data security

How to Prevent Data Loss in 2020

There are several data loss prevention solutions available in the market. Here’s how to tailor those software solutions to your company.

Most of today’s companies manage sensitive information thanks to the interconnectedness of our digital world. On the other hand, the number of breaches has risen in the last decade. Data breaches damage companies beyond the loss of records, affecting the customer’s trust and causing loss of business. Read on to learn how to keep your data secure in 2020.

What Is Data Loss Prevention?

Data Loss Prevention (DLP) is any process that identifies, tracks and prevents the disclosure of confidential data by enforcing security policies. Some examples of sensitive data include:

  • Customer data—Personal Identifiable Information (PII), credit card data, medical records, and financial data.
  • Intellectual property—source code, process documentation, and package design documents.
  • Corporate data—employee information, financial reports, and management planning documents.

While the terms are often confused, there is a fundamental difference between data leakage and data loss.

Data leakage is the intentional or unintentional disclosure of data without authorization. An unintentional data leak can happen when an employee takes home a work laptop home and it gets stolen. An intentional leak involves transmitting the data on purpose to an external unauthorized actor.

Data loss, on the other hand, means you cannot retrieve the data, because it has been deleted. Most data loss events are unintentional, and can result from hardware failure, power outages, or natural disasters. Sometimes employees delete the data by accident. Losses can also be intentional, as a consequence of an attack. In our example of the stolen laptop, data can be lost if there is no backup of the data in it.

Impact of Data Loss for Organizations

IBM’s “Cost of Data Breach” study reports that data breaches are becoming more common and costly. The report predicts that by 2020, an average data breach for a large company can cost close to $4 million. Small companies can expect to lose more than $2 million in costs due to data breaches.

Data is the most valuable resource for a company in this age, but is increasingly complicated to manage. Big Data, for example, are datasets so large, it cannot be processed in conventional databases. This can cause issues with privacy and unauthorized access.

Companies can be affected by data loss in the following areas:

  • Loss of customer trust—customers are not likely to return to a company following a data breach. A recent survey found that 70 percent of consumers would not do business with a company that experienced a data breach. While large companies, such as Facebook, may continue operations after a data breach thanks to capital injections. However, research reveals that more than half of small companies go out of business six months after a data breach.
  • Heavy fines from regulatory bodies—regulatory bodies such as the General Data Protection Regulation (GDPR) apply heavy fines to companies that experience a data breach. Companies found non-compliant with data protection guidelines can face fines of a minimum of 2% of their annual revenue. For example, British Airways was fined 4% of its annual worldwide revenue for its recent data breach.
  • Repair and restoration expenses—recovering after a data breach is expensive. It often includes third-party security services and providing support for customers victims of the data breach. For example, the Capital One breach should cost the company around $150 million.

Data Loss Prevention Solutions

There are several data loss prevention solutions available in the market. These software solutions are adapted to the varied requirements of different companies. Here are the main types of data loss prevention solutions:

  • Network-based data loss prevention—these solutions are focused on protecting data by monitoring network traffic. Network data loss prevention solutions investigate email traffic, social media interactions, and SSL traffic for violations of information disclosure policies.
  • Storage-based data loss prevention—these tools protect the data stored in a data center. Storage-based solutions identify the location of confidential data, determining the security of the storage.
  • End-point based data loss prevention—these solutions monitor endpoints such as personal computers, laptops, and tablets for all actions that transfer data. You can also configure endpoint monitoring to block specific activities.

Data Loss Protection Best Practices for 2020

Every organization should identify what are the main risks they face and prioritize the elements they can control. Human error and insider threats remain the main causes of data breaches, according to a 2019 study. Monitoring software with built-in automation can help companies control access to the data.

Other DLP best practices that can help protect the data from accidental or intentional loss include:

  • Assess your risks—organizations need to assess their data, understand what are the critical assets and how they should be protected. A company should develop a clear strategy according to the type of risk its data is exposed to. There is no one-size-fits-all solution.
  • Abide by monitoring guidelines—every country has regulations about how and when they can monitor employees’ activities. Companies should limit data exposure while protecting employees’ rights and information.
  • Automate when possible—functions such as access control, real-time alerts and identifying risky employees, can be automated using security solutions. Combining solutions that use behavior analysis with endpoint data loss protection can help detect insider threats early on.
  • Implement top-down security policies—data breaches often start with compromising credentials of privileged users. You should implement security from the top-down to prevent insider threats at every employee level.
  • Security training—companies should train employees on data storage and sharing best practices. This should help prevent accidental leakages and data loss incidents.

Data represents monetary gain, and this invites malicious agents. It seems that for 2020 the risk of data breaches is growing. Insider threats continue to be the top culprits of this increase. A good start is to protect the data from unwanted access. Closely monitoring data usage and access, among the practices mentioned in this article, can help you get started. The risks of a data loss are too high to leave it to chance.

Illustration by Ifrah Yousuf, courtesy of Cybersecurity Visuals at OpenIdeo

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3