A Long Ride for Stolen Data

Have you ever wondered what happens to your data once a thief gets their hands on it? Bitglass, a cloud security company conducted an experiment to find out just what happens when data has been stolen. And the answer may surprise you.

The experiment began with Bitglass’ Threat Research Team compiling a spread sheet of 1600 fake names, social security numbers, credits cards, and addresses. They took this false information and transmitted it through the company’s proxy. The research team was able to monitor each time the file was opened and even pin down the exact location. And here are the surprising results: in just 12 days the data was viewed 1081 times, and was opened in 22 countries and 5 continents. These are really alarming results as “data breach discovery often takes ‘weeks or months’, allowing hackers to compromise the system and search for valuable data to exfiltrate”, according to Verizon analysts. Hackers are stealing data much faster than companies can keep track and that there are no geographic boundaries to where the information can end up!

One way of making sure your company stays safe from such immediate threats is implementing a comprehensive security strategy that includes encryption and key management; which means avoiding the ramifications of losing sensitive data, including loss of profits, legal action and punitive fines. Once sensitive data is in the wrong hands it clearly is only a matter of days before it is spread across the globe.

To learn more on how you can keep your company secure, download our Whitepaper on 5 Pillars of Transparent Data Security.

Previous Post
What You Ought to Know About Data Encryption Codes
Next Post
Data Vulnerability: Encryption Can Save Your Business

Related Posts

PCI DSS 3.0 and Encryption

Version 3.0 of PCI DSS (Payment Card Industry Data Security Standard) was released in November 2013 and now that version 2.0 became inactive at the end of last year all organizations should have made the transition to version 3.0. (more…)

The Dark Side of Encryption

I know it’s very tedious these days to use a Star Wars metaphor, but as everyone’s doing it so will I. Encryption techniques have been used for some time to secure communications and protect personal or intellectual property. (more…)

Educating with Data Security

Education institutions have numerous important and sensitive documents stored that they are responsible for. This sensitive information belongs to students, parents and faculty and comes in the form of loans, financial records, employment records, etc. (more…)
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Contact Us

This will close in 15 seconds