data security

How to Prevent Data Loss in 2020

There are several data loss prevention solutions available in the market. Here’s how to tailor those software solutions to your company.

Most of today’s companies manage sensitive information thanks to the interconnectedness of our digital world. On the other hand, the number of breaches has risen in the last decade. Data breaches damage companies beyond the loss of records, affecting the customer’s trust and causing loss of business. Read on to learn how to keep your data secure in 2020.

What Is Data Loss Prevention?

Data Loss Prevention (DLP) is any process that identifies, tracks and prevents the disclosure of confidential data by enforcing security policies. Some examples of sensitive data include:

  • Customer data—Personal Identifiable Information (PII), credit card data, medical records, and financial data.
  • Intellectual property—source code, process documentation, and package design documents.
  • Corporate data—employee information, financial reports, and management planning documents.

While the terms are often confused, there is a fundamental difference between data leakage and data loss.

Data leakage is the intentional or unintentional disclosure of data without authorization. An unintentional data leak can happen when an employee takes home a work laptop home and it gets stolen. An intentional leak involves transmitting the data on purpose to an external unauthorized actor.

Data loss, on the other hand, means you cannot retrieve the data, because it has been deleted. Most data loss events are unintentional, and can result from hardware failure, power outages, or natural disasters. Sometimes employees delete the data by accident. Losses can also be intentional, as a consequence of an attack. In our example of the stolen laptop, data can be lost if there is no backup of the data in it.

Impact of Data Loss for Organizations

IBM’s “Cost of Data Breach” study reports that data breaches are becoming more common and costly. The report predicts that by 2020, an average data breach for a large company can cost close to $4 million. Small companies can expect to lose more than $2 million in costs due to data breaches.

Data is the most valuable resource for a company in this age, but is increasingly complicated to manage. Big Data, for example, are datasets so large, it cannot be processed in conventional databases. This can cause issues with privacy and unauthorized access.

Companies can be affected by data loss in the following areas:

  • Loss of customer trust—customers are not likely to return to a company following a data breach. A recent survey found that 70 percent of consumers would not do business with a company that experienced a data breach. While large companies, such as Facebook, may continue operations after a data breach thanks to capital injections. However, research reveals that more than half of small companies go out of business six months after a data breach.
  • Heavy fines from regulatory bodies—regulatory bodies such as the General Data Protection Regulation (GDPR) apply heavy fines to companies that experience a data breach. Companies found non-compliant with data protection guidelines can face fines of a minimum of 2% of their annual revenue. For example, British Airways was fined 4% of its annual worldwide revenue for its recent data breach.
  • Repair and restoration expenses—recovering after a data breach is expensive. It often includes third-party security services and providing support for customers victims of the data breach. For example, the Capital One breach should cost the company around $150 million.

Data Loss Prevention Solutions

There are several data loss prevention solutions available in the market. These software solutions are adapted to the varied requirements of different companies. Here are the main types of data loss prevention solutions:

  • Network-based data loss prevention—these solutions are focused on protecting data by monitoring network traffic. Network data loss prevention solutions investigate email traffic, social media interactions, and SSL traffic for violations of information disclosure policies.
  • Storage-based data loss prevention—these tools protect the data stored in a data center. Storage-based solutions identify the location of confidential data, determining the security of the storage.
  • End-point based data loss prevention—these solutions monitor endpoints such as personal computers, laptops, and tablets for all actions that transfer data. You can also configure endpoint monitoring to block specific activities.

Data Loss Protection Best Practices for 2020

Every organization should identify what are the main risks they face and prioritize the elements they can control. Human error and insider threats remain the main causes of data breaches, according to a 2019 study. Monitoring software with built-in automation can help companies control access to the data.

Other DLP best practices that can help protect the data from accidental or intentional loss include:

  • Assess your risks—organizations need to assess their data, understand what are the critical assets and how they should be protected. A company should develop a clear strategy according to the type of risk its data is exposed to. There is no one-size-fits-all solution.
  • Abide by monitoring guidelines—every country has regulations about how and when they can monitor employees’ activities. Companies should limit data exposure while protecting employees’ rights and information.
  • Automate when possible—functions such as access control, real-time alerts and identifying risky employees, can be automated using security solutions. Combining solutions that use behavior analysis with endpoint data loss protection can help detect insider threats early on.
  • Implement top-down security policies—data breaches often start with compromising credentials of privileged users. You should implement security from the top-down to prevent insider threats at every employee level.
  • Security training—companies should train employees on data storage and sharing best practices. This should help prevent accidental leakages and data loss incidents.

Data represents monetary gain, and this invites malicious agents. It seems that for 2020 the risk of data breaches is growing. Insider threats continue to be the top culprits of this increase. A good start is to protect the data from unwanted access. Closely monitoring data usage and access, among the practices mentioned in this article, can help you get started. The risks of a data loss are too high to leave it to chance.

Illustration by Ifrah Yousuf, courtesy of Cybersecurity Visuals at OpenIdeo

Featured

  • Return to Form

    My first security trade show was in 2021. At the time, I was awed by the sheer magnitude of the event and the spectacle of products on display. But this was the first major trade show coming out of the pandemic, and the only commentary I heard was how low the attendance was. Two representatives from one booth even spent the last morning playing catch in the aisle with their giveaway stress balls. Read Now

    • Industry Events
    • ISC West
  • Live from ISC West: Day 1 Recap

    The first day of ISC West 2023 is in the books, and it’s safe to say that vendors have brought their A-game to Las Vegas. The booths of this year’s Live From partners—NAPCO Security, Alibi Security, Vistacom, RGB Spectrum, and DoorKing—were swamped all day long. Here’s a brief recap of just a few highlights from each partner’s presence at the show. Read Now

    • Industry Events
    • ISC West
  • Turn on the AC, ISC West is Hot

    Nothing warm about the Las Vegas weather outside. It is cold, and it was raining after the opening day. No one seemed to care inside the convention center. The hall was packed with inquisitive security professionals. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2023: Day 1

    ISC West 2023 in Las Vegas, Nevada, has officially begun! Make sure to keep an eye on Security Today’s ISCW Live 2023 page, as well as our associated Twitter accounts—@SecurToday and @CampusSecur—for the latest updates from the show floor at the Venetian Expo. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

New Products

  • PACE® Long Range Ethernet Solutions

    PACE® Long Range Ethernet Solutions

    Altronix introduces the newest addition to its portfolio of PACE® Long Range Ethernet Solutions. 3

  • Dahua 2-Wire IP Video Intercom System

    Dahua 2-Wire IP Video Intercom System

    Dahua Technology is introducing a new line of expandable 2-wire IP video intercom solutions for the North America market. The New 2-wire IP video intercom is more advanced, cost effective, and designed to help businesses increase their security. 3

  • Kangaroo Home Security System

    Kangaroo Home Security System

    Kangaroo is the affordable, easy-to-install home security system designed for anyone who wants an added layer of peace of mind and protection. It has several products, ranging from the fan-favorite Doorbell Camera + Chime, to the more comprehensive Front Door Security Kit with Professional Monitoring. Regardless of the level of desired security, Kangaroo’s designed to move with consumers - wherever that next chapter may be. Motion sensors, keypads and additional features can be part of the package to any Kangaroo system in place, anytime. Additionally, Kangaroo offers scalable protection plans with a variety of benefits ranging from 24/7 professional monitoring to expanded cloud storage, coverage for damage and theft. 3