• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

Most Common Causes of Data Leakage in 2023

Micheal chukwube / 5 min read.
August 10, 2023
Datafloq AI Score
×

Datafloq AI Score: 84

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/S3b2O

Given the value placed on data in this age, breaching systems to cause data leaks is unsurprisingly the mainstay of malicious cyber actors today. And businesses are still grappling with this reality and leaving their defenses open despite the spate of rising data leakages and breaches globally.

Understanding the common causes of data leaks is crucial for implementing effective cybersecurity measures. In this article, we explore five of the prominent causes, highlighting how they occur as well as examples to demonstrate the pervasiveness of data leaks.

Software Misconfiguration

Despite the apparent danger, many individuals and organizations leave default passwords unchanged. This is just one example of how misconfiguration of settings can allow attackers to infiltrate systems, databases, cloud services, applications, etc. At other times, a misconfiguration can occur when a program’s settings do not align with the organization’s security policy, and so permits unintended behavior.

This is basic cyber hygiene, but even big tech companies can leave certain things out. Back in 2021, for example, Microsoft made the news for the wrong reasons when 38 million customer records including sensitive information were exposed online due to a misconfiguration of its Power Apps portal service.

Particularly, organizations should be careful when migrating services or data to cloud environments – misconfigurations are common with this action and can arise simply from not following or not understanding the instructions.

Ransomware

According to a recent report on the state of ransomware, global ransomware attacks surged in the past year and recorded an all-time eye. Amidst these, the US is the biggest victim, suffering 43% of global recorded attacks, with zero-day exploitations by malicious actors playing a huge role in the increase in attacks.

So, ransomware attacks are not only growing in number but also in sophistication. And for this, organizations have to heighten their vigilance to prevent data leaks.

Source: Statista

Notably, DISH, the satellite broadcast company was hit by a ransomware attack in February. The attack led to significant outages in its internal servers and IT systems and leaked personal information belonging to about 300,000 people. But this is only one of the several ransomware attacks that have hit various organizations and facilities.

Data Theft

Over the past few years, insider attacks have become a growing concern, with malicious insiders becoming particularly a worry for data theft. Such concerns contributed to the development of zero-trust cybersecurity solutions since anyone can be a malicious insider, with greater risks assigned to privileged users with access to sensitive information.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

Source: Statista

This is not to rule out the role of external elements in data theft, though. A German newspaper, earlier this year, ran a report detailing a myriad of safety concerns expressed by Tesla customers. According to the electric car company, the confidential data provided to the newspaper was stolen from its system, although it couldn’t tell whether an insider was responsible or an external actor.

Third-Party Breach

Third-party breaches have become a particularly beneficial mode of attack for malicious actors because of the potential of acquiring several victims from just one hit. For instance, according to a third-party breach report, in 2022, 63 vendor attacks led to 298 data breaches across companies.

In January, two insurance companies – Aflac and Zurich Auto Insurance – suffered a data leak that affected millions of records including the information of at least 2 million policyholders with the two companies combined. According to reports, an unnamed US subcontractor was involved although it was not certain that both data breaches were connected.

This shows the cascading effects of third-party data breaches and underscores why organizations must stop at nothing to ensure that they only partner with companies and vendors that have strong security protocols in place.

Software (API) Vulnerability

APIs were a groundbreaking revelation in software development, but their proliferation has exacerbated the risks of data exposure since sensitive data is increasingly being shared via this medium. So, API vulnerabilities, such as broken authentication issues easily jeopardize the software’s security and can allow malicious actors to access data illegally.

Source: VentureBeat

An API vulnerability in Twitter’s software allowed threat actors to steal the email records of over 200 million users. Although this happened back in 2021 and the breach was fixed in January the following year, by mid-2022, the data sets started going on sale on the dark web and were eventually published for free. Email data are typical targets for phishing and social engineering attacks.

How to Prevent Data Leakage

Preventing data leakage is not an impossible task, although, due to the increasingly sophisticated nature of cyber attacks these days, it can be very tough to handle. However, these few steps should help you overcome the most common causes of data leakage.

  1. Implement a strong data detection and response solution: Unlike traditional data loss prevention systems, DDR solutions prioritize behavioral analytics and real-time monitoring via machine learning to automatically identify and respond to data incidents.
  2. Evaluate third-party risks: working with a third party, especially when it involves exchanging data, can no longer be business as usual. The risks of your partners are yours too, so you must know where both companies stand and how you can complement, not endanger, each other, security-wise.
  3. Secure all endpoints: there has been a huge increase in the number of remote access points that communicate with business networks. Plus, they are dispersed too, and sometimes internationally. Adopting a zero-trust approach helps prevent endpoints from becoming leeway for attacks.
  4. Cybersecurity hygiene: as identified earlier, data leakage can simply be due to unhygienic practices. Methods such as encryption, data backups, password management, etc. are not outdated; they should all be in place to help you maintain your guard.

Conclusion

Proactive measures, regular security assessments, and a comprehensive cybersecurity strategy are key to mitigating the risks associated with data leakage. As we have seen from the examples, every kind of business, even the biggest tech companies, suffers from this challenge. Therefore, data security is something that all business leaders must take seriously from now.

Categories: Cybersecurity
Tags: data leak, Data security, Network Security, Ransomware, security
Credit: https://unsplash.com/photos/-WXQm_NTK0U

About Micheal chukwube

Experienced Digital PR Strategist, Content Writer, and Tech Enthusiast. Published on Techopedia, Readwrite, Infosecurity-magazine, Dzone, HackerNoon, and more.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post
Host your website with Managed WordPress for $1.00/mo with GoDaddy!

Related Articles

The Advantages of IT Staff Augmentation Over Traditional Hiring

May 4, 2023 By Mukesh Ram

The State of Digital Asset Management in 2023

May 3, 2023 By pimcoremkt

Test Data Management – Implementation Challenges and Tools Available

May 1, 2023 By yash.mehta262

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics app application Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto customers Data design development digital environment experience future Google+ government information learning machine learning market mobile Musk news Other public research security services share social social media software strategy technology twitter

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Oracle Cloud Data Management Foundations Workshop
  • Data Science at Scale
  • Statistics with Python
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • 5 Reasons Why Modern Data Integration Gives You a Competitive Advantage
  • 5 Most Common Database Structures for Small Businesses
  • 6 Ways to Reduce IT Costs Through Observability
  • How is Big Data Analytics Used in Business? These 5 Use Cases Share Valuable Insights
  • How Realistic Are Self-Driving Cars?

Search

Tags

AI Amazon analysis analytics app application Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto customers Data design development digital environment experience future Google+ government information learning machine learning market mobile Musk news Other public research security services share social social media software strategy technology twitter

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!