A data leak involves sensitive information inadvertently exposed, typically due to human error. This can occur while data is at rest in a database or in motion between data storage locations.
The most common cause of a data leak is an employee misusing or accidentally sharing data. This can include saving data to an unsecured location, leaving sensitive information on an email sent outside the company or falling victim to a phishing or ransomware attack.
Lost or stolen devices can also lead to a data leak, including external USB storage devices and mobile devices that are accessed by employees remotely. These tools are needed to perform work functions, but they can also be used by cybercriminals to enter the organization’s security perimeter.
Additionally, misconfigured cloud infrastructure is another significant source of data exposure. A recent example involved an Amazon Web Services S3 bucket that was set to public access and revealed personal data affecting UK councils, military members, and citizens.
The most damaging types of data are personally identifiable information (PII) and confidential business information (CBI). PII is a key component of many cyberattacks, such as identity theft and scams. PII includes names, phone numbers, physical addresses, and social security numbers. CBI, meanwhile, can be used to target businesses and steal intellectual property or financial information. Examples of this include the theft of trade secrets, documentation for scrapped or unfinished products, and design plans for upcoming projects. When these assets are exposed, they can be sold to competitors or used to demand a ransom from the victimized company.