Technology computers-hardware

What Is Data Leakage?

    Background

    • According to Network World, companies have invested heavily in systems that protect against data leakage because an incident of lost data can not only result in direct recovery costs, but also in negative publicity and lost customers or business opportunities. According to a 2010 Ponemon Institute study, data breaches cost companies an average of $204 per record, on average. In addition, a data breach that results in negative publicity can result in a lost business opportunity of $128 for each data record leaked, according to a 2008 Network World article.

    Types

    • Data compiled by the SANS Institute, an information technology security firm, revealed that 52 percent of data security breaches are the result of an organization's internal sources, compared to 48 percent from external hackers. In addition, less than 1 percent of the internal data breaches are tied to malicious intent, while 46 percent are related to employee oversight and 50 percent are the result of poor business processes.

    Causes

    • Disgruntled employees hacking into a company's computer network is the most common type of activity that results in internal data leakage, according to the SANS Institute. Unintentional data leakage can occur as a result of employees using instant messaging, email, webmail, peer-to-peer networks, blogs or wikis, malicious Web pages, file transfer protocol technologies and even on removable media storage devices such as USB drives, according to the SANS Institute. A person rummaging through an organization's dumpster can discover sensitive data on printed materials or on CDs.

    TJX Companies

    • The most serious loss of personal data in U.S. history involved TJX Companies Inc., owner of several retail brands such as T.J. Maxx, Marshalls and Bob's Stores. In January 2007, Framingham, MA-based TJX announced that intruders had breached the company's computer system and stolen millions of credit card and debit card numbers of its customers. In March 2007, TJX disclosed that 45.6 million credit card and debit card numbers were stolen. The systems that were broken into were related to checks, merchandise that was returned without receipts, credit cards and debit cards, according to Computerworld.

    Veterans Affairs

    • In August 2006, the Department of Veterans Affairs announced that a subcontractor who worked for the VA offices reported his laptop computer missing. The computer stored the personal records of possibly as many as 38,000 veterans. The laptop was later recovered, and the incident prompted the VA to use encryption software to protect data on laptops used by the agency.

SHARE
RELATED POSTS on "Technology"
How to Download Pictures Into Your Computer Using an SD Card
How to Download Pictures Into Your Computer Using an SD Card
How to Transfer DOS Random Type Data From the AS400 to a PC
How to Transfer DOS Random Type Data From the AS400 to a PC
Ways to Improve the Machine
Ways to Improve the Machine
How To Change a Hard Drive In a Macbook Aluminum
How To Change a Hard Drive In a Macbook Aluminum
Printed Circuit Boards - Understanding the Requirements of the European RoHS
Printed Circuit Boards - Understanding the Requirements of the European RoHS
Asus 1005HAB Specs: Specifications Of The Asus Eee Pc 1005HAB, And Where To Find The Best Deals
Asus 1005HAB Specs: Specifications Of The Asus Eee Pc 1005HAB, And Where To Find The Best Deals
How to Troubleshoot Home Computers
How to Troubleshoot Home Computers
How to Replace the Cartridge on a Compaq IJ650 Printer
How to Replace the Cartridge on a Compaq IJ650 Printer
How to Disable a Screen Saver in Vista
How to Disable a Screen Saver in Vista
How to Remove a 939 Processor
How to Remove a 939 Processor
Can a USB Wireless Modem Be Used for Laptops?
Can a USB Wireless Modem Be Used for Laptops?
How to Remove a Screensaver Password
How to Remove a Screensaver Password
Features of Brother Cartridges
Features of Brother Cartridges
How to Check HP RAM
How to Check HP RAM
How to Clone a Laptop HD
How to Clone a Laptop HD
Innovative Technologies Used In Hp C7973a Lto-3 Tape
Innovative Technologies Used In Hp C7973a Lto-3 Tape
Pitney Bowes Printer and Toner Products for Government Use
Pitney Bowes Printer and Toner Products for Government Use
Amazing Features of the HP Compaq 6710B Battery
Amazing Features of the HP Compaq 6710B Battery
How to Refill a Canon Ink Cartridge Without Resetting
How to Refill a Canon Ink Cartridge Without Resetting
How Do I Refill a Brother Inkjet LC51BK?
How Do I Refill a Brother Inkjet LC51BK?
How to Open an Inspiron 1000
How to Open an Inspiron 1000
5 Steps to Speed Up Your Computer and Stop Slowing Down Your Life
5 Steps to Speed Up Your Computer and Stop Slowing Down Your Life
How to Get Into Compaq Advanced BIOS Information
How to Get Into Compaq Advanced BIOS Information
How to Use Decorative Fonts & Dingbats
How to Use Decorative Fonts & Dingbats

Leave Your Reply

*