data security

How to Prevent Data Loss in 2020

There are several data loss prevention solutions available in the market. Here’s how to tailor those software solutions to your company.

Most of today’s companies manage sensitive information thanks to the interconnectedness of our digital world. On the other hand, the number of breaches has risen in the last decade. Data breaches damage companies beyond the loss of records, affecting the customer’s trust and causing loss of business. Read on to learn how to keep your data secure in 2020.

What Is Data Loss Prevention?

Data Loss Prevention (DLP) is any process that identifies, tracks and prevents the disclosure of confidential data by enforcing security policies. Some examples of sensitive data include:

  • Customer data—Personal Identifiable Information (PII), credit card data, medical records, and financial data.
  • Intellectual property—source code, process documentation, and package design documents.
  • Corporate data—employee information, financial reports, and management planning documents.

While the terms are often confused, there is a fundamental difference between data leakage and data loss.

Data leakage is the intentional or unintentional disclosure of data without authorization. An unintentional data leak can happen when an employee takes home a work laptop home and it gets stolen. An intentional leak involves transmitting the data on purpose to an external unauthorized actor.

Data loss, on the other hand, means you cannot retrieve the data, because it has been deleted. Most data loss events are unintentional, and can result from hardware failure, power outages, or natural disasters. Sometimes employees delete the data by accident. Losses can also be intentional, as a consequence of an attack. In our example of the stolen laptop, data can be lost if there is no backup of the data in it.

Impact of Data Loss for Organizations

IBM’s “Cost of Data Breach” study reports that data breaches are becoming more common and costly. The report predicts that by 2020, an average data breach for a large company can cost close to $4 million. Small companies can expect to lose more than $2 million in costs due to data breaches.

Data is the most valuable resource for a company in this age, but is increasingly complicated to manage. Big Data, for example, are datasets so large, it cannot be processed in conventional databases. This can cause issues with privacy and unauthorized access.

Companies can be affected by data loss in the following areas:

  • Loss of customer trust—customers are not likely to return to a company following a data breach. A recent survey found that 70 percent of consumers would not do business with a company that experienced a data breach. While large companies, such as Facebook, may continue operations after a data breach thanks to capital injections. However, research reveals that more than half of small companies go out of business six months after a data breach.
  • Heavy fines from regulatory bodies—regulatory bodies such as the General Data Protection Regulation (GDPR) apply heavy fines to companies that experience a data breach. Companies found non-compliant with data protection guidelines can face fines of a minimum of 2% of their annual revenue. For example, British Airways was fined 4% of its annual worldwide revenue for its recent data breach.
  • Repair and restoration expenses—recovering after a data breach is expensive. It often includes third-party security services and providing support for customers victims of the data breach. For example, the Capital One breach should cost the company around $150 million.

Data Loss Prevention Solutions

There are several data loss prevention solutions available in the market. These software solutions are adapted to the varied requirements of different companies. Here are the main types of data loss prevention solutions:

  • Network-based data loss prevention—these solutions are focused on protecting data by monitoring network traffic. Network data loss prevention solutions investigate email traffic, social media interactions, and SSL traffic for violations of information disclosure policies.
  • Storage-based data loss prevention—these tools protect the data stored in a data center. Storage-based solutions identify the location of confidential data, determining the security of the storage.
  • End-point based data loss prevention—these solutions monitor endpoints such as personal computers, laptops, and tablets for all actions that transfer data. You can also configure endpoint monitoring to block specific activities.

Data Loss Protection Best Practices for 2020

Every organization should identify what are the main risks they face and prioritize the elements they can control. Human error and insider threats remain the main causes of data breaches, according to a 2019 study. Monitoring software with built-in automation can help companies control access to the data.

Other DLP best practices that can help protect the data from accidental or intentional loss include:

  • Assess your risks—organizations need to assess their data, understand what are the critical assets and how they should be protected. A company should develop a clear strategy according to the type of risk its data is exposed to. There is no one-size-fits-all solution.
  • Abide by monitoring guidelines—every country has regulations about how and when they can monitor employees’ activities. Companies should limit data exposure while protecting employees’ rights and information.
  • Automate when possible—functions such as access control, real-time alerts and identifying risky employees, can be automated using security solutions. Combining solutions that use behavior analysis with endpoint data loss protection can help detect insider threats early on.
  • Implement top-down security policies—data breaches often start with compromising credentials of privileged users. You should implement security from the top-down to prevent insider threats at every employee level.
  • Security training—companies should train employees on data storage and sharing best practices. This should help prevent accidental leakages and data loss incidents.

Data represents monetary gain, and this invites malicious agents. It seems that for 2020 the risk of data breaches is growing. Insider threats continue to be the top culprits of this increase. A good start is to protect the data from unwanted access. Closely monitoring data usage and access, among the practices mentioned in this article, can help you get started. The risks of a data loss are too high to leave it to chance.

Illustration by Ifrah Yousuf, courtesy of Cybersecurity Visuals at OpenIdeo

Featured

  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3