• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

Menu
  • About
  • Must Read
      • IIS Performance Boost
      • RFID Security
      • Web App Security Testing
      • How to Secure Home Network
      • Prevent Cross-Site Scripting Attacks
      • Renew Self-Signed Certificates
      • Penetration Testing Tools
      • VPN Concentrator
      • Forensic Investigation Tools
      • Digital Certificates
      • Cloud Security Issues
      • Advanced Evasion Prevention
      • Firewall Types
      • Tips to Prevent Data Exfiltration
      • Classified Info Handling
      • MySQL Security
      • Definition of 7 Types of Malware
      • VOIP Security
      • Why Antivirus Software Fails
      • 15 Network Security Vulnerabilities
      • Web App Security
      • IT Security Standards
      • Types of Virtualization
      • Android Security
      • Digital Signature
      • Advanced Malware Protection
    • Close
  • Consultancy
  • Contact

Top 10 Tips to Prevent Data Exfiltration

by wing

What do we mean by data exfiltration?

First of all we need to realize that data breach and data exfiltration are two different things. In simple words, data exfiltration means unauthorized transfer of data

Your data can be transferred without your knowledge using data exfiltration techniques used by both external and internal actors and tools used by companies.

Who can exfiltrate your data?

In general, there are three types of threat actors motivated by various reasons.

State: your own county or any foreign states can exfiltrate data for espionage, influence and strategic geo political advantages.

Organized criminal groups: they are motivated by financial gains. One of the common targets is credit card industries, banks, e-commerce sites.

Hackers group: hacktivists group like anonymous can exfiltrate data in order to gain social influence.

What are the primary targets of data exfiltrators?

  • Database
  • Sensitive files in the file server
  • Emails and other communictions methods
  • Source codes of your custom application

What are the data transport mechanisms used to exfiltrate data?

  • FTP
  • HTTP/HTTPS
  • SMTP
  • Remote Desktop
  • DNS
  • VPN

Types of file formats used to transport data?

Microsoft word, excel, PowerPoint, pdf, xml, images, videos and the other file format.

Types of information targeted by perpetrators

In the majority cases, a data exfiltrators will target for your customer and employess’ personal identification information. The second most vulnerable data is the PCI information.

At first data exfiltration will target your data. The next step is to find a way to transport that data. You need to identify the exit path of your data from your organization. Do you allow your employees to carry USB drives in your organization? What about https/ssl, ftp and other method of remote data transfer facility.Keep in mind that lots of data can be transferred via email in word files or plain text files or csv files.

Before transferring your data via FTP the attacker can encrypt and compress your data in order to avoid detection system.

What can you do to stop data exfiltration?

  • At first identify your data sources.
  • Determine data flows.
  • Identify regulatory requirements
  • Classify your data according to sensitivity
  • Assign data owner
  • Apply protection
  • Review that who has access to the important data
  • Program review

Make a simple plan to prevent exfiltration

When you make a data protection plan, you need to develop a clear understanding of the location of your data and how they exists( encrypted or unencrypted) and find out the strength of your data access control mechanism and management system.

Once you make a list of your critical data, you need to realize the business impact of data breach and to identity the parties who are interested in your data. Most important of all is to have a clean understanding of what exfiltration technique can be used to move data from your organization. You do not need to be a data breach expert in order to protect your data, start with a small step at first and that is classify your data. The next step is to assess the existing controls.

 

Our Top 10 Tips are:

  1. Classify your data based on business criticality.
  2. Make of list of impacts of data breach
  3. Identity the people who may need your data to get competitive advantage
  4. Run an Assessment on your data access control mechanism.
  5. Identity the list physical and logical access (FTP, SSH, VPN etc.) route that can be used to exfiltrate your data.
  6. Identify how data resides in your systems( encrypted or unencrypted)
  7. Identify the file formats of your data and how you can protect
  8. Assess the data owner’s and data manager’s accountability. Don’t neglect the fact that you are more vulnerable to the insiders.
  9. Run regular (monthly or quarterly) review on your data protection plan and modify your plan if you need to depending on the situation and technological changes.
  10. Increase data program awareness in your organization.

 

Related Posts:

  • Top 10 Ways to Prevent Data Leak
    Top 10 Ways to Prevent Data Leak
  • cloud computing security
    Top 10 Cloud Computing Security Issues
  • 20 Types of Database Security to Defend Against Data Breach
    20 Types of Database Security to Defend Against Data Breach
  • data breach statistics
    Data Breach Insurance Explained
  • 9 Advantages and Disadvantages of Cloud Computing for Business
    9 Advantages and Disadvantages of Cloud Computing…
  • FTP mode active
    Active vs Passive FTP Mode: Which One is More Secure?

Filed Under: Network Security Tips Tagged With: data, exfiltration, loss, security

Primary Sidebar

Categories

  • AWS
  • containers
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Network Security Tips
  • Off Track
  • Telecom
  • Tutorial

Related Posts

  • Top 10 Ways to Prevent Data Leak
    Top 10 Ways to Prevent Data Leak
    Who wants to lose his sensitive and confidential data? The…
  • cloud computing security
    Top 10 Cloud Computing Security Issues
    From security perspective, not all types of data of an…
  • 20 Types of Database Security to Defend Against Data Breach
    20 Types of Database Security to Defend Against Data Breach
    In today’s cyber security, landscape database is considered to be…
  • data breach statistics
    Data Breach Insurance Explained
    Data breach insurance helps an organization to protect against the…
  • 9 Advantages and Disadvantages of Cloud Computing for Business
    9 Advantages and Disadvantages of Cloud Computing…
    Deciding to move on to a cloud means moving your…
  • FTP mode active
    Active vs Passive FTP Mode: Which One is More Secure?
    FTP or file transfer protocol is used to transfer files…
  • network security breach investigation
    Tips for Network Security Breach Investigation
    Investigating  network security breach may seem to be a daunting…
  • network based ids
    Host Based IDS vs Network Based IDS
    Based on the location in a network, IDS can be…
  • cloud privacy issues
    Cloud Privacy Issues and Questions for Users
    Though various types of cloud are available to serve various…
  • What is IDS?Basics of Intrusion Detection Systems
    What is IDS?Basics of Intrusion Detection Systems
    The full form of IDS is: Intrusion Detection System. How…
  • Tips for Foreign Travel Risk Assessment and Management
    Tips for Foreign Travel Risk Assessment and Management
    You may be subject to intelligence espionage while you travel…
  • types of digital security risks
    9 Types of Digital Security Risks
    Digital security risks poses a serious threat to the existence…

CISSP Sample Test

Take a CISSP Sample Test

CISA IT governance Sample test



Twitter Follow @securitywing

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

antivirus audit AWS backup browser check cisco cloud computer cyber data database encryption firewall home hsrp ids informaiton internet intrusion it kubernetes linux load balancing malware network protection putty risk router security security tips server ssh SSL switch tools virus vpn vulnerability web webserver website windows wordpress

Copyright © 2010-2023 ·All Rights Reserved · SecurityWing.com