Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

8/30/2010
10:50 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

E-mail Causes Most Enterprise Data Loss

Breaches associated with social media, video sharing, blogs are also on the rise, finds Proofpoint study.

8 Strategic Security Survey: Global Threat, Local Pain
(click image for larger view)
Strategic Security Survey: Global Threat, Local Pain
Although e-mail continues to be the primary source of data-loss risk at enterprises, the number of data-loss events associated with social media tools -- and related disciplinary actions -- continues to grow, a new study found.

In fact, 35% of large enterprises have investigated a leak of confidential, sensitive, or proprietary data via e-mail in the past year, according to a study of 261 large businesses by Osterman Research for Proofpoint. And 25% of the U.S. companies surveyed had looked into the exposure of such information via a blog or message board, compared with 18% in 2009, the study found.

One-fifth of businesses looked into similar postings on a social networking site such as Facebook or LinkedIn, according to the report. Last year, 17% of enterprises took this step, the study found. In addition, 18% of U.S. enterprises investigated postings on media-sharing sites such as YouTube and Vimeo, while 17% looked into data exposure on SMS text or web-based short message systems such as Twitter, according to Proofpoint.

In many cases, companies responded to these investigations with disciplinary actions against an employee for violating corporate policy. For example, 24% of companies disciplined an employee for violating blog or message board policies, and 11% terminated an employee for this violation, the study found. One-fifth disciplined an employee for using a social networking site to violate company policies, and 7% took the step of firing an employee, according to the report. In addition, 21% of businesses polled disciplined an employee for exposing data via a media-sharing site, and 9% of companies let an employee go because of these actions, the survey said.

"Enterprise IT professionals are faced with trying to minimize data loss risks across an ever-growing number of channels. And for every high-profile data loss event you see in the mainstream media, there are many more that you never hear about. Employees should also be aware of these concerns, the policies their employers have put around electronic communications, and the serious consequences for violating those policies," said Keith Crosley, director of market development at Proofpoint.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23836
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A stored XSS vulnerability was identified in the prefs_smtp_psw HTTP request body parameter for the acp interface. An admin user can inject malicious client-side script into the affected parameter without any form of input sanitization. The...
CVE-2021-23837
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A time-based blind SQL injection was identified in the selected_folder HTTP request body parameter for the acp interface. The affected parameter (which retrieves the file contents of the specified folder) was found to be accepting malicious...
CVE-2021-23838
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A reflected XSS vulnerability was identified in the media_filter HTTP request body parameter for the acp interface. The affected parameter accepts malicious client-side script without proper input sanitization. For example, a malicious user...
CVE-2020-35581
PUBLISHED: 2021-01-15
A stored cross-site scripting (XSS) issue in Envira Gallery Lite before 1.8.3.3 allows remote attackers to inject arbitrary JavaScript/HTML code via a POST /wp-admin/admin-ajax.php request with the meta[title] parameter.
CVE-2020-35582
PUBLISHED: 2021-01-15
A stored cross-site scripting (XSS) issue in Envira Gallery Lite before 1.8.3.3 allows remote attackers to inject arbitrary JavaScript/HTML code via a POST /wp-admin/post.php request with the post_title parameter.