Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeCII/OTEnsuring Lost Data Remains Unrecoverable

Ensuring Lost Data Remains Unrecoverable

Published on

spot_img

Companies are constantly at risk of exposing confidential data, and the consequences can be devastating. From employee health records and banking information to proprietary code and corporate secrets, it seems like there’s no limit to the sensitive material that can be inadvertently made public.

According to cybersecurity vendor ESET, 56% of decommissioned routers sold on the secondary market last month contained sensitive corporate material. This included router-to-router authentication keys, IPsec and VPN credentials and/or hashed passwords, credentials for connections to third-party networks, and connection details for some specific applications.

But it’s not just decommissioned hardware that poses a risk. Cloud-based vulnerabilities resulting from misconfigurations also put data at risk. For instance, confidential data like credentials and corporate secrets are often stored in GitHub and other software repositories. Attackers can use tools like MFASweep and Evilginx to search for multifactor authentication or bypasses for valid credentials, effectively finding access vulnerabilities to a variety of systems and applications.

Having both a hardware and software asset inventory is crucial for preventing these kinds of breaches. The hardware inventory should include all devices on the network for maintenance and compliance reasons, while a software asset inventory can protect cloud environments. Unstructured data is also an often-ignored source of risk. This includes data from nonrelational databases, data lakes, email, call logs, Web logs, and audio and video communications.

Sensitive data might not stay hidden, either. Oren Koren, co-founder and chief privacy officer of Tel Aviv-based Veriti.ai, says that service accounts are an often-ignored source of data that attackers can exploit, especially when databases on retired servers are left exposed. Even orphaned virtual machines (VMs) in popular cloud environments are often not decommissioned, leaving opportunities for attackers to create persistence within the cloud environment.

Recognizing the potential for vulnerabilities when sharing data can help remediate risks. Access intelligence is a group of policies that allows specific individuals to access data that exists within a platform, allowing for granular control over data permissions. Policies like these bolster third-party risk management (TPRM) by limiting access to data that partners don’t need and may otherwise unintentionally expose.

Documents like NIST’s Special Publication 800-80 Guidelines for Media Sanitation and the Enterprise Data Management (EDM) Council’s security frameworks can help companies define controls for identifying and remediating vulnerabilities related to decommissioning hardware and protecting data. By actively managing confidential data, companies can better protect themselves from exposure and the consequences that follow.

Source link

Latest articles

Payment with EC cards not accepted at Spar stores

The cyber attack on Spar and its TopCC stores left customers unable to pay...

DeepSeek R1 Jailbreaked for Malicious Purposes, Developing Keyloggers and Ransomware

The rise in the usage of generative artificial intelligence (GenAI) tools like OpenAI's ChatGPT...

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books.

In a recent development, the National Institute of Standards and Technology (NIST) has chosen...

Uncovering the DevOps Threats: 502 Incidents and 955 Hours of Disruptions in GitHub, GitLab, Atlassian, and Azure DevOps

The DevOps Threats Unwrapped report conducted by the GitProtect research team recently concluded that...

More like this

Payment with EC cards not accepted at Spar stores

The cyber attack on Spar and its TopCC stores left customers unable to pay...

DeepSeek R1 Jailbreaked for Malicious Purposes, Developing Keyloggers and Ransomware

The rise in the usage of generative artificial intelligence (GenAI) tools like OpenAI's ChatGPT...

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books.

In a recent development, the National Institute of Standards and Technology (NIST) has chosen...