blog
media download page
Essay / Data Leakage and Its Occurrence in an Organization data leak and common methods to resolve it. occurs in an organization. It also discusses the mitigation measures that should be taken to limit these types of leaks. The increase in communication methods used by organizations to communicate both internally and externally has also increased the risks of data falling into the hands of people it is not intended to reach. According to Papadimitriou and Garcia-Molina (2011), data leakage in an organization has always cost organizations millions or even billions of dollars, directly or indirectly. Gordon (2007) defines data leakage as the transmission of data/information from within the organization to an external recipient without authorization. Transmission of data/information may be carried out by physical or electronic means. Usually, the term data leak is generally used synonymously with information leak. The term unauthorized in this essay is not necessarily malicious or intentional. Transmission may be unauthorized, but always unintentional. In this essay, I will discuss how data is leaked in organizations, common causes of data leakage, and how this troublesome trend (data leakage) can be combatted in an organization. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essay How Data Leaks Occur in an Organization According to Gordon (2007), the best way to formulate a data leak prevention method is to understand how data leaks occur in the first place and by understanding the type of information that is most often disclosed today. Publicly released data on data breaches indicates that more customer data is typically leaked than any other type of data. The table below indicates the different categories of data disclosed and their respective percentages. Source: Gordon (2007) Data leaks can be classified into two main categories: internal and external. Gordon states that the compilation of data carried out by “PerkinsCoie. com” and “EPIC. org” states that most data leaks occur through internal sources. Percentage-wise, 52% of all data security breaches come from internal sources, compared to 48% that come from external sources. Of the 52% of data security breaches resulting from internal sources, further research indicates that only 1% is due to a malicious/intentional leak, while the vast majority, 96%, is caused by an unintentional leak. Unintentional leaks can be further deconstructed to reveal that 46% of unintentional leaks result from employee surveillance, while 50% result from poor business processes within the organization. Some of the major internal vectors through which data security breaches occur are instant messaging, email, webmail, web logs, malicious web pages, file transfer protocols, storage media, hard copies, cameras, inadequate folder/file protection and inadequate database security. . The personal information of millions of people falls into the wrong hands every year in the United States and around the world.world. All of these factors contribute significantly to data loss each year, often leading to serious consequences for the business. As businesses become more distributed, mobile employees expand the potential risk of data loss. Behaviors such as transferring files from a work device to a personal computer that is not protected or maintained to IT standards, using personal communications that are not as secure as business communications, talking about sensitive company topics where others can hear the conversation and not doing so. Using a laptop privacy shield when working remotely in a public place invites information theft. Employees also fail to protect equipment such as laptops and portable storage devices, which can be lost or stolen. Common Causes of Data Leaks According to Guidance Software Inc., there are several causes of data leaks. data in businesses, including cyberterrorism, human actions, poor processes and organized crime. Cisco (2014) also commissioned Insight Express, a third-party market research company, to conduct a study on various companies around the world to determine the causes of data leaks in companies. The study mainly targeted data leaks caused by humans. According to the study, most data breaches occurring worldwide are caused by employees and former employees of organizations, regardless of the security tools, procedures and policies applied in these organizations. The study conducted by Insight Express indicated that employees cause data leaks by using unauthorized applications, misuse of company computers, unauthorized network and physical access, misuse of passwords and remote worker security. Employees around the world use unauthorized computer programs in the workplace, leading to more than half of data loss incidents in the companies where they work. According to the study, sharing of work devices between employees without supervision also affects 44% of all employees worldwide. As many as 39% of enterprise IT professionals have discovered employees trying to access parts of a physical facility or computer network for which they were not authorized. Angry employees who leave the company often want revenge, and they do so by disclosing company secrets and other forms of data to entities that shouldn't have them. Logging out of a computer and using a password are among the oldest and simplest ways of computer security. It's hard to imagine today's tech-savvy users bypassing these basic security features, but they do, and in surprising numbers. At least one in three employees say they leave their computer connected and unlocked when they are away from their desk, such as when they go to lunch or go home for the evening. Another common practice is to leave a laptop on a desk overnight, sometimes without logging off. One in five employees store system login information and passwords on their computer or write them down and leave them on their desk, in unlocked cabinets, or taped to their computer. The physical risk of storing data on a third party's server, whose security and physical location are not under your control, can be reduced by implementing.
Navigation
« Prev
1
2
3
4
5
Next »
Get In Touch