
Data Leakage
Data leakage is a threat of having digital information stolen or taken without the knowledge or authorization of the information owner. Stolen data may be sensitive, proprietary, or confidential information such as credit cards, customer data, trade secrets, or matters of national security.
Look for Early Indicators.
-
Abnormal network traffic - Sudden spikes in data transmission could indicate data leakage.
-
Unusual user activity - Unauthorized access, large data transfers, and off-hour downloads could signal a data leak.
-
Suspicious logins - Multiple attempts from suspicious IP addresses may be unauthorized access attempts.
-
Unexpected data access - Monitoring employee access permissions can help detect unauthorized access to sensitive data.
Data compromise is often associated with ransomware attacks, where the data is held hostage and used as leverage to extort payment from the victim organization.
Data modification, which is the threat of critical data being altered without the knowledge of the owner, is becoming the logical next step for attackers as hardened backup solutions and other security controls increasingly reduce the risk and impact of data compromise. These malicious modifications are intended to remain undetected for long periods of time but provide a potentially far-reaching and devastating impact if not detected and addressed.
Small and medium sized businesses that lack proper, critical data hygiene will find it increasingly difficult to prevent, deter, and detect cybersecurity breaches and data compromise.

