Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

How does data leakage impact the company’s business process?

user-image
Question added by GHESNAVI K AZEEZ KUDILY
Date Posted: 2014/07/18
Tomasz Modrzejewski
by Tomasz Modrzejewski , Programmer , Company Skraw-Mech

In large companies and corporations frequent replacement of IT equipment is standard, to which a number of dangers - especially the risk of sensitive data available to third parties. Use the delete command does not remove efficiently the information stored on hard drives, and their escape outside the company entails not only the serious financial and legal implications, but primarily detrimental to its reputation.  In recent years, a way of doing business has been strongly affected by the continuous development of information technology. They are forced to frequent replacement of IT equipment and data storage media, primarily hard drives. This raises the need to verify the suitability of stored information, and hence to remove obsolete or unnecessary, largely classified as confidential.  Many employees of companies and institutions are still not aware that deleting a file is not synonymous with the removal of the disk. The operating system only removes information about the location, while physically the file still exists. You can recover data after formatting a hard disk from the BIOS, as in the case of physical destruction - with appropriate knowledge there will be no problem to read the information even from fragments of media.  When the time comes to replace old computers, they are often sold or disposed of together with hard disk drives (HDD), which still contain important and confidential information. In the case of large companies and corporations, especially in places of public trust, as banks and financial institutions, this action is absolutely unacceptable!  Delete once and for all  There are two effective methods for removing data from hard drives. The first is based on the use of specialized software, which by repeated overwriting the data according to a special algorithm makes it impossible to read. The disk can be reused, but the process is slow, and the cost high.  The second method is based on the demagnetization involving the permanent removal of the data using specialized equipment - the so-called. demagnetyzerów. - They can be used for both efficient and damaged hard drives HDD or magnetic tape - says Katarzyna Stempień zT & T Trading, general supplier demagnetyzerów on the Polish market. The carriers are exposed to a strong magnetic pulse that destroys all the records in the magnetic layer - the data is lost. The advantage of demagnetization is primarily a safety trial and short duration. For example, demagnetizer Intimus 9000 irreversible erase the drive takes only 10 seconds.  In contrast to demagnetization, which prevents further use of the drive on the market there are also solutions for cleansing the media and its re-use. - One example is the Intimus Hammer, which based on the method of secure erase permanently removes the data (at a speed of 4 GB per minute), while not destroying the disk - added Catherine Stempień.  Consequences of data leakage  Leakage data from companies or institutions carries serious legal consequences, financial and above all affects the image. In accordance with Art. 51 of the Law on personal data protection, data controllers who provide or allow access to them by unauthorized persons shall be subject to a fine, restriction of liberty or imprisonment up to2 years The penalty is reduced to a year when it was inadvertent operation.  Significant weakening of the brand and reputation, loss of customers due to the lowering of trust or loss of competitive advantage and binding to the decline in the value of the company is only part of the effects of image data leakage. High costs relating to information on the situation of the environment and eliminating the negative consequences, the penalty imposed by the authorities and the financial loss as a result of lawsuits may determine the continued operation of the company.  Attacks, leaks, theft can happen to anyone ...  The fact that data leaks can happen to even the most seemingly most protected corporations provide real-life examples. The problem still facing the company Sony, which once again was the victim of hacking. In early June 2011, the site SonyPictures.com stolen information (e-mail addresses, passwords, home addresses, dates of birth and others) associated with more than one million customer accounts Sony. LulzSec group responsible for hacking also came into possession of the data server administrators and3.5 million music coupons. In addition, plans were published internal network Sony includes the location and a list of used networking equipment along with the software version and administrator. Also made available the source code of a private network developers.  Not so long ago, because in April. also stolen 78 million records from the PSN, and in early May the next few tens of millions of Sony servers belonging to the SOE, which included information such as: name, address, logins and password hash. Additionally, in the wrong hands got more than 12 thousand. numbers, credit / debit cards with expiration date. According to Reuters, Sony's share price fell by5%, and the costs of this situation are estimated at more than $1.5 billion.  Confidential information in the trash  Loud stories about availability of confidential customer data banks, insurance companies, mobile operators and large enterprises testify to the lack of adequate security or the use of ineffective methods of destruction of relevant information.  Recently discontinued the proceedings on hundreds of data leakage mBank in Lodz. 18 A4 sheets of information containing, inter alia, corporate names, their addresses, personal details and address of owners, tax ID numbers, ID, social security, and bank account numbers, even with the current state and possessed limit were found by a passerby in a dumpster at the complex office. No one has been held accountable, because it was not established who to blame.  He concludes Peter grass with Printcom company, distributor demagnetyzerów, the person holding the charge of the protection of confidential data should be aware of the risks arising not only from improper selection or the use of collateral, but also an inadequate method of removing unnecessary data. It should seek the assistance of an expert and invest in the right equipment, that by using effective and proven methods of permanently erase the information stored on the disk, and thus protect the company from the negative effects of data leakage

Divyesh Patel
by Divyesh Patel , Assistant Professional Officer- Treasury , City Of Cape Town

Enterprises are increasingly concerned about the protection of their confidential information since these represent valuable assets, which provide strategic advantages, contribute to financial strategies, or canimpact public safety. Unfortunately, these assets are vulnerable to theft. Company’s reputation and value can be negatively influenced by stolen data through security breaches.

 

tajammul javed
by tajammul javed , incharge training , sargodha

It Conflicts in inter organization.and it is out of competition with other competitor.

It should f all business strategic plan.

Mian Muhammad Naeem Jan
by Mian Muhammad Naeem Jan , Chief Finance Officer , Management Company

Its not only information is leaked it also take out profits and market share of company.

Saiful Islam Hiron
by Saiful Islam Hiron , Site HR Manager , Handicap International

1. Untrusted relationship between employer and employee.

2. Conflicts in inter organization.

3. Out of competition with other competitor.

4. Fall business strategic plan.

5. Fall profit.

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.