Page 1 of 1

What, where and how insiders most often leak

Posted: Mon Feb 10, 2025 8:28 am
by relemedf5w023
He also notes that if earlier the topic of moving to the cloud was practically “taboo” for information security specialists, now the use of cloud technologies is becoming the norm for many companies: “The Internet is becoming more reliable and end users have fewer and fewer questions about protecting cloud storage.”

Another trend: the growing popularity of information security outsourcing. “The trend for ‘information security as a service’ has long been visible abroad,” Lev Matveyev recalled. “It is coming to Russia late, but is developing rapidly. Now small and medium businesses are realizing that they cannot cope with data leakage problems on their own — they have neither the money nor the specialists with the necessary qualifications.”

80% of companies believe that internal information denmark mobile database incidents are more dangerous than external ones, SearchInform analysts note based on their own research. These incidents can be caused by both deliberate actions and neglect of basic rules of "information security hygiene". Moreover, unintentional actions of employees are the cause of information security incidents more often than intentional ones.

Source: “Research on the level of information security in Russian and CIS companies for 2020”, conducted by SearchInform
Source: “Research on the level of information security in Russian and CIS companies for 2020”, conducted by SearchInform
Head of the Information Security Department at SearchInform Alexey Drozd believes that SMBs are most exposed to information security risks. The reason is that they, as a rule, do not use specialized software that allows for automated control of employee actions and information movement. Therefore, managers cannot assess the likelihood of risks and the effectiveness of possible data protection measures.
To clarify the situation, SearchInform analysts summarized data on incidents in 50 SMB companies from six industries (wholesale and retail trade, manufacturing, services, IT, construction, fuel and energy complex) that were provided with IS outsourcing services. Data collected using DLP systems showed that during the study (it lasted several months), attempts to leak data were recorded at all 50 companies.