• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  The threat of data loss at unsecured endpoints
Threat of data loss
19 June 2017

The threat of data loss at unsecured endpoints

Written by Seqrite
Seqrite
Security
Estimated reading time: 3 minutes

Data theft or loss by employees is a reality no one can deny. The cost of one such internal breach at Bank of America was 10 million USD. According to a study by Verizon, almost 20% of the all the data breaches are considered insider misuse events where an employee may have stolen the company’s confidential information to profit from it.

Who can cause the internal data leaks?

It is not just the employees who are directly responsible for the loss of data from internal sources. Many times an unauthorized person may steal the data from an unattended workstation. This often happens in a shop floor situation where the operator may need to leave the machine for a short period of time without locking the access. This short period of time may be enough for someone (a janitor or another employee) to plug in a USB drive to steal the valuable information from that terminal. It is not only the threat of data theft that is of concern here. Unauthorized devices may be infected with viruses and malware that may sneak into the company’s network and spread havoc across the organization. In fact, a targeted malware attack can be made using such devices and making use of social engineering with unsuspecting employees. And not only USB drives but CD, DVD, and other media can also be utilized for this purpose.

Where can these internal leaks occur?

The threat of Data theft from within the company’s network is compounded by the unsecured end points such as USB drives. These devices make it easy to copy data onto them, without anyone noticing it. These days, it ‘s hard to control the entry of mass storage device into the premises. The popularity of laptops in the corporate world is not making this any easier. In fact, the combination of smartphones and laptops has multiplied the problem several times. They can connect via not only USB but also Bluetooth and Wi-Fi using freely available apps for data transfer between the two. Thus it is not sufficient to just block the USB device. Other channels of inter-device data transfer such as Bluetooth and Wi-Fi of each laptop, also need to be secured to ensure data loss prevention across the organization.

The solution

Endpoint protection systems, such as Seqrite Endpoint Security, provide advanced device control features to protect the enterprise against unauthorized access via internal devices such as USB drives, CD/DVD-ROMS etc. to ensure that data leaks are stopped and unapproved data does not enter the network. The solution allows for the creation of security policies with varying rights. It can completely block the access to USB drive or allow read-only access to prevent any company data from getting copied onto the drive. The exceptions can be added to allow particular employee or group to have full access to USB device to ensure the smooth running of business operations. The advanced device control feature secures all USB devices and also other internal devices such as Bluetooth and webcams so that oblique methods are not allowed to transfer data.

The solution also detects and scans the endpoints for any confidential data present in the removable devices. Seqrite Endpoint Security also allows temporary access to removable devices based on policy. It implements a One Time Password based system to ensure that access remains temporary and can only be used by the authorized person.

The protection software is capable of sending notifications the moment an unauthorized device is accessed. The solution provides dashboards and detailed reports with information on devices that violated the policy and the users who breached the same, along with their name, time information and network location of the breach.

Data loss at internal endpoints does not seem obvious to the organizations. After all, the organizations need to entrust employees with confidential data, if they have to succeed in their role. However, repeated attempts of data stealing prove that employees can and do misuse the information they are trusted with. To reduce and practically eliminate the chance of data leaving the organization through endpoints such as USB and Bluetooth, Seqrite’s Endpoint Protection serves as an excellent solution.

Seqrite helps businesses simplify IT security and maximize business performance. To know more about our products and services visit our website. 

 Previous PostImportance of Security Threat Intelligence
Next Post  Protecting your Enterprise from Phishing Attacks
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Is your Router exposed to cyber threats

    Is your router exposed to cyber threats? Here is how to safeguard it.

    July 30, 2020
  • Snake ransomware stings to spread its venom in the veins of enterprise networks.

    Snake Ransomware brings impending doom to enterprise networks

    July 10, 2020
  • APT harbingers are using Honey Traps to attack Indian Defence.

    Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

    July 8, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021
  • How can EdTech companies deal with rising security challenges?

    How can EdTech companies deal with rising security challenges?

    December 24, 2020

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (274) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (54) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.