When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
In 2023, there has been a concerning surge indatabreaches.
Businesses can readily mitigate risks to safeguard themselves from both data and the subsequentfinanciallosses.
Image Credit: Shutterstock
So, what are the most common reasons for data leaks, and how can they be effectively handled?
Global Head of Business Development at Qrator Labs.
Cloud misconfigurations
According to IBM, 82% of breaches involve information stored in thecloud.
Cloud misconfigurations can lead to data exposure or even compromise entire environments.
They take various forms, including improperly configured storage buckets, insecure access controls, and mismanagedencryptionsettings.
Attackers exploit these vulnerabilities to gain unauthorized access to sensitive information.
Solution:
Adhere to recommendations from your cloud service provider, such as AWS,MicrosoftAzure orGoogleCloud.
Implement automated tools for configuring and enforcing security policies.
For example, in Kubernetes clusters you may use Gatekeeper or Kyverno.
They can significantly reduce the risk of human error.
It means that users may have access to data and systems beyond what is necessary for their roles.
Additionally, there is a concern about proper segregation of duties.
For example, a single user may have the right to both create and approve transactions.
This leads to an increased risk of fraudulent activities.
Outdated configs also contribute to the problem.
Imagine a fired support employee still having access to the company’sdatabase.
They could potentially download and sell sensitive data to competitors.
- Utilize role-based access control to assign permissions based on job roles.
This way your team members will only see resources and data necessary for their specific responsibilities.
- Implement multi factor authentication by requiring users to provide multiple forms of identification before gaining access.
Even if login credentials are compromised, MFA adds an additional security barrier.
Infrequent software updates
Outdated software often contains known vulnerabilities.
When businesses fail to regularly update, they leave a window of opportunity for cybercriminals.
Update at least once in half a year.
Utilize automated tools to streamline the process.
Automation helps to guarantee that patches are deployed consistently across all systems.
The connection perimeter serves as the first line of defense against external threats.
Today, it extends to cloud services, remote users and mobile devices.
The attack surface has expanded even further with the proliferation of the Internet of Things.
From smart thermostats to industrial sensors, these gadgets often become attractive targets for hackers.
Configuring them correctly allows only authorized and necessary communication.
They can automatically respond to potential threats, mitigating risks in real-time.
- Add encryption for data transmitted over networks, including local networks, for an extra layer of protection.
This way, intercepted data remains unreadable without the proper decryption keys.
Other emerging threats
Among other emerging threats is the rapid advancement of artificial intelligence.
Cybercriminals use it to assess attack strategies, significantly increasing their chances of success.
It is also used to amplify the speed, scale, and reach of their attacks.
External audits or penetration testing can also help in evaluating the organization’s security posture.
Second, invest in advanced intelligence and monitoring solutions.
They can detect threats and respond in real-time.
Third, regularly train your employees to recognize and counteract threats, especially phishing.
The latter remains one of the most common methods used by cybercriminals to gain access to sensitive data.
It emphasizes the collective responsibility in safeguarding confidential data, which extends beyond the information security department’s duty.
Training sessions should explain the consequences of breaches, including potential fines and even dismissals.
It is important to conduct these events at least once in two years, if not more often.
Moreover, businesses should incorporate them into the onboarding process for new employees.
This facet of training is designed to be more engaging and enjoyable.
It may include some interactive activities, such as online games and simulations.
And, of course, always keep abreast of the latest cyber trends to develop countermeasures in time.
We’ve featured the best online cybersecurity courses.
The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.
If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro