Whether you call it corporate espionage, Intellectual Property theft, data leakage, or internal data risk, data exfiltration is the unauthorized movement of organization-owned data outside the organization’s permitted distribution and storage boundaries. Data exfiltration can be as simple as a leaked draft of a marketing memo or as complex as the chemical formulation of a pharmaceutical innovation or entire volumes of computer code, all of which can have disastrous consequences for an organization. Additionally, with more data stored on the cloud to conserve resources, facilitate remote work, and increase collaboration, the temptation to move that data outside the organization’s control continues to grow. Knowing what to watch for when it comes to data exfiltration is the first step to preventing loss.
The Threat is Real and It’s in the House
Blackhat hackers aren’t the only ones motivated to lift organizational data. Legitimate employees and contractors may also look to exfiltrate data for both malicious and seemingly innocuous reasons. A workaholic partner’s offline vacation in Bali may have them thinking that downloading sensitive organization data to their laptop is okay because it’s temporary and done for a seemingly valid purpose. A departing salesperson may believe that the contacts they’ve made working for one organization are fair game for their next job. And a contractor who may need to see the specifications for a highly confidential product in development may never consider that downloading product plans to his or her personal device is an unauthorized data transfer and not a task needed to perform the job. What do they do with that data once the contract or employment comes to an end? For these and many other reasons, organizations are forced to watch carefully for signs, situations, and events that could indicate a problem. Here’s our watchlist of data exfiltration indicators:
Any or all of these red flags may occur during normal operating hours, but off-hours and long holiday weekends seem to be a popular option for data exfiltration attempts. Once someone makes the decision to steal data, they’re going to try to do so when they are least likely to get caught – and if they realize that data security is lax at a particular time or on a specific day, that’s when they’ll make their data moves.
Smart data protection doesn’t have to bring productivity to a screeching halt. By keeping an eye out for the ten warning signs above, your organization can take the first steps toward stopping exfiltration before data walks out of the door – whether it’s going with a disgruntled employee, a careless contractor, or professional corporate interloper.