network securityresearch report

2021 data leakage situation analysis report From Flash message

The following is the 2021 data leakage situation analysis report From Flash message recommended by recordtrend.com. And this article belongs to the classification: research report, network security.

Through statistical analysis of domestic data leakage events in 2021, combined with the trend of global data leakage events, the report summarizes and analyzes the data leakage events, time, personnel, motivation, data sources and personal information leakage situation, presents the panorama of domestic data leakage situation in 2021 in multiple dimensions, and provides research, judgment and prediction of data leakage in 2022.

Data leakage:

In 2021, data leakage events showed a macro trend of continuous growth. Especially in the second half of 2021, the frequency of data leakage events was high, which had a certain relationship with the successive promulgation of data security law and personal information protection law during this period. Data security related laws and regulations clearly divided the security level of data, and the scenarios that were not aware of in the early stage were also included in the scope of data leakage.

Compared with 2020, the proportion of data leakage increased further in 2021, accounting for 80% of all types of data security events. Among them, data leakage events for profit account for the highest proportion, the same as 80%. It can be seen that data leakage is still driven by interests.

From the analysis of data leakage in the whole life cycle stage of data, it is found that in 2021, the highest proportion of data leakage occurred in the storage stage, nearly 40%, followed by the data use stage, accounting for nearly 30%, which belong to the high-risk stage of data leakage and the key stage of data security defense, which should be paid attention to.

Personal information disclosure:

Through the investigation and analysis of the situation of personal information leakage in major industries, it is found that the most serious personal information leakage is the Internet industry, accounting for 27%. The Internet industry has little substantive investment in data security construction, which has become the hardest hit area of personal information leakage. In addition, the leakage of personal information will flow to the black and gray industry through the underground market, causing secondary harm to the society.

This report evaluates the risk level of leaked personal information, which is divided into low hazard, medium hazard, high hazard and serious hazard. Such classification and classification will help the organization choose different levels of response measures according to the evaluation level.

Analysis summary:

Insufficient risk monitoring capacity: at present, most organizations have insufficient risk monitoring capacity for data leakage events, and fail to take emergency measures in time to reduce losses in case of data leakage events.

Data cloud trend: the new IT architecture such as cloud in business makes many organizations unable to understand their security risks in time. The data is stored outside the traditional network security boundary, and the responsibility boundary and security risk are vague for organizations.

Normalization of double extortion: data leakage events are accompanied by extortion attacks. The proportion of extortion attacks + data leakage events is increasing year by year. Attackers threaten to disclose sensitive data, which is more lethal than encrypted data.

Data security capability needs systematic construction: data security risks exist in the whole life cycle of data, and the loopholes in any link will lead to the failure of the whole data security protection system. If only relying on several isolated products for security protection, it can no longer deal with the current complex data leakage scenarios.

Suggestions on reducing data security risks

Strengthen the monitoring of data security risks in the whole process: finding and handling data security risks as soon as possible is the best way to reduce security incidents and losses. The risk monitoring of data security should focus on the three dimensions of security measure audit, operation behavior monitoring and system vulnerability monitoring, classify and classify the monitoring data, and carry out risk assessment and disposal.

Strengthen the protection of enterprise data on the cloud: putting data on the cloud without implementing protection measures is almost equivalent to directly disclosing the data. It is suggested that enterprises with data on the cloud classify and classify the data on the cloud, sort out the business data, clarify the data use scenarios, and improve the data security protection awareness of employees.

Pay equal attention to data leakage prevention and data extortion prevention: the traditional data extortion prevention scheme can not find data leakage behavior. A more perfect extortion prevention scheme not only prevents the data from being encrypted and unavailable, but also needs to be able to identify and prevent data leakage behavior to truly eliminate extortion.

Data classification and classification protection: data classification and classification is the premise and foundation of building a reasonable data security system. Data classification and classification can correctly evaluate the risks faced by data and formulate differentiated protection strategies.

Looking back on the multiple data leakage events in 2021, both in terms of the scale, quantity and impact of data leakage, there is an expanding trend, and the data leakage scene is becoming more and more complex and changeable. The flash information security and Strategy Research Center suggests that organizations should pay close attention to the data security situation, constantly investigate data security risks, make overall data security planning, and take preventive measures.

If you want to get the full report, you can contact us by leaving us the comment. If you think the information here might be helpful to others, please actively share it. If you want others to see your attitude towards this report, please actively comment and discuss it. Please stay tuned to us, we will keep updating as much as possible to record future development trends.

RecordTrend.com is a website that focuses on future technologies, markets and user trends. We are responsible for collecting the latest research data, authority data, industry research and analysis reports. We are committed to becoming a data and report sharing platform for professionals and decision makers. We look forward to working with you to record the development trends of today’s economy, technology, industrial chain and business model.Welcome to follow, comment and bookmark us, and hope to share the future with you, and look forward to your success with our help.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button