{"id":7603,"date":"2016-12-30T08:50:18","date_gmt":"2016-12-30T07:50:18","guid":{"rendered":"https:\/\/edorteam.com\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/"},"modified":"2021-08-25T11:35:22","modified_gmt":"2021-08-25T09:35:22","slug":"avoid-information-leakage-one-of-the-biggest-risks-for-companies","status":"publish","type":"post","link":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/","title":{"rendered":"Avoid information leakage, one of the biggest risks for companies"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.8.1&#8243; custom_padding=&#8221;0px||||false|false&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.8.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;0px|0px||0px|false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Evitar fugas de informaci\u00f3n&#8221; _builder_version=&#8221;4.9.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]The<strong> information leakage<\/strong> it is one of the biggest risks for companies. Implement protocols for<strong> Data Protection<\/strong> and corrective measures is essential for its prevention.<\/p>\n<p>Our company is at risk for the mere fact of storing data. Unauthorized access to this information can cause our data to be damaged or stolen.<\/p>\n<p>Since the data is stored on computer equipment, which can be found in our organization, or on third-party equipment, we must establish the appropriate measures to guarantee its security. It is essential that the staff of our organization must take responsibility for the containment and prevent the leakage of this data.<\/p>\n<p>When the data is delegated to third parties or data transfers are made over non-secure networks such as the Internet, we will have the obligation to ensure that these companies have the appropriate security protocols and measures.<\/p>\n<p>These data that we are mentioning may take the form of:<\/p>\n<ul>\n<li>Client list.<\/li>\n<li>Employee listings.<\/li>\n<li>Intellectual property.<\/li>\n<li>Rates or offers for our clients.<\/li>\n<li>Strategic plans of our company.<\/li>\n<li>Payroll.<\/li>\n<li>Bank accounts<\/li>\n<li>Others.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Tecnolog\u00eda y seguridad&#8221; _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; locked=&#8221;off&#8221;]<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 ez-toc-wrap-left-text counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title ez-toc-toggle\" style=\"cursor:pointer\">Contenido del art\u00edculo<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #000000;color:#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #000000;color:#000000\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#Technology_and_security\" >Technology and security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#Data_containment\" >Data containment<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#Global_LOPD_solution\" >Global LOPD solution<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#Data_protection_availability_and_integrity\" >Data protection, availability and integrity<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#Get_your_company_to_be_GDPR_compliant\" >Get your company to be GDPR compliant<\/a><\/li><\/ul><\/nav><\/div>\n<h4><span class=\"ez-toc-section\" id=\"Technology_and_security\"><\/span>Technology and security<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Technology and safety are two terms that can be difficult to balance for an agile work environment. If too many security restrictions are put in place, we will hamper the end user&#8217;s job. On the other hand, if we are very lax in security, the data could become accessible from an external network. This balance should preserve and protect the<strong> confidentiality<\/strong> , the<strong> availability<\/strong> and<strong> integrity<\/strong> of the information.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(190,198,206,0.1)&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;|0px||0px|false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Implementation and implementation of security measures&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%229%%&#8221; _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221;]More and more companies are becoming aware of the need to carry out a strategic plan around the security of their data.<\/p>\n<p>Due to this trend and requirements, our technology department or the company to which we entrust this task, must implement these measures according to the type of data and the importance of these, prioritizing avoiding information leakage.<\/p>\n<p>The Spanish state has developed the Organic Law for the Protection of Personal Data (LOPD), with the aim of providing regulation on personal data. This mandatory law is a guide that, once applied, will provide a solid foundation to prevent information leaks.[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;|0px||0px|false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; locked=&#8221;off&#8221;]The problem lies at the time of implementing the measures required by the LOPD. The operating system of the work desks of most Spanish companies, Windows, cannot implement part of the requirements in such a way that it can be inspected in an agile way.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;|0px||0px|false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/edorteam.com\/wp-content\/uploads\/etseguridad-positivo-simple.png&#8221; title_text=&#8221;simple-positive-etsecurity&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; hover_enabled=&#8221;0&#8243; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijk4NCJ9fQ==@&#8221; _dynamic_attributes=&#8221;url&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text admin_label=&#8221;Contenci\u00f3n de datos&#8221; _builder_version=&#8221;4.9.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Data_containment\"><\/span>Data containment<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>In order to make this task easier for system administrators, at Edorteam<strong> we have developed<\/strong><a href=\"\/et-seguridad-software-productividad-empresa\/\"> ET Security<\/a> to cover confidentiality needs, according to the level of protection necessary for each case:<\/p>\n<ul>\n<li>Identification requirement when running certain programs, ideal for environments with<strong> shared teams<\/strong> .<\/li>\n<li>Monitoring access to documentation in shared environments. From a shared location, get to know<strong> what files<\/strong> they are being<strong> accessed<\/strong> from which user and which equipment is being used to access.<\/li>\n<li>Restriction of use of USB devices. In the equipment that is necessary,<strong> block access<\/strong> to removable USB devices to prevent data leakage.<\/li>\n<li><strong>Screenshots<\/strong> to control user activity.<\/li>\n<li>Activity log in applications, captures the name of the active window to obtain a<strong> activity Register<\/strong> global.<\/li>\n<\/ul>\n<p>With the application of all these control points in your computer systems, you will be able to prevent the leakage of information from within your company or organization.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.8.1&#8243; background_color=&#8221;#0073ce&#8221; custom_padding=&#8221;0px||0px&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;800ms&#8221; animation_intensity_slide=&#8221;5%&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.9.1&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; max_width=&#8221;1800px&#8221; custom_margin=&#8221;0px||0px&#8221; custom_padding=&#8221;0px||0px|&#8221; hover_enabled=&#8221;0&#8243; use_custom_width=&#8221;on&#8221; width_unit=&#8221;off&#8221; custom_width_percent=&#8221;90%&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.1&#8243; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0073ce&#8221; header_2_font_size=&#8221;1.6em&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;12%|8%|12%|8%|true|true&#8221; hover_enabled=&#8221;0&#8243; header_font_size_phone=&#8221;34px&#8221; header_font_size_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Global_LOPD_solution\"><\/span>Global LOPD solution<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Our flagship software solution for its unique security and productivity features on the market. If your company has already made the LOPD but does not protect its computer equipment with the requirements explained above, it is NOT complying with the law.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijk4NCJ9fQ==@&#8221; button_text=&#8221;Read more&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.9.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; background_layout=&#8221;dark&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.1&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; background_image=&#8221;https:\/\/edorteam.com\/wp-content\/uploads\/software-control-accesos-registro-lopd.jpg&#8221; custom_padding=&#8221;|||&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijk4NCJ9fQ==@&#8221; hover_enabled=&#8221;0&#8243; custom_padding__hover=&#8221;|||&#8221; background__hover_enabled=&#8221;on|hover&#8221; use_background_color_gradient__hover=&#8221;off&#8221; background_color_gradient_start__hover=&#8221;rgba(0,70,140,0.75)&#8221; background_color_gradient_end__hover=&#8221;rgba(0,115,206,0.75)&#8221; background_color_gradient_overlays_image__hover=&#8221;on&#8221; background_blend__hover=&#8221;multiply&#8221; background_color__hover=&#8221;rgba(0,115,206,0.5)&#8221; background_enable_color__hover=&#8221;on&#8221; title_text=&#8221;software-control-accesos-registro-lopd&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.8.1&#8243; height=&#8221;250px&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;|0px||0px|false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/edorteam.com\/wp-content\/uploads\/etbackup-positivo-simple.png&#8221; title_text=&#8221;etbackup-positive-simple&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; hover_enabled=&#8221;0&#8243; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NTMifX0=@&#8221; _dynamic_attributes=&#8221;url&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text admin_label=&#8221;Disponibilidad e integridad de datos&#8221; _builder_version=&#8221;4.9.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Data_protection_availability_and_integrity\"><\/span>Data protection, availability and integrity<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>It is important to have a backup plan in place to ensure the availability and integrity of data in our business environment. If any type of attack or disaster occurs, it is important to prioritize data protection.<\/p>\n<p>At Edorteam we can provide this with the software<a href=\"https:\/\/edorteam.com\/en\/et-backup-cloud-backup\/\"> ET Backup<\/a> , with the option of a 45-day trial period. This allows you to:<\/p>\n<ul>\n<li>Recovery mechanisms in case of data damage. Either by human interaction or an error in the data storage system of our applications.<\/li>\n<li>Set up multiple computers under the same account<\/li>\n<li>Have a<strong> replicated remote copy<\/strong> with all the guarantees of recovery of your data.<\/li>\n<li>Copy of most information systems\n<ul>\n<li>File System<\/li>\n<li>SQL Server<\/li>\n<li>MySQL<\/li>\n<li>Oracle<\/li>\n<li>Virtual machines<\/li>\n<li>Exchange servers and \/ or mailboxes<\/li>\n<\/ul>\n<\/li>\n<li>Compatible with Linux, Mac OS and Windows, so all your information systems remain protected<\/li>\n<li><strong>Maximum security<\/strong> , encrypted and compressed backups.<\/li>\n<li>Low data transfer volume. The data is compressed and only the modifications are transferred, being an incremental copy.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.8.1&#8243; background_color=&#8221;#0073ce&#8221; custom_padding=&#8221;0px||0px&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;800ms&#8221; animation_intensity_slide=&#8221;5%&#8221; locked=&#8221;off&#8221; global_module=&#8221;4101&#8243;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.8.1&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; max_width=&#8221;1800px&#8221; custom_margin=&#8221;0px||0px&#8221; custom_padding=&#8221;0px||0px|&#8221; use_custom_width=&#8221;on&#8221; width_unit=&#8221;off&#8221; custom_width_percent=&#8221;90%&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.8.1&#8243; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0073ce&#8221; header_2_font_size=&#8221;1.6em&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;12%|8%|12%|8%|true|true&#8221; header_font_size_phone=&#8221;34px&#8221; header_font_size_last_edited=&#8221;off|phone&#8221;]<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Get_your_company_to_be_GDPR_compliant\"><\/span>Get your company to be GDPR compliant<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Since 2018, all European Union companies must be GDPR compliant. Although data protection laws already existed in Spain, GDPR introduces new regulations so therefore both must be applied.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIwMDcifX0=@&#8221; button_text=&#8221;We can help you&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.8.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; background_layout=&#8221;dark&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.8.1&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; background_image=&#8221;https:\/\/edorteam.com\/wp-content\/uploads\/adecuacion-norma-rgpd-empresa.jpg&#8221; custom_padding=&#8221;|||&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIwMDcifX0=@&#8221; custom_padding__hover=&#8221;|||&#8221; background__hover_enabled=&#8221;on|hover&#8221; use_background_color_gradient__hover=&#8221;off&#8221; background_color_gradient_start__hover=&#8221;rgba(0,70,140,0.75)&#8221; background_color_gradient_end__hover=&#8221;rgba(0,115,206,0.75)&#8221; background_color_gradient_overlays_image__hover=&#8221;on&#8221; background_blend__hover=&#8221;multiply&#8221; background_color__hover=&#8221;rgba(0,115,206,0.5)&#8221; background_enable_color__hover=&#8221;on&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.8.1&#8243; height=&#8221;250px&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The information leakage it is one of the biggest risks for companies. Implement protocols for Data Protection and corrective measures is essential for its prevention. Our company is at risk for the mere fact of storing data. Unauthorized access to this information can cause our data to be damaged or stolen. Since the data is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6114,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[173,110,106],"tags":[117,201,202,111],"class_list":["post-7603","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-software","category-cybersecurity","category-data-protection-and-rgpd","tag-access-control","tag-information-leakage","tag-labor-productivity","tag-office-activity-log"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information leakage and data protection - Edorteam<\/title>\n<meta name=\"description\" content=\"Information leakage is one of the biggest risks for companies. Implementing data protection protocols and corrective measures is essential.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information leakage and data protection\" \/>\n<meta property=\"og:description\" content=\"Information leakage is one of the biggest risks for companies. Implementing data protection protocols and corrective measures is essential.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/\" \/>\n<meta property=\"og:site_name\" content=\"Edorteam\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/edorteam\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-30T07:50:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-25T09:35:22+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.edorteam.com\/wp-content\/uploads\/2016\/12\/castle-1083570_960_720.png\" \/>\n<meta name=\"author\" content=\"Edorteam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Information leakage and data protection\" \/>\n<meta name=\"twitter:description\" content=\"Information leakage is one of the biggest risks for companies. Implementing data protection protocols and corrective measures is essential.\" \/>\n<meta name=\"twitter:image\" content=\"http:\/\/www.edorteam.com\/wp-content\/uploads\/2016\/12\/castle-1083570_960_720.png\" \/>\n<meta name=\"twitter:creator\" content=\"@edorteam\" \/>\n<meta name=\"twitter:site\" content=\"@edorteam\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Edorteam\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/\"},\"author\":{\"name\":\"Edorteam\",\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/person\/8d561d676383bddf2086b1de4aec37b6\"},\"headline\":\"Avoid information leakage, one of the biggest risks for companies\",\"datePublished\":\"2016-12-30T07:50:18+00:00\",\"dateModified\":\"2021-08-25T09:35:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/\"},\"wordCount\":1920,\"commentCount\":9,\"publisher\":{\"@id\":\"https:\/\/edorteam.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/edorteam.com\/wp-content\/uploads\/evitar-fuga-de-informacion.jpg\",\"keywords\":[\"access control\",\"information leakage\",\"labor productivity\",\"office activity log\"],\"articleSection\":[\"Business software\",\"Cybersecurity\",\"Data protection and RGPD\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/\",\"url\":\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/\",\"name\":\"Information leakage and data protection - Edorteam\",\"isPartOf\":{\"@id\":\"https:\/\/edorteam.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/edorteam.com\/wp-content\/uploads\/evitar-fuga-de-informacion.jpg\",\"datePublished\":\"2016-12-30T07:50:18+00:00\",\"dateModified\":\"2021-08-25T09:35:22+00:00\",\"description\":\"Information leakage is one of the biggest risks for companies. Implementing data protection protocols and corrective measures is essential.\",\"breadcrumb\":{\"@id\":\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#primaryimage\",\"url\":\"https:\/\/edorteam.com\/wp-content\/uploads\/evitar-fuga-de-informacion.jpg\",\"contentUrl\":\"https:\/\/edorteam.com\/wp-content\/uploads\/evitar-fuga-de-informacion.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/edorteam.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Avoid information leakage, one of the biggest risks for companies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/edorteam.com\/en\/#website\",\"url\":\"https:\/\/edorteam.com\/en\/\",\"name\":\"Consultor\u00eda Compliance y protecci\u00f3n de datos\",\"description\":\"Empresa de Ciberseguridad y Protecci\u00f3n de Datos\",\"publisher\":{\"@id\":\"https:\/\/edorteam.com\/en\/#organization\"},\"alternateName\":\"Edorteam\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/edorteam.