Home » Computers

Data Security - Do You Know Your Risk Is Greater Internally, Than Outside?

Apr 7, 2008
A lot of effort and expense in Internet security is directed towards 'keeping the bad guys out'. This is half the solution. What is overlooked, and equally critical, is how to keep the important data within. Internet content security is about keeping the 'bad stuff' on the outside of your network. Data leakage is concerned with keeping the 'good stuff' on the inside. Who are the primary culprits on data leakage - your own staff. Read on to see how leaks can occur and what measures you need to be taking to manage your environment.

What is Data Leakage?

There are two primary data leakage elements to be concerned with:

1. What data you should protect and
2. What constitutes a leak?

Data that is sensitive, or the 'good stuff', covers a range of corporate assets such as:

Intellectual Property (IP) - company secrets, product designs, mathematical formulas, research papers, source code, patents, schematics, recipes, proposals, reports, etc.

Commercial Information - financial reports, employee payroll, contracts, business plans, acquisition targets, product and marketing launch plans, budgets, customer databases etc.

Confidential Information - patient health records, customer financial information, legal contracts, employee resumes and agreements, reprimands, pre-release reports, etc.

How Does Leakage Occur

Emailing data to the wrong recipient or attaching the wrong file to an email.

Deliberately emailing client information to competitors by an employee.

Disclosure of confidential information.

Emailing confidential information in an un-encrypted format.

Internal staff using webmail or email that is not screened to discuss confidential subjects outside.

Data Leakage Is More Common Than You Expect

The issue with data leakage is not how common it is, but its severity, the nature of the data and how it has been leaked. With the span of data and the conduits for 'leakage', almost every company can attest to an incident of an internal security breach - willful or accidental. These breaches include loss of information and Intellectual Property theft. Interestingly, the majority of incidents came from inside their organizations.

One IDC study from late 2007 shows that 84% of all data leakage incidents can be attributed to employees. And the methods for stealing data increase - Blackberries, USB key drives, torrent uploads, and instant message file transfers. Companies should be more prepared than ever to monitor and control these activities.

What does Data Leakage look like when it is discovered?

Here are some recent media stories. Imagine putting your company name in place of the one listed. For example,

Apple suffered significant embarrassment after two employees revealed secret new product information on their personal blog sites.

A statistician employed by the Palm Beach County, Fla., health department inadvertently emailed his colleagues the names of 6,600 locals known to be infected with HIV and AIDS. This was a serious breach of the Federal laws on handling patient information and ensuring patient privacy.

Honeywell International Inc. says a former employee has disclosed sensitive information relating to 19,000 of the company's U.S. employees.

What are the Costs of Data Leakage?

The costs can span many areas. These can be anything from public embarrassment to financial loss, reduced stock equity, loss of competitive advantage or even criminal investigation and prosecution. In the case of Apple, where their employees revealed product information before it was released, the company's share price plummeted after the leak was revealed. The company was forced to fire the employees involved, resulting in embarrassment, lost productivity and legal costs.

In the incident with the Palm Beach health department, the apparent violation of the Healthcare Insurance Portability and Accountability Act (HIPAA) could result in prosecution. When the action damages an image or reputation, the financial costs of data leakage are very hard to quantify.

In more tangible matters, like IP loss, a damage assessment can probably be compiled. Consider a hypothetical scenario, where a company's new MP3 player designs and specifications are leaked to a competitor before it is launched. This breach could undermine the company's entire business and lose millions of dollars in revenue. Imagine if the Ipod design was leaked - what would this mean to Apple in lost opportunity. The damage can be embarrassment, loss of professional reputation and possibly boost in the competitor's market advantage.


Data Leakage is real and it starts on the inside. We often spend so much time building a wall around our enclaves that we do not consider risk internally. Unfortunately, real incidents are telling us we should look inward first and then outward. How secure do you feel about your data leakage prevention efforts?

We work with companies to assure their data and messaging is in compliance and secure. Our solutions are state of the art, quick to implement, cost effective and provide the comfort to know your data is secure. A phone discussion with our staff is a great way to assess your environment and what would be the best action plan. Visit our website http://www.enclavedata.com to learn more.

You have the responsibility to maintain your company's digital environment. With the right tools, you can now also have the control to assure compliance and protect your company's assets.

