• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

Top 10 Tips to Prevent Data Exfiltration

by wing

What do we mean by data exfiltration?

First of all we need to realize that data breach and data exfiltration are two different things. In simple words, data exfiltration means unauthorized transfer of data

Your data can be transferred without your knowledge using data exfiltration techniques used by both external and internal actors and tools used by companies.

Who can exfiltrate your data?

In general, there are three types of threat actors motivated by various reasons.

State: your own county or any foreign states can exfiltrate data for espionage, influence and strategic geo political advantages.

Organized criminal groups: they are motivated by financial gains. One of the common targets is credit card industries, banks, e-commerce sites.

Hackers group: hacktivists group like anonymous can exfiltrate data in order to gain social influence.

What are the primary targets of data exfiltrators?

  • Database
  • Sensitive files in the file server
  • Emails and other communictions methods
  • Source codes of your custom application

What are the data transport mechanisms used to exfiltrate data?

  • FTP
  • HTTP/HTTPS
  • SMTP
  • Remote Desktop
  • DNS
  • VPN

Types of file formats used to transport data?

Microsoft word, excel, PowerPoint, pdf, xml, images, videos and the other file format.

Types of information targeted by perpetrators

In the majority cases, a data exfiltrators will target for your customer and employess’ personal identification information. The second most vulnerable data is the PCI information.

At first data exfiltration will target your data. The next step is to find a way to transport that data. You need to identify the exit path of your data from your organization. Do you allow your employees to carry USB drives in your organization? What about https/ssl, ftp and other method of remote data transfer facility.Keep in mind that lots of data can be transferred via email in word files or plain text files or csv files.

Before transferring your data via FTP the attacker can encrypt and compress your data in order to avoid detection system.

What can you do to stop data exfiltration?

  • At first identify your data sources.
  • Determine data flows.
  • Identify regulatory requirements
  • Classify your data according to sensitivity
  • Assign data owner
  • Apply protection
  • Review that who has access to the important data
  • Program review

Make a simple plan to prevent exfiltration

When you make a data protection plan, you need to develop a clear understanding of the location of your data and how they exists( encrypted or unencrypted) and find out the strength of your data access control mechanism and management system.

Once you make a list of your critical data, you need to realize the business impact of data breach and to identity the parties who are interested in your data. Most important of all is to have a clean understanding of what exfiltration technique can be used to move data from your organization. You do not need to be a data breach expert in order to protect your data, start with a small step at first and that is classify your data. The next step is to assess the existing controls.

 

Our Top 10 Tips are:

  1. Classify your data based on business criticality.
  2. Make of list of impacts of data breach
  3. Identity the people who may need your data to get competitive advantage
  4. Run an Assessment on your data access control mechanism.
  5. Identity the list physical and logical access (FTP, SSH, VPN etc.) route that can be used to exfiltrate your data.
  6. Identify how data resides in your systems( encrypted or unencrypted)
  7. Identify the file formats of your data and how you can protect
  8. Assess the data owner’s and data manager’s accountability. Don’t neglect the fact that you are more vulnerable to the insiders.
  9. Run regular (monthly or quarterly) review on your data protection plan and modify your plan if you need to depending on the situation and technological changes.
  10. Increase data program awareness in your organization.

 

Related posts:

  1. Acunetix Web Vulnerability Scanner to Detect your Website’s Security Loopholes
  2. How to Protect Networks against Advanced Evasion Techniques(AET)
  3. Top 10 Cloud Computing Security Issues
  4. 20 Ways to Secure Home Network

Filed Under: Network Security Tips Tagged With: data, exfiltration, loss, security

Primary Sidebar

Please help us sharing

Categories

  • AWS
  • Basics
  • Containers
  • Cryptocurrency
  • Cyber
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Law & Human Rights
  • Network Security Tips
  • Off Track
  • Social Media Governance
  • Tech Comparisons
  • Tech Stack Suitability
  • Telecom
  • Tutorial

CISSP Sample Test

Take a CISSP Sample Test

CISA Sample Test

CISA IT governance Sample test

Please Follow Us

Contact us for Ads

Go to Contact Form

Search

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

audit AWS backup basics browser check cisco cloud computer configuration cyber data database email gmail hsrp ids iis informaiton internet kubernetes linux load balancing malware microsoft network protection redundancy risk router security security tips server social media SSL switch test tools vpn vrrp web webserver website windows wordpress

Copyright © 2010-2025 ·All Rights Reserved · SecurityWing.com