Skip to main content

Tag: data leaks

Stop Medical Device Leaks

Medical imaging devices are a regulatory nightmare Medial imaging systems and insecure protocols are leaking millions of patient images and meta data onto the open internet. For an industry that is regulated like no other, it may come as a shock to many that the imaging platforms, management systems, and protocols used in healthcare are […]

Data Breach Prevention
How to Prevent Data Breaches

Unintended innovation consequences Recent business operational trends driven by digital transformation programs, movement to the cloud, and a remote workforce can put your critical data at great risk. Why? Confidential and sensitive data is outside the corporate security perimeter; thus, InfoSec teams no longer have end-to-end visibility nor control of data security. Data breach prevention […]

Find and Fix Data Leaks on Third-Party Servers – Stop Data Breaches

At CybelAngel, 94% of the data leaks that we find for our customers can be traced back to third parties. As companies embrace digital transformation, moving operations to the Cloud increases the effectiveness and efficiency of operations while expanding the attack surface and increasing the potential for a third-party data breach.   It makes sense that […]

Prevent Data Breaches from Hitting Your Bottom Line

Did you know that over 90% of data leaks we find and fix are in the cloud?  This means that outside our clients’ security perimeter, we detect data that is left unsecured, probably by mistake.  Enterprises rely on employees, which can be undermined by human error.  If all employees paid detailed attention and all networks […]

Protect Your Enterprise from GitHub® Data Leaks

GitHub has become one of the most popular development platforms for both enterprises and individuals over the past ten years, as the software is relatively easy to use and new features are constantly being added. Unfortunately, it has also become a rich source for sensitive data leaks. According to ZDNet in early 2019, “A scan […]

Weekly Marketing/Analyst blog follow-up
Timeline of Incident Response to Data Leak

Ms. Amanda Geraud had been an auditor for years.  It has been her job to review business projects and summarize the actions taken, costs involved, as well as  benefits or losses to her employer.   Today felt no different than so many others before, when she had to explain the chain of events leading to preventable […]