A Long Ride for Stolen Data

Have you ever wondered what happens to your data once a thief gets their hands on it? Bitglass, a cloud security company conducted an experiment to find out just what happens when data has been stolen. And the answer may surprise you.

The experiment began with Bitglass’ Threat Research Team compiling a spread sheet of 1600 fake names, social security numbers, credits cards, and addresses. They took this false information and transmitted it through the company’s proxy. The research team was able to monitor each time the file was opened and even pin down the exact location. And here are the surprising results: in just 12 days the data was viewed 1081 times, and was opened in 22 countries and 5 continents. These are really alarming results as “data breach discovery often takes ‘weeks or months’, allowing hackers to compromise the system and search for valuable data to exfiltrate”, according to Verizon analysts. Hackers are stealing data much faster than companies can keep track and that there are no geographic boundaries to where the information can end up!

One way of making sure your company stays safe from such immediate threats is implementing a comprehensive security strategy that includes encryption and key management; which means avoiding the ramifications of losing sensitive data, including loss of profits, legal action and punitive fines. Once sensitive data is in the wrong hands it clearly is only a matter of days before it is spread across the globe.

To learn more on how you can keep your company secure, download our Whitepaper on 5 Pillars of Transparent Data Security.

Previous Post
What You Ought to Know About Data Encryption Codes
Next Post
Data Vulnerability: Encryption Can Save Your Business

Related Posts

Hidden Benefits of Encryption for Legal Services

Lately we have noticed a growing interest for encryption and data security in the legal services industry. Legal services face a similar challenge as other verticals with the need to protect corporate assets being shared through multiple devices and portals.…
Read more

Windows 8 is here! Now what?

As someone that’s worked in IT for the better part of 14 years, I’ve seen my fair share of product launches. When it comes to operating systems, it’s always a cyclical engine; big flurry of attention at launch followed by…

Protect and Partner Up

There have been many high profile breaches in 2014: Home Depot, Target, and the most recent, Sony Pictures Entertainment. These breaches clearly illustrate that there is much work to be done across all business sizes. (more…)
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu