Bitglass, a Silicon Valley-based data protection company orchestrated an investigation to try and track where stolen data gets sent post-breach. The company discovered that in just a dozen days, a single stolen document traveled to twenty-two countries, was viewed over a thousand times and was downloaded around fifty times. Hot beds for where the information was accessed was northeastern Asia and western Africa.

This shows that stolen information and data can be shared with inappropriate parties with tremendous ease, and proves the need for security best practices to be implemented across a business or organization.

 


If you have any further questions regarding this information or are looking for advise on security best practices, email
W. Jackson Schultz – Security Consultant at jschultz@gravoc.com
or
Nate Gravel – Director of Information Security Practice at ngravel@gravoc.com

Related articles

 

Need-to-Know Privilege Explained

Need-to-Know Privilege Explained

In this blog post and video, we explore need-to-know privilege in cybersecurity and why it’s important for organizations to assign user permissions on a need-to-know basis.

read more

Pin It on Pinterest

Share This