Leakage involves distribution methods where data could be released - accidentally or stolen. Examples can include:
About the Author
Dan Schutte is the President of http://enclavedata.com , specializing in messaging security, content filtering, data leakage controls, anti-spam software, email/IM archival and compliance. Visit our website to read actual Case Studies of how companies have successfully protected their data.
Please Rate:
(Average: Not rated)
Views: 134
Print Email Report Share
Article Categories
    • Artists
    • Gambling
    • Humanities
    • Humor
    • Movies
    • Music
    • Photography
    • Tattoos
    • Television
    • Classic Cars
    • Motorcycles
    • Recreational Vehicles
    • SUVs
    • Trucks
    • Vans
    • Branding
    • Business Opportunities
    • Careers and Jobs
    • Corporate
    • Customer Service
    • Direct Mail
    • Entrepreneurship
    • Ethics
    • Financing
    • Franchising
    • Home-Based Business
    • Human Resources
    • Import and Export
    • Leadership
    • Management
    • Market Research
    • Marketing and Advertising
    • Negotiation
    • Network Marketing
    • Networking
    • Organizational
    • Presentation
    • Project Management
    • Public Relations
    • Small Business
    • Strategic Planning
    • Team Building
    • Telemarketing
    • Training
    • Ask an Expert
    • College and University
    • Home Schooling
    • K-12
    • Languages
    • Online Education
    • Psychology
    • Accounting
    • Credit
    • Currency Trading
    • Debt Consolidation
    • Insurance
    • Investing
    • Leasing
    • Loans
    • Mortgage
    • Mutual Funds
    • Personal Finance
    • Stock Market
    • Structured Settlements
    • Taxes
    • Wealth Building
    • Coffee
    • Cooking
    • Gourmet
    • Recipes
    • Wine and Spirits
    • Acne
    • Aerobics
    • Alternative Medicine
    • Beauty
    • Cancer
    • Cosmetics
    • Depression
    • Diabetes
    • Diseases and Conditions
    • Fitness Equipment
    • Fitness
    • Hair Loss
    • Heart Disease
    • Medicine
    • Men's Health
    • Muscle Building
    • Nutrition
    • Skin Care
    • Supplements and Vitamins
    • Weight Loss
    • Women's Health
    • Yoga
    • Arts and Crafts
    • Babies
    • Collecting
    • Elderly Care
    • Genealogy
    • Hobbies
    • Parenting
    • Pets
    • Pregnancy
    • Woodworking
    • Feng Shui
    • Gardening
    • Home Appliances
    • Home Security
    • Interior Design
    • Landscaping
    • Affiliate Programs
    • Article Marketing
    • Auctions
    • Audio
    • Banner Advertising
    • Blogging
    • Broadband
    • Domain Names
    • E-Books
    • E-Commerce
    • Email Marketing
    • Ezines and Newsletters
    • Forums
    • Internet Marketing
    • Link Popularity
    • Pay-Per-Click
    • Podcasting
    • RSS
    • Search Engine Marketing
    • Search Engine Optimization
    • Security
    • Social Media
    • Spam
    • Video
    • Viral Marketing
    • Web Design
    • Web Development
    • Web Hosting
    • Copyright
    • Cyber Law
    • Intellectual Property
    • National, State, Local
    • Patents
    • Regulatory Compliance
    • Trademarks
    • Buying
    • Selling
    • Baseball
    • Basketball
    • Boating
    • Cycling
    • Extreme Sports
    • Fishing
    • Football
    • Golf
    • Hockey
    • Hunting
    • Martial Arts
    • Running
    • Scuba Diving
    • Soccer
    • Swimming
    • Tennis
    • Dating
    • Divorce
    • Marriage
    • Weddings
    • Astrology
    • Buddhism
    • Christianity
    • Faith
    • Hinduism
    • Islam
    • Judaism
    • Meditation
    • Metaphysical
    • New Age
    • Cable and Satellite TV
    • Cell Phones
    • Communication
    • Gadgets and Gizmos
    • GPS
    • Satellite Radio
    • Video Conferencing
    • VoIP
    • Addictions
    • Coaching
    • Goal Setting
    • Motivational
    • Stress Management
    • Time Management
    • Clothing
    • Electronics
    • Fashion
    • Gifts
    • Jewelry
    • Causes and Organizations
    • Environment
    • History
    • Holidays
    • Men's Issues
    • Nature
    • Philosophy
    • Politics
    • Women's Issues
    • World Affairs
    • Air Travel
    • Camping
    • Cruises
    • Destinations
    • Outdoors
    • Article Writing
    • Book Reviews
    • Copywriting
    • Fiction
    • Non-Fiction
    • Poetry
    • Quotes
    • Screenplay
    • Tools and Resources