Cybersecurity Trending

45% of Data Breaches are Committed by Someone on the Inside Using a Hard Copy

On July 22, Delaware-based G71 officially launches its new information security solution, LeaksID, which the company sees as a milestone in combatting a major problem that leads to corporate losses of billions of dollars each year. 

Sergey Voynov, G-71’s CEO

According to Breach Level Index 2018, a report by IBM and the Ponemon Institute, an estimated 57% of all data breaches in the world take place in the USA, and $7.9m is the average cost of damage from just a single data breach.

The bad guys aren’t the only threat. It’s also about your employees: Inside jobs are a major and rapidly growing source of breaches: 45% are committed by someone on the inside using a hard copy.

“While billions of dollars are spent to prevent cyber-attacks, in fact, common items in the workplace, such as a printer or a cellphone, pose more of a threat for leaks,” said Sergey Voynov, G-71’s CEO. “Your employees can easily make a photo of a commercial document, or print out confidential files.”

In addition, Employees with access to confidential information and commercial data often lack basic knowledge about the rules of safe handling of restricted information, and/or inadvertently ignore company security policies.

The bad guys aren’t the only threat. It’s also about your employees: Inside jobs are a major and rapidly growing source of breaches: 45% are committed by someone on the inside using a hard copy.

Whether or not the breach is malicious, LeaksID solves this problem by logging every file opening and allowing you to identify the following: Who viewed the document; When and where it happened; and Which gadget was used.

“LeaksID can’t stop someone on the inside from trying to steal your information property, but LeaksID guarantees that it can determine who that person was and when they did it,” said Voynov. 

Even if an employee made a hard copy or a photo of a document, LeaksID will find who did it. LeaksID works with any office document, drawing file, plan, scheme, graph, and etc. 

How does it work? Every single time the document is opened, LeaksID makes minuscule changes to it. These changes are invisible to the human eye, and so, the user doesn’t notice any difference between the original document and the modified one. These minuscule changes, however, are visible to LeaksID and help to identify who opened the document, where it happened and when.

LeaksID can be easily integrated into any company’s cyber and information security structure, and the options of deployment have open REST API, support HCAP (integration for DLP), IBM FileNet, OpenText Documentum, Alfresco, Nuxeo, and etc.

Author

Related posts

Smart Pension Welcomes Government’s New Fintech Strategy

Manisha Patel

Money2020: ATB Financial rolls out the world’s first full-featured virtual banking assistant on Facebook Messenger

Manisha Patel

Does GLISSER spell end of death by Powerpoint? (Please)

Manisha Patel