaches due to vulnerabilities in third-party suppliers. Be sure to conduct thorough due diligence on critical suppliers and ensure that they deploy best-in-class security standards and processes. Third-party risks also originate from APIs, applications and software. <\/p>
Remember to maintain a software bill of materials (SBOM) so that businesses can track and monitor the security risks of various components.<\/p>
Scan your IT environment regularly for bugs and vulnerabilities. Patch systems regularly to plug loopholes and vulnerabilities. Configure firewalls, clouds and other security systems so that attackers cannot take advantage of misconfigurations and open ports.<\/p>
If needed, leverage a third-party provider to test your security defenses by carrying out quarterly penetration tests.<\/p>