Top Data Leak Vulnerabilities and How to Secure Them

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Top Data Leak Vulnerabilities and How to Secure Them-4 Next

File Sharing

We've all experienced it: trying to send a well-crafted email that says, "As you'll see in the attached," only to receive a notification that your email attachment's file size is too big to exchange through the email server. What is an employee to do? A sheet can't be trimmed off of an Excel document or pieces left out of a critical business presentation, so the employee stores it in an online file sharing service, sends a link and moves on to other business. Unfortunately, the employee doesn't realize the free, unsecure file-sharing site leaves corporate data at anyone's disposal. So, make sure you provide approved, secure solutions for your employees, otherwise your employees could be leaving important information exposed.

Historically, the top industries investing in data protection have been health care, financial services and government, and the reasons are clear. These industries manage and exchange endless amounts of (lucrative) personal data — Social Security numbers, health records, bank accounts, etc. — and data protection is a crucial component of maintaining the trust of clients, patients and the public. Because they deal with so much personal data, these industries are also highly regulated. The acronyms HIPAA, GLBA and SEC come to mind.

Without these compliance concerns or regulatory bodies to answer to, companies operating in other industries are often not as aware of the risks associated with sensitive data and are not as motivated to utilize methods of data protection. When given the choice between tools and strategies that lead to growth, or investments in security solutions without a clear ROI, it's no surprise that companies typically lean toward the former. Even with data breaches dominating news headlines, companies continue to take the "it will never happen to me" approach, believing their sensitive data isn't worth stealing.

But all companies have sensitive data that is vulnerable to theft, and hackers will continue to explore new ways to profit off of valuable data, as evident by the recent hack of newswire services targeting upcoming earnings releases, mergers and acquisitions news and new product announcements. However, newswires aren't the only vulnerability for companies. In this slideshow, ZixCorp examines potential trouble areas that are exposing your company's sensitive data.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.