Current location - Loan Platform Complete Network - Big data management - Several ways of enterprise data leakage, trade secret leakage
Several ways of enterprise data leakage, trade secret leakage
From a general point of view, basically can be divided into two categories from internal and external. The causes of leakage are internal leakage, internal loss of confidentiality and external theft. Subdivided, there should be the following seven cases:

1. Internal staff leaving the copy to take away information leakage

This type of situation has the highest probability of occurrence. According to the survey, Chinese enterprises employees leaving the copy of information to more than 70%. At the time of departure, research and development personnel to take away the results of research and development, sales staff to take away the enterprise customer information, and even financial personnel will be the core of the enterprise's financial information copy to take away.

2. Internal personnel unintentional leaks and malicious leaks

International personnel in the Internet accidentally in the virus or Trojan horse, the computer stored on the loss of important information is also very much the case. Due to the proliferation of viruses and Trojans, the risk of corporate leakage is increasing. And part of the bad employees know is the enterprise confidential information, but also through QQ, MSN, e-mail, blogs or other network forms, the information sent to the outside of the enterprise, this targeted leakage behavior, resulting in harm is also quite serious.

3. External competitors to steal secrets

Competitors use the way to buy, buy through the enterprise insiders, so that insiders to send important information to the competitors, thus stealing the confidentiality of the situation is also very much. This approach directly damages the core assets of the enterprise and brings a fatal blow to the enterprise.

4. Hackers and spies stealing secrets

At present, many international and domestic hackers and spies are stealing all kinds of important information in China through endless technical means, which has become a great threat to China's information security. Although many companies have deployed firewalls, antivirus software, intrusion detection and other systems, but for highly intelligent criminals, these defensive measures are often virtually useless.

5. Loss of confidentiality of internal document authority

Inside the unit, often confidential information will be divided into secret, confidential and top secret and other different levels of confidentiality. Generally speaking, according to the status of the personnel in the unit and the different departments, their contact and knowledge of the information is also different. However, the current division of authority for classified information in most units is quite loose, resulting in personnel who do not have the appropriate classification being informed of highly classified information.

6. Loss of storage devices and maintenance of loss of confidentiality

Mobile storage devices, such as laptops, mobile hard drives, cell phone memory cards, digital camera/camcorder, etc., once lost, maintenance or scrapped, the stored data is often exposed. With the widespread use of mobile storage devices, the rise of home office, business travelers, a large number of transactions will inevitably use mobile storage devices. Therefore, the loss and maintenance of mobile storage devices leading to leakage is also one of the main reasons for the current leakage incidents.

7. Loss of confidentiality through uncontrolled release of external information

Between two or more cooperative units, due to the frequent occurrence of information interactions, classified information may also be leaked, resulting in the cooperation of the party does not have the authority of the personnel to obtain classified information. Even confidential information flows to a third party in a competitive relationship. Therefore, the confidential information sent to the outside must be controlled to prevent the outgoing information out of control and lead to loss of confidentiality.