Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Connect Directly
E-Mail vvv

5 Steps Every Company Should Take to Avoid Data Theft Risk

It's never been easier for employees to download company data and take it with them to their next gig.

The accelerated shift to remote workforces resulting from the COVID-19 pandemic has exasperated the challenge of protecting corporate data and intellectual capital.

It has never been easier for employees to compromise their employers' systems. Absent protocols designed for remote workforces, many companies are scrambling to keep tabs on the whereabouts of their property and IP.

The cookie-cutter protections that are typically in place don't safeguard against data theft nearly as much as companies think they do. As a result, employees are departing one employer for another with intellectual capital and trade secrets in tow and undetected. 

Related Content:

Malware Hidden in Encrypted Traffic Surges Amid Pandemic

The Changing Face of Threat Intelligence

9 New Tactics to Spread Security Awareness

Free and open-source network file transfer apps have made it easy for sophisticated engineers to compromise their employers' systems. Consider the widespread use of PuTTY, a program that establishes an encrypted secured shell (SSH) tunnel from a work computer that can export its entire contents to any device of choice. All done without leaving a traditional forensic trace.

But it's not just potential IP theft that should alarm companies. Significant legal exposure exists when onboarding new employees who may bring IP with them. Even if a new employer is unaware of a transgression, it could prove costly. Juries and judges of trade secret cases consistently yield some of the highest verdict awards imaginable. 

How can companies better protect themselves? Here are the five steps to take right now.

Hiring Process Review
Set the expectation from the start that the company takes confidential information seriously. In all cases, but especially when recruiting talent from competitors, be able to demonstrate a process of reasonable steps taken to protect against litigation. This begins in the interview phase, ensuring that interactions prevent any third-party confidential information from being solicited or divulged. During the on-boarding process, new employees should certify they searched for and returned all third-party data and that they did not store such information in personal accounts, cell phones, or other devices. To ensure there has been no inadvertent or intentional porting of third-party data onto the their servers, and to rebut any allegations to the contrary, companies should also do a forensic check of their systems within the first 45 days of a start date.

Update Acceptable Use Policy
With the work-from-home trend in full swing, companies need clear and enforceable policies around cloud and USB usage, as well as usage policies for personal devices and hardware. Employee certifications and disclosure of off-server data storage and transmission should become standard practice. Shared use policies should also address the realities of a work from home environment and define the expectations. For example, prohibiting access to confidential data, sending to personal or partner accounts to print, and the handling and storage of hard copy documents must be clearly articulated.  

Turn on Full Logging for All Devices
You can't protect what you can't track, so companies must account for new hardware and software. It's no small task given today's geographically diverse and remote work environment, but it is critical. While full logging does take up a lot of storage, turning on VPN logs, server access, document/code repositories and other databases are the only ways to track what's happening with company property. Some companies are deploying data loss prevention (DLP), and cloud solutions may alleviate some of the storage burden.

Implement Home Security Policies
Bad actors prefer targeting unsecured home environments because people are generally lackadaisical about their personal devices. Leaving computers turned on 24 hours a day is an open invitation to hackers, and home Wi-Fi networks with weak passwords and no encryption offer other easy entry points. Companies need to provide clear instruction and require employees to take steps to strengthen their remote work environment. That includes mandating computers being powered off each evening, and activating and updating Wi-Fi encryption to WPA2 and more secured passwords. Employees need training to recognize and report data theft danger signs such as extreme functional slowdown, which may indicate intruder access. 

Institute High-Risk Departure Programs
Companies need to be well-prepared for the inevitability of high-risk remote workers leaving for a competitor. This means HR, IT and legal should develop protocols for the exit process. Exit protocols should include appropriate procedures for automatic hardware shut-offs, putting employees on paid leave, preserving hard drives, and the immediate accounting for data, including the forensic remediation and review for evidence of data theft. Additionally, companies should not be too quick to reissue that hardware, as forensic preservation is key so if a problem arises it can be analyzed at a later date. Lastly, exit certification is a must for getting on record the exiting employee's testimony of compliance. It is also an opportunity to be very clear about an employee's continuing obligations to the organization after they are gone. 

The mitigation of data theft risk is a team effort. It requires a multi-pronged approach that includes IT security, HR, site security, protocols for handling data internally, and protections from external intrusions. And it all begins with a sober assessment of an organization's current state of vulnerability during these extraordinary times.

Bradford Newman is a Palo Alto-based attorney who specializes in matters related to trade secrets and artificial intelligence. He serves as Chair of Baker McKenzie's North America Trade Secret Practice as well as Chair of the American Bar Association's Artificial Intelligence ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
11/17/2020 | 10:03:37 AM
Includes some questionable advice
> Leaving computers turned on 24 hours a day is an open invitation to hackers...Companies need to provide clear instruction and require employees to take steps to strengthen their remote work environment. That includes mandating computers being powered off each evening...

I had to double-check that I was reading an article on a security-heavy website, in 2020 saying this. Forcing employees to switch off computers every evening because "leaving them on 24 hours a day invites in hackers" is one of the poorest security practices I can think of.

Here's an alternative suggestion: be friendly to your employees and treat them as human beings. Make them partners in having good security and having their machines up to date. Actually reward them for that sometimes; maybe have a "security day" where you explain how to use strong passwords, how to increase physical security, et cetera. That will do tons more for your security posture than some draconian policy about turning computers off every evening.
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Who knew face masks could also prevent the PII from spreading
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-15
Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why...
PUBLISHED: 2021-06-14
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
PUBLISHED: 2021-06-14
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, an...
PUBLISHED: 2021-06-14
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
PUBLISHED: 2021-06-14
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids ...