Rethink IT security
It's time to change what we think about securtiy

How to prevent data leakage

For most of us, the phrase ‘data loss’ makes us think of data breaches, broken computers, backup failures and disasters like office fires and floods. These are large-scale events that result in a devastating amount of lost data, at a cost of up to $4 million per incident.

HOW SECURE IS YOUR DATA? TAKE THE TEST download infographic

But breaches and backup failures aren’t the only way your business can ‘lose’ data. Proprietary information, customer data, and intellectual property can be lost or compromised when:

Someone sends a file

using unauthorised application, personal email or instant messaging client

IT departments don't have visibility

over mobile devices and cloud technologies being used by individual teams

An employee shares something on social media

that wasn't intended for public release



This kind of unauthorised (and often unintentional) release of information from your company to the wider world is called data leakage. And it happens every day.

Most of the time, data leakage is the result of end users - your employees - making simple mistakes, like printing a document and leaving it on the train. But data leakage also happens when mobile devices, cloud apps and other technologies are introduced into your IT ecosystem - usually without the involvement of your IT department. This is called 'shadow IT', and it exposes your business to cybersecurity threats and potential data loss.

This is why it's important to routinely assess your company's cybersecurity posture and educate your employees about proper data security and your computer use policy.

In addition to raising awareness of data security, you should:

encrypt data

Encrypt data-at-rest

using systems like BitLocker

digital rights

Use digital rights management

to control how people share information

digital management

Regularly evaluate your cybersecurity posture

and make sure departments aren't using unauthorized applications or cloud services

monitor and respond to threats

Monitor and respond to threats

with a system like Azure Security Center, so you can identify potential risks before they become costly issues



Data is your business's most valuable asset. That's why data security is everyone's responsibility, not just the IT department's. Make cybersecurity a whole-of-business issue, educate your employees about how and why data leaks, and use the right tools to implement identity and access management controls. Your customers, clients and stakeholders will thank you.

Additional Resources

Story of the month

Assess your security:

Take this test to evaluate your security posture

download e-book EVALUATE YOUR CYBERSECURITY >

Minimise data loss with SAM

A SAM cybersecurity engagement can protect your data

download e-book LEARN MORE >

Might be interesting too:

Story of the month

Malware in
many forms

Learn more about types of Malware and how to fight them >
Story of the month

Your weakest
links exposed

Discover how external attacks can affect business operations >
Story of the month

Peopleware:
a business risk

Learn more about managing your endpoints >
Story of the month

Some software
is not all it seems

Learn more about the benefits of SAM >
back to homepage BACK TO HOMEPAGE