A Long Ride for Stolen Data

Have you ever wondered what happens to your data once a thief gets their hands on it? Bitglass, a cloud security company conducted an experiment to find out just what happens when data has been stolen. And the answer may surprise you.

The experiment began with Bitglass’ Threat Research Team compiling a spread sheet of 1600 fake names, social security numbers, credits cards, and addresses. They took this false information and transmitted it through the company’s proxy. The research team was able to monitor each time the file was opened and even pin down the exact location. And here are the surprising results: in just 12 days the data was viewed 1081 times, and was opened in 22 countries and 5 continents. These are really alarming results as “data breach discovery often takes ‘weeks or months’, allowing hackers to compromise the system and search for valuable data to exfiltrate”, according to Verizon analysts. Hackers are stealing data much faster than companies can keep track and that there are no geographic boundaries to where the information can end up!

One way of making sure your company stays safe from such immediate threats is implementing a comprehensive security strategy that includes encryption and key management; which means avoiding the ramifications of losing sensitive data, including loss of profits, legal action and punitive fines. Once sensitive data is in the wrong hands it clearly is only a matter of days before it is spread across the globe.

To learn more on how you can keep your company secure, download our Whitepaper on 5 Pillars of Transparent Data Security.

Previous Post
What You Ought to Know About Data Encryption Codes
Next Post
Data Vulnerability: Encryption Can Save Your Business

Related Posts

BitLocker Management

The never-ending torrent of high-profile data breaches encourages companies to evaluate security fundamentals. Among them is full-disk encryption (FDE), a security best practice that protects information on servers, laptops and other devices while they are at rest. (more…)
Read more

Stay Safe While Travelling

Travelling can be a huge hassle with going through customs, checking in luggage, and trying to make your connecting flights. With all of this going on, we tend to forget that there can be unique security challenges as well. (more…)

Hidden Benefits of Encryption for Legal Services

Lately we have noticed a growing interest for encryption and data security in the legal services industry. Legal services face a similar challenge as other verticals with the need to protect corporate assets being shared through multiple devices and portals.…
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.