Data loss prevention.

Corporations Lose Data in Ways They Didn’t Imagine

Insider threats make up a large portion of cyber security risk. It’s a third of the risk when you manage sensitive data on your network. Most organizations think of cyber security risk and insider threats as malicious employees, but it’s not always malicious intent that leads to data loss. Negligence, phishing, malware, and other events are also the cause for data leaks. But the source of data loss doesn’t matter when it’s severe enough to cause lawsuits, investigations, and brand damage. Remember the Ticketfly data breach that administrators let slip? Or maybe your router under attack?

Bring Your Own Device

Many corporations have adopted their own BYOD (bring your own device) policies. They allow any employee to bring a laptop, smartphone or tablet and connect it to the network. It’s convenient, especially when you have employees that travel or need to take work home. BYOD is common even with smaller companies. But standards and policies should be used no matter the size of the organization.

The issue most organizations run into is that they don’t properly secure the network when users bring their devices to work. Users might have antivirus software on their machines. But the organization has no control over the content installed on the device or even if the device’s antivirus is updated regularly. This leaves an open vector for an attacker that wants to install malware on a network. This can easily lead to data loss.

Larger organizations have a BYOD policy and then provide devices to the employee. This is a better option because the organization then has control of the device, its settings, and the content that’s installed on it. Think of a smartphone that users bring home from work. If the organization owns the device, then they can update the antivirus software and block it from being hacked. For instance, the organization can set the device to wipe clean should an attacker attempt to guess the passcode to access an iPhone or an Android.

Steep Fines for Poor Data Management

Fines for poor data management continue to increase as more organizations are found out of compliance. PCI compliance requires strict guidelines for data and steep fines should the organization fail to properly adhere to mandates. HIPAA is another regulatory body for healthcare organizations. Violations result in fines. Therefore, it’s imperative for an organization to properly protect and store their data.

Even with the right policies in place, it’s still possible for an attacker to gain access to data due to employee negligence. This is where auditing and logging are necessary. For any record that contains private employee data, there should always be logging policies in place that indicate who had access to the records. Who opened the records? What data did they access? Some companies require a PIN from the customer, and without this PIN the employee is unable to open the records. Know the cyber security basics and be prepared.

Data loss prevention solutions.

See how an organization could also lose resources through crypto jacking and crypto mining.

Monetary Loss from Data Loss is More Than the Obvious

Most organizations think of the obvious in terms of monetary loss. Lawsuits and brand damage are obvious results of data loss. However, other issues such as falling stock prices/valuations and a loss in productivity as pending investigations happen are the not-so-obvious.

It’s these unforeseen costs that can add up to serious cost/debt after a data breach. You can’t avoid certain costs. But providing the best in data protection and user education to help them detect cyber security threats will reduce the likelihood of a successful data breach from an attacker.

For social engineering and physical threats, GateKeeper will lock desktops when a user walks away. This helps prevent data loss incidents. This will provide physical protection from outside attackers that are able to gain entrance to the premises.

Capterra Best Value for Authentication Jun-20
Capterra Ease of Use for Authentication Jun-20

See GateKeeper proximity access control in action.

Take a self-guided tour of how you can evolve from passwords. Then you're really saving time with automation.