Top Data Leak Vulnerabilities and How to Secure Them

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Top Data Leak Vulnerabilities and How to Secure Them-3 Next

Mobile Devices

Workers are no longer constrained to the traditional 9-to-5 or limited to the computers and phones on their desks. Smartphones and tablets offer easy access to the office for those on the go. Whether it's working remotely, traveling for business, commuting on the train or checking in while on vacation, files are opened, documents are downloaded and emails are read on mobile devices. This "INTERNAL ONLY" information is at risk on mobile devices. Additionally, smartphones and tablets are conveniently small and compact, meaning they can be easy to misplace or lose. If you aren't protecting corporate data accessed on devices, it can be an easy target for thieves. When addressing mobile security, look for a bring your own device (BYOD) solution that keeps data off the device. That way, if the device is lost or stolen, you ensure corporate data is safe from unwanted eyes.

Historically, the top industries investing in data protection have been health care, financial services and government, and the reasons are clear. These industries manage and exchange endless amounts of (lucrative) personal data — Social Security numbers, health records, bank accounts, etc. — and data protection is a crucial component of maintaining the trust of clients, patients and the public. Because they deal with so much personal data, these industries are also highly regulated. The acronyms HIPAA, GLBA and SEC come to mind.

Without these compliance concerns or regulatory bodies to answer to, companies operating in other industries are often not as aware of the risks associated with sensitive data and are not as motivated to utilize methods of data protection. When given the choice between tools and strategies that lead to growth, or investments in security solutions without a clear ROI, it's no surprise that companies typically lean toward the former. Even with data breaches dominating news headlines, companies continue to take the "it will never happen to me" approach, believing their sensitive data isn't worth stealing.

But all companies have sensitive data that is vulnerable to theft, and hackers will continue to explore new ways to profit off of valuable data, as evident by the recent hack of newswire services targeting upcoming earnings releases, mergers and acquisitions news and new product announcements. However, newswires aren't the only vulnerability for companies. In this slideshow, ZixCorp examines potential trouble areas that are exposing your company's sensitive data.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.