Top Data Leak Vulnerabilities and How to Secure Them

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Top Data Leak Vulnerabilities and How to Secure Them-3 Next

Mobile Devices

Workers are no longer constrained to the traditional 9-to-5 or limited to the computers and phones on their desks. Smartphones and tablets offer easy access to the office for those on the go. Whether it's working remotely, traveling for business, commuting on the train or checking in while on vacation, files are opened, documents are downloaded and emails are read on mobile devices. This "INTERNAL ONLY" information is at risk on mobile devices. Additionally, smartphones and tablets are conveniently small and compact, meaning they can be easy to misplace or lose. If you aren't protecting corporate data accessed on devices, it can be an easy target for thieves. When addressing mobile security, look for a bring your own device (BYOD) solution that keeps data off the device. That way, if the device is lost or stolen, you ensure corporate data is safe from unwanted eyes.

Historically, the top industries investing in data protection have been health care, financial services and government, and the reasons are clear. These industries manage and exchange endless amounts of (lucrative) personal data — Social Security numbers, health records, bank accounts, etc. — and data protection is a crucial component of maintaining the trust of clients, patients and the public. Because they deal with so much personal data, these industries are also highly regulated. The acronyms HIPAA, GLBA and SEC come to mind.

Without these compliance concerns or regulatory bodies to answer to, companies operating in other industries are often not as aware of the risks associated with sensitive data and are not as motivated to utilize methods of data protection. When given the choice between tools and strategies that lead to growth, or investments in security solutions without a clear ROI, it's no surprise that companies typically lean toward the former. Even with data breaches dominating news headlines, companies continue to take the "it will never happen to me" approach, believing their sensitive data isn't worth stealing.

But all companies have sensitive data that is vulnerable to theft, and hackers will continue to explore new ways to profit off of valuable data, as evident by the recent hack of newswire services targeting upcoming earnings releases, mergers and acquisitions news and new product announcements. However, newswires aren't the only vulnerability for companies. In this slideshow, ZixCorp examines potential trouble areas that are exposing your company's sensitive data.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.