Categories: SecurityWorkspace

4 Ways To Avoid Having Your Private Data Leaked Online

1. Risky business

Understand the risk. Risks come in many guises from user error up to nation state attack, so understanding who is attacking you and why becomes just as important as what they are after. Traditional cybercrime focuses on quick commercial gain, so a typical breach would be aimed at gathering credit card data. This kind of breach has a lot less impact, though, compared to an advanced attacker who Greg Daytargets your gold nuggets of information. The techniques they use can be very similar but the impact varies hugely depending on who and why.

2. What’s it worth?

Understand the business and what makes it profitable. All businesses have something of value, but many can be blinded by the sheer volume of information that they have. Not all data is of equal value, so it’s important to do an audit so you prioritise what’s most valuable – essentially what makes your business profitable – and protect it accordingly.

3. It happens

Accept that incidents will happen. Traditionally businesses have focused on defence, but it’s important to remember that your response to a breach is just as critical, as this defines the commercial impactions of an incident.  Typically we see (through our M-Trends annual report) the median time to find a compromise is 229 days, which is a lifetime. Getting into organisations is typically achieved through automation but once the business has been compromised it requires human interaction to find the valuable information and extract and this takes time. We need to reduce the time to find and respond to incidents down from months to hours. This is especially true when 97% of organisations we test through our pilot assessment process are compromised at that time and don’t even know it.

4. Practice and develop skills.

It’s rare that we do anything well the first time we try, so we have to practice to develop skills to make us better. However, many organisations don’t have well documented, tried and tested response strategies that cover not just the technical find and fix, but also the understanding of the incident. By doing this, you can put the appropriate business responses in place – which ultimately means damage limitation. What we need to see changing is businesses thinking of cybersecurity in terms of business problems and processes, rather than just something highly technical.

Are you an expert on privacy? Take our quiz!

Duncan Macrae

Duncan MacRae is former editor and now a contributor to TechWeekEurope. He previously edited Computer Business Review's print/digital magazines and CBR Online, as well as Arabian Computer News in the UAE.

Recent Posts

Virgin Media O2 To Invest £700m To ‘Transform’ 4G, 5G Network

Virgin Media O2 confirms it will invest £2m a day for new mobile masts, small…

2 days ago

Tesla Cybertruck Deliveries On Hold Due To Faulty Side Trim

Deliveries of Telsa's 'bulletproof' Cybertruck are reportedly on hold, amid user complaints side trims are…

2 days ago

Apple Plots Live Translation Option For AirPods – Report

New feature reportedly being developed by Apple for iOS 19, that will allow AirPods to…

2 days ago

Binance Token Rises After Trump Stake Report

Binance BNB token rises after WSJ report the Trump family is in talks to secure…

3 days ago

iRobot Admits ‘Substantial Doubt’ Over Continued Operation

After failed Amazon deal, iRobot warns there is “substantial doubt about the Company's ability to…

3 days ago

Meta’s Community Notes To Use X’s Algorithm

Community Notes testing across Facebook, Instagram and Threads to begin next week in US, using…

3 days ago