Vulnerabilities / Threats
10:50 AM

E-mail Causes Most Enterprise Data Loss

Breaches associated with social media, video sharing, blogs are also on the rise, finds Proofpoint study.

8 Strategic Security Survey: Global Threat, Local Pain
(click image for larger view)
Strategic Security Survey: Global Threat, Local Pain
Although e-mail continues to be the primary source of data-loss risk at enterprises, the number of data-loss events associated with social media tools -- and related disciplinary actions -- continues to grow, a new study found.

In fact, 35% of large enterprises have investigated a leak of confidential, sensitive, or proprietary data via e-mail in the past year, according to a study of 261 large businesses by Osterman Research for Proofpoint. And 25% of the U.S. companies surveyed had looked into the exposure of such information via a blog or message board, compared with 18% in 2009, the study found.

One-fifth of businesses looked into similar postings on a social networking site such as Facebook or LinkedIn, according to the report. Last year, 17% of enterprises took this step, the study found. In addition, 18% of U.S. enterprises investigated postings on media-sharing sites such as YouTube and Vimeo, while 17% looked into data exposure on SMS text or web-based short message systems such as Twitter, according to Proofpoint.

In many cases, companies responded to these investigations with disciplinary actions against an employee for violating corporate policy. For example, 24% of companies disciplined an employee for violating blog or message board policies, and 11% terminated an employee for this violation, the study found. One-fifth disciplined an employee for using a social networking site to violate company policies, and 7% took the step of firing an employee, according to the report. In addition, 21% of businesses polled disciplined an employee for exposing data via a media-sharing site, and 9% of companies let an employee go because of these actions, the survey said.

"Enterprise IT professionals are faced with trying to minimize data loss risks across an ever-growing number of channels. And for every high-profile data loss event you see in the mainstream media, there are many more that you never hear about. Employees should also be aware of these concerns, the policies their employers have put around electronic communications, and the serious consequences for violating those policies," said Keith Crosley, director of market development at Proofpoint.

1 of 2
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio