9 Ways to Prevent Information Leakage
Although the advent of the Internet has made information management more important than ever, there have been many cases of information leaks due to delays in response. When information leaks occur in a company, not only is the company's image tarnished, but it may also result in claims for damages and other problems that could affect the continued existence of the business.
In order to reduce the above risks, it is important to take measures in advance. This article therefore explains the key points of information leakage countermeasures and the main causes of information leaks.
Specific measures and points for information leaks
Companies manage a great deal of highly confidential information, and once leaked, the consequences are immeasurable, including loss of trust from business partners and payment of large amounts of compensation for damages. To prevent such a situation, take measures against information leaks by referring to the following points.
<Specific examples and key points of information leakage countermeasures
Subject
Specific examples and key points of countermeasures
Employees
Establish guidelines and rules
Conduct regular information security training
Restrict or prohibit information and equipment from being taken out or brought in
Introduce a system to prevent misdirected e-mails
Prohibit the easy abandonment or disposal of information
Prohibits careless public dissemination of information
Outsiders
Keep IDs, passwords, and other information strictly confidential
Install and update security software
Perform regular system updates and vulnerability checks
Information Leakage Countermeasures and Key Points for Employees
Establish guidelines and rules
In order to prevent human error, rules must be developed and implemented in accordance with company-wide guidelines. The policy indicated by management and the operational issues in the field should be reconciled in both directions. In doing so, it is a good idea to refer to the guidelines published by the Information-technology Promotion Agency, Japan (IPA).
Reference: "Guidelines for Information Security Measures of Small and Medium Enterprises, Third Edition" (Information-technology Promotion Agency, Japan)
Information security education should be conducted regularly.
It is also important to conduct regular information security training to increase employees' knowledge and awareness of information security. Regardless of the nature of their work, employees should always be aware of the risk of information leaks, which will lead to an increase in their security awareness. It is easier to avoid risks if all employees involved in the business are targeted for training, regardless of the type of contract.
Restrict or prohibit the taking out and bringing in of information and equipment
To prevent information leaks due to loss or theft, it is important to restrict or prohibit the taking out of information assets and the bringing in of personal belongings.
Operational rules should also be established in preparation for cases where taking out or bringing in information is unavoidable or when telework is introduced. Specifically, this may include obtaining permission from the responsible person, limiting the information and devices for which permission is granted, and so on.
Introduce a system to prevent misdirected e-mails.
To prevent information leakage due to misdirected e-mails or incomplete attachments, it is effective to introduce a system to prevent misdirected e-mails. The system is equipped with functions such as automatic sending after approval by the superior, automatic CC of the recipient, and reconfirmation before sending, and helps strengthen the information management system.
Prohibit easy abandonment or disposal of information.
To prevent the leakage of confidential information, it is necessary to prohibit the easy abandonment or disposal of information. If information is left in a state where it can be accessed by anyone, or if information is disposed of in a state where it can be retrieved or read, it may be used by a malicious third party.
Establish rules such as not leaving documents and computers visible to outside parties when away from the office, and physically destroying electronic media and credit cards when disposing of them.
Prohibit inadvertent public disclosure of information.
Even if information is handled and disposed of properly, there are cases in which an employee's unspoken comments can lead to information leaks. Specifically, there may be cases where information obtained within the company is leaked through social networking sites, blogs, or in conversations with employees of other companies. Therefore, it is important to instruct employees to ensure confidentiality when conducting in-house training on information security.
Back to Table of Contents
Information Leakage Countermeasures and Key Points for Outsiders
Strictly manage information such as IDs and passwords
To avoid increasingly sophisticated external attacks, it is important to strengthen ID and password management. Thoroughly implement basic measures such as not using easy-to-guess character strings such as names, not using them repeatedly, and not managing them in locations that are visible from the outside.
Install and update security software.
Security software is an effective measure to prevent personal information leaks due to cyber-attacks, as it can deal with new methods that are difficult to deal with using standard OS functions, thereby reducing the risk of security incidents. It is also important to update the definition files to keep up with the ever-evolving methods and viruses.
Regularly update your system and check for vulnerabilities.
External attacks often target vulnerabilities in systems and applications. Therefore, to prevent information leaks by outsiders, system updates and vulnerability checks must be performed on a regular basis.
In the unlikely event that a vulnerability is discovered, after confirming the degree of danger and impact, take appropriate action by installing new security tools or suspending or modifying the use of the system.
Back to Table of Contents
Major Causes and Incidents of Information Leakage
The main causes of information leaks can be categorized as human error or intentional misconduct by internal staff and malicious attacks from outside. Here, we provide specific examples of each and the causes of occurrence.
<Causes, sources, and contributing factors for information leaks
Classification
Main cause
Source
Cause of Occurrence
Internal
Human error
Lost or misplaced
Careless conversations or social networking
Mishandling of e-mails or systems
Full-time employees
Retirees
Outsourcing
Part-time workers, part-timers, etc.
Contractors, etc.
Carelessness
Lack of knowledge, etc.
Intentional
Unauthorized removal
Unauthorized manipulation
Economic reasons
Economic reasons, etc.
External
Malicious attacks
Cyber attacks
Malware infection
Eavesdropping or theft
Single or organized crime
Single or organized criminals
Domestic/international, etc.
Information leakage due to internal human error
Information leaks due to internal human error are mainly caused by misplaced or lost recording media such as PCs, documents, and USB memory sticks, as well as mishandling of e-mails such as wrong destinations or attached files.
Information can also be leaked due to careless conversations in public places. For example, it is possible that a third party may have heard your conversation in the lounge of an office building, in an elevator, in a café, or in a pub, so be careful. Statements such as, "Our company plans to go public soon ......," or "Next year's new product will have 00 technology ......" should be avoided.
Other potential sources of information leaks include inadvertent transmission on social networking sites, such as posting confidential information prior to its release or personal information about customers. Even if anonymous, be aware of the risk of identifying the sender and the organization to which the sender belongs from the content of the message.
Internal Intentional Leakage of Information
Internal intentional information leakage can be caused by information being taken out of the company by a retiree. This may be due to financial reasons or distrust or dissatisfaction with the organization.
Information leakage due to external attack
Typical causes of information leaks due to external attacks are unauthorized access and malware infection. Malware refers to malicious programs or software that cause terminal malfunctions or information leaks. It causes leakage of personal and customer information, misuse of IP addresses, and other occurrences. Please also be aware of cases where information leaks are caused by theft through office eavesdropping or illegal entry.
Back to Table of Contents
How to Respond and Procedures to Follow in the Event of an Information Leak
In the event of an information leak, immediate action is required to minimize the damage. This section provides a step-by-step explanation of how to respond in the event of an information leak.
Step 1: Confirmation of the actual situation and immediate reporting
First, immediately report any signs or effects of an information leak to the person in charge. Establish a response system centered on the person in charge, as well as the policy and details of the primary response. It is important not to delete e-mails or files or perform any other unintentional operations so as not to erase evidence that may provide clues to the cause of the leak.
Step 2: Initial response to prevent secondary damage
Next, take emergency measures to prevent the spread of information leaks and secondary damage. Measures such as shutting down the network or suspending services will be considered. In the event of a personal information leak, the affected party may be contacted and asked to change their password or stop using the service.
Step 3: Cause Investigation and Information Disclosure
The next step is to investigate the cause of the information leak; from a 5W1H perspective, investigate the facts related to the information leak and try to secure evidence. When countermeasures have been clarified, companies are required to promptly disclose the information to reduce the number of similar cases of damage.
Step 4: Reporting to the relevant authorities and making public announcement
The next step is to consider whether or not a report or public announcement to business partners, consumers, and relevant ministries and agencies is necessary. If transaction or personal information has been leaked, unless there is a specific reason to the contrary, the basic rule is to notify business partners and the individual concerned, apologize, and alert them to the possibility of secondary damage.
If individual notification is difficult due to the wide range of people involved or the number of damages, a public announcement may be made on the company's website or at a press conference. If a crime is suspected, such as a request for money or unauthorized access, promptly report the incident to the police.
Step 5: Consider and implement measures to prevent recurrence
Finally, measures to prevent recurrence of information leaks are examined and implemented. Also, based on the investigation report, compensation for damages to the suspect and disciplinary measures for internal staff are considered in this step.
Reference] "Key Points for Responding to Information Leakage" (Information-technology Promotion Agency, Japan)
Back to Table of Contents
Reduce Security Risks by Implementing Information Leakage Countermeasures
Information leaks are a risk that can occur in any company. Since there are various possible causes, such as inadvertence by internal employees or attacks from outside, comprehensive measures must be taken to prevent leaks before they occur. Take this opportunity to implement information leakage countermeasures and reduce security risks.
Please use the "learningBOX ON" information security training program to familiarize yourself with information leakage countermeasures within your company. LearningBOX ON" is a service that makes it easy to add training content required by companies to learningBOX, an e-learning creation and management system. You can easily design your own original learning courses by combining them with content created in-house.
We hope you will make use of this service for your company's internal training programs, as content for information security and compliance training is available free of charge.
▼Here's another recommendation! Also read.
Back to Table of Contents