{"id":2196,"date":"2007-12-04T00:00:00","date_gmt":"2007-12-04T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/12\/04\/study-reveals-overlooked-sources-of-leaks\/"},"modified":"2021-12-30T11:40:52","modified_gmt":"2021-12-30T11:40:52","slug":"study-reveals-overlooked-sources-of-leaks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/12\/04\/study-reveals-overlooked-sources-of-leaks\/","title":{"rendered":"Study Reveals Overlooked Sources of Leaks"},"content":{"rendered":"<p>There are a whole lot of ways for sensitive information to leak from your organization, and most of them wouldn&#8217;t be prevented by data leak prevention tools, according to a new report issued today.  In a detailed study of 887 leak incidents, the Information Security Forum &#8212; an international, non-profit consortium of security-focused enterprises and vendors &#8212; found that many leaks are caused accidentally, often through non-technical means.   &#8220;Think about how often you hold the door open for a stranger carrying something heavy, or what you can overhear in a conversation on an airplane,&#8221; says Simone Seth, senior research analyst at ISF.  &#8220;That&#8217;s the sort of thing we found over and over again in the study.&#8221;  While there have been many studies recently on insider attacks, most of them focus primarily on online leaks, without taking into account the &#8220;old&#8221; sources of leaks that have been around for years, she observes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lost laptops, emails sent to the wrong address, sensitive documents left on photocopiers, employees walking out of the building with confidential papers or storage media &#8212; these are not new sources of leaks, but they remain the most common, the study finds.  &#8220;Most of these are accidental, not malicious,&#8221; Seth says.<\/p>\n<p>Some employees repeat sensitive information on social networking sites such as MySpace or Facebook, while others may be overheard in a restaurant or on an airplane.  An employee might be shoulder-surfed at a coffee shop or on a train, or lose an unencrypted storage device in a public place, the study observes.<\/p>\n<p>The study also found some methods of leakage that may not be anticipated, such as &#8220;print screen&#8221; capabilities or photographing of screens on mobile devices.  &#8220;I know it&#8217;s a tired phrase, but we&#8217;re talking about human behavior here, and the only way to correct the problem is to correct the behavior.&#8221;<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=140412&#038;f_src=darkreading_section_296<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2196","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2196"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2196\/revisions"}],"predecessor-version":[{"id":4683,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2196\/revisions\/4683"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}