{"id":8915,"date":"2010-03-01T15:58:00","date_gmt":"2010-03-01T15:58:00","guid":{"rendered":"https:\/\/www.amitbhawani.com\/blog\/?p=8915"},"modified":"2010-03-01T15:58:00","modified_gmt":"2010-03-01T15:58:00","slug":"5-ways-to-avoid-data-leak-within-your-company","status":"publish","type":"post","link":"https:\/\/www.amitbhawani.com\/blog\/5-ways-to-avoid-data-leak-within-your-company\/","title":{"rendered":"5 Ways to Avoid Data Leak within your Company"},"content":{"rendered":"<p>Data leakage became a popular issue since technology has taken a decisive turn. Let\u2019s see first when data leak happens:<\/p>\n<ul>\n<li>When the network security is weak and the system gets hacked<\/li>\n<li>When the system crashes and there are no backups<\/li>\n<li>When employees are taking confidential data outside the company<\/li>\n<\/ul>\n<p><a href=\"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/03\/Data-Theft-Employees-Leak.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/03\/Data-Theft-Employees-Leak-150x150.jpg?resize=150%2C150\" alt=\"Data Leak Employees Theft\" title=\"Data Leak Employees Theft\" width=\"150\" height=\"150\" class=\"alignright size-thumbnail wp-image-8918\" srcset=\"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/03\/Data-Theft-Employees-Leak.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/03\/Data-Theft-Employees-Leak.jpg?resize=120%2C120&amp;ssl=1 120w, https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/03\/Data-Theft-Employees-Leak.jpg?zoom=2&amp;resize=150%2C150&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/03\/Data-Theft-Employees-Leak.jpg?zoom=3&amp;resize=150%2C150&amp;ssl=1 450w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p>Employees are taking confidential data with them in order to get a job to a competitor or to sell it to other companies. Ponemon Institute conducted a national survey and they revealed that 59% of employees are stealing company data and 79% admitted that their employer do not know about it or does not agree.  <\/p>\n<p>But what should companies do to avoid this disaster? Nobody can ensure a 100% secure environment but there are still some important aspects that can help companies to avoid data leak:<\/p>\n<ol>\n<li>Create clear policies and procedures signed by employees where they agree they will never take confidential or sensitive information after leaving their work place. Also, there must be stated in these policies that they are not allowed to access or use the information for personal interest.<\/li>\n<li>When an employee is preparing to leave the company, his activity and access to the network\/system should be monitored. Once the employee leaves, the company should ensure that his access to the network has been terminated. It\u2019s also important to check information on his computer and documents transferred on remote devices.<\/li>\n<figure id=\"attachment_8916\" aria-describedby=\"caption-attachment-8916\" style=\"width: 150px\" class=\"wp-caption alignright\"><a href=\"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/03\/Data-Security-Lock.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/03\/Data-Security-Lock-150x150.jpg?resize=150%2C150\" alt=\"Data Security Lock\" title=\"Data Security Lock\" width=\"150\" height=\"150\" class=\"size-thumbnail wp-image-8916\" srcset=\"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/03\/Data-Security-Lock.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/03\/Data-Security-Lock.jpg?resize=120%2C120&amp;ssl=1 120w, https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/03\/Data-Security-Lock.jpg?zoom=2&amp;resize=150%2C150&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/03\/Data-Security-Lock.jpg?zoom=3&amp;resize=150%2C150&amp;ssl=1 450w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><figcaption id=\"caption-attachment-8916\" class=\"wp-caption-text\">Data Security Lock<\/figcaption><\/figure>\n<li>Implement VPN (Virtual private network) to decrease hackers\u2019 attacks. VPNs allow remote access to the network and the information sent\/received is encrypted.<\/li>\n<li>Secure the network :\n<ul>\n<li><a href=\"https:\/\/www.amitbhawani.com\/blog\/free-antivirus-applications\/\">Install Antivirus on computers<\/a><\/li>\n<li>Do <a href=\"https:\/\/www.amitbhawani.com\/blog\/best-online-automatic-data-backup-tools\/\">backups periodically<\/a><\/li>\n<li>Use encryption<\/li>\n<li><a href=\"https:\/\/www.amitbhawani.com\/blog\/website-security\/\">Scan regularly for exploits<\/a><\/li>\n<\/ul>\n<\/li>\n<li> Install Internet filter to restrict access to web. Internet filters allows companies to block employees\u2019 access to inappropriate web pages and to reduce files\u2019 download that might slow down the network, expose the company to security threats and illegal activities.<\/li>\n<\/ol>\n<p>Companies are facing many challenges and if there is something that can be improved regarding the information\u2019s security why not doing it? In the end, information is critical for the business\u2019 growth.<\/p>\n<p><strong>Guest Writer<\/strong> : Elisabeta Ghidiu is a Marketing Assistant, Electronic Commerce Department for cyclope-series.com which offers a useful <a href=\"http:\/\/www.cyclope-series.com\/employee-surveillance\/employee-monitoring-software.html\">Cyclope Employee Monitoring Software<\/a> for Organizations in order to <a href=\"http:\/\/www.amitbhawani.com\/help\/topic\/suggest-free-employees-system-monitoring-software\">find the productivity<\/a> of their staff.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data leakage became a popular issue since technology has taken a decisive turn. Let\u2019s see first when data leak happens: When the network security is weak and the system gets hacked When the system crashes and there are no backups When employees are taking confidential data outside the company Employees are taking confidential data with [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":19654,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1299],"tags":[],"class_list":{"0":"post-8915","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"entry"},"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/12\/Data-Theft-Employees-Leak-150x150.jpg?fit=150%2C150&ssl=1","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":13530,"url":"https:\/\/www.amitbhawani.com\/blog\/backup-data-applications-android-phone-mybackup-pro\/","url_meta":{"origin":8915,"position":0},"title":"Backup data and Applications of Android phone &#8211; MyBackup Pro","author":"Chetan Bhawani","date":"August 26, 2010","format":false,"excerpt":"When you lose your phone, usually apart from the device, the entire data inside it would be gone too. If the data was confidential, there are ways by which you can wipe that entire data by either using the Norton smartphone security or any other remote management tool. But your\u2026","rel":"","context":"In &quot;Google Android&quot;","block_context":{"text":"Google Android","link":"https:\/\/www.amitbhawani.com\/blog\/category\/android\/"},"img":{"alt_text":"mybackup pro","src":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/08\/mybackup-pro.png?fit=480%2C800&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1433,"url":"https:\/\/www.amitbhawani.com\/blog\/notepad-files-security-software\/","url_meta":{"origin":8915,"position":1},"title":"Free Notepad Files Security Application","author":"Amit Bhawani","date":"September 19, 2008","format":false,"excerpt":"Dont you think your Notepad files are not secured because you dont have any password facility and the files can be accessed by anyone? Its time you can make a simple text file secured with all your confidential data within it encrypted and a software which does this possible would\u2026","rel":"","context":"In &quot;Tips &amp; Tweaks&quot;","block_context":{"text":"Tips &amp; Tweaks","link":"https:\/\/www.amitbhawani.com\/blog\/category\/tips-tweaks\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/12\/Notepad-Security-Files.png?fit=460%2C376&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":3212,"url":"https:\/\/www.amitbhawani.com\/blog\/make-money-data-entry\/","url_meta":{"origin":8915,"position":2},"title":"How to make money online with Data Entry","author":"Amit Bhawani","date":"January 30, 2009","format":false,"excerpt":"In this world of rat race and tough competition, all the employees of any organization are always overworked. They are always with the pressure of meeting deadlines and dealing with tough clients. Thus gradually it is becoming very challenging for the companies to deal with its day to day important\u2026","rel":"","context":"In &quot;Make Money Online&quot;","block_context":{"text":"Make Money Online","link":"https:\/\/www.amitbhawani.com\/blog\/category\/make-money-online\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/12\/Data-Entry-Home.jpg?fit=375%2C500&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1928,"url":"https:\/\/www.amitbhawani.com\/blog\/external-hard-drive-security-guide\/","url_meta":{"origin":8915,"position":3},"title":"External Hard Drive Security Guide","author":"Amit Bhawani","date":"October 30, 2008","format":false,"excerpt":"External Hard Drive Security is very important for taking up a strong backup for the purposes of taking up proper and sound information\u2019s\u2019 storage which can ensure your non destruction of your storage base. Sometimes, even when you have PH.D thesis on your laptop suddenly, when a hard drive crashes,\u2026","rel":"","context":"In &quot;Hard Drives&quot;","block_context":{"text":"Hard Drives","link":"https:\/\/www.amitbhawani.com\/blog\/category\/hard-drives\/"},"img":{"alt_text":"Hard Disk Drive Security","src":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/Images\/H\/hard-disk-drive-security.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":459,"url":"https:\/\/www.amitbhawani.com\/blog\/best-online-automatic-data-backup-tools\/","url_meta":{"origin":8915,"position":4},"title":"Best Online Automatic Data Backup Tools","author":"Amit Bhawani","date":"May 12, 2008","format":false,"excerpt":"Data Backup is very important in todays world because the data stored on your computer is very important and its very hard to recover it in case of corrupted files which may be formed due to bad clusters in your FAT\/NTFS File system There are several services available which can\u2026","rel":"","context":"In &quot;Hard Drives&quot;","block_context":{"text":"Hard Drives","link":"https:\/\/www.amitbhawani.com\/blog\/category\/hard-drives\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/12\/Backup-Online-Data-Tools.png?fit=408%2C233&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6475,"url":"https:\/\/www.amitbhawani.com\/blog\/free-undelete-files-software-to-recover-deleted-files\/","url_meta":{"origin":8915,"position":5},"title":"Free Undelete Files Software to Recover Deleted Files","author":"Guest Writers","date":"October 22, 2009","format":false,"excerpt":"Lost data? 01Recovery Undelete Files software can recover data loss on hard drives, memory cards, RAID, emails, and to other storage devices (flash drives, micro sd, enclosures) that you use on Windows. 01Recovery Undeleted Files provides the today\u2019s most sufficient document search engine using the easiest method in restoring all\u2026","rel":"","context":"In &quot;Software Reviews&quot;","block_context":{"text":"Software Reviews","link":"https:\/\/www.amitbhawani.com\/blog\/category\/software\/"},"img":{"alt_text":"Recover Deleted Files","src":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2009\/10\/Recover-Deleted-Files.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/posts\/8915","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/comments?post=8915"}],"version-history":[{"count":0,"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/posts\/8915\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/media\/19654"}],"wp:attachment":[{"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/media?parent=8915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/categories?post=8915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/tags?post=8915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}