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/edorteam.com\/en\/#organization\",\"name\":\"Edorteam | Cibersecurity services and data protection company\",\"alternateName\":\"Edorteam\",\"url\":\"https:\/\/edorteam.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/edorteam.com\/wp-content\/uploads\/cropped-favicon.png\",\"contentUrl\":\"https:\/\/edorteam.com\/wp-content\/uploads\/cropped-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Edorteam | Cibersecurity services and data protection company\"},\"image\":{\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/edorteam\/\",\"https:\/\/x.com\/edorteam\",\"https:\/\/www.linkedin.com\/company\/edorteam\/\",\"https:\/\/www.instagram.com\/edorteam\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/person\/8d561d676383bddf2086b1de4aec37b6\",\"name\":\"Edorteam\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g\",\"caption\":\"Edorteam\"},\"sameAs\":[\"http:\/\/edorteam.com\"],\"url\":\"https:\/\/edorteam.com\/en\/author\/web_edorteam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information leakage and data protection - Edorteam","description":"Information leakage is one of the biggest risks for companies. Implementing data protection protocols and corrective measures is essential.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/","og_locale":"en_US","og_type":"article","og_title":"Information leakage and data protection","og_description":"Information leakage is one of the biggest risks for companies. Implementing data protection protocols and corrective measures is essential.","og_url":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/","og_site_name":"Edorteam","article_publisher":"https:\/\/www.facebook.com\/edorteam\/","article_published_time":"2016-12-30T07:50:18+00:00","article_modified_time":"2021-08-25T09:35:22+00:00","og_image":[{"url":"http:\/\/www.edorteam.com\/wp-content\/uploads\/2016\/12\/castle-1083570_960_720.png","type":"","width":"","height":""}],"author":"Edorteam","twitter_card":"summary_large_image","twitter_title":"Information leakage and data protection","twitter_description":"Information leakage is one of the biggest risks for companies. Implementing data protection protocols and corrective measures is essential.","twitter_image":"http:\/\/www.edorteam.com\/wp-content\/uploads\/2016\/12\/castle-1083570_960_720.png","twitter_creator":"@edorteam","twitter_site":"@edorteam","twitter_misc":{"Written by":"Edorteam","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#article","isPartOf":{"@id":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/"},"author":{"name":"Edorteam","@id":"https:\/\/edorteam.com\/en\/#\/schema\/person\/8d561d676383bddf2086b1de4aec37b6"},"headline":"Avoid information leakage, one of the biggest risks for companies","datePublished":"2016-12-30T07:50:18+00:00","dateModified":"2021-08-25T09:35:22+00:00","mainEntityOfPage":{"@id":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/"},"wordCount":1920,"commentCount":9,"publisher":{"@id":"https:\/\/edorteam.com\/en\/#organization"},"image":{"@id":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#primaryimage"},"thumbnailUrl":"https:\/\/edorteam.com\/wp-content\/uploads\/evitar-fuga-de-informacion.jpg","keywords":["access control","information leakage","labor productivity","office activity log"],"articleSection":["Business software","Cybersecurity","Data protection and RGPD"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/","url":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/","name":"Information leakage and data protection - Edorteam","isPartOf":{"@id":"https:\/\/edorteam.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#primaryimage"},"image":{"@id":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#primaryimage"},"thumbnailUrl":"https:\/\/edorteam.com\/wp-content\/uploads\/evitar-fuga-de-informacion.jpg","datePublished":"2016-12-30T07:50:18+00:00","dateModified":"2021-08-25T09:35:22+00:00","description":"Information leakage is one of the biggest risks for companies. Implementing data protection protocols and corrective measures is essential.","breadcrumb":{"@id":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#primaryimage","url":"https:\/\/edorteam.com\/wp-content\/uploads\/evitar-fuga-de-informacion.jpg","contentUrl":"https:\/\/edorteam.com\/wp-content\/uploads\/evitar-fuga-de-informacion.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/edorteam.com\/en\/avoid-information-leakage-one-of-the-biggest-risks-for-companies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/edorteam.com\/en\/"},{"@type":"ListItem","position":2,"name":"Avoid information leakage, one of the biggest risks for companies"}]},{"@type":"WebSite","@id":"https:\/\/edorteam.com\/en\/#website","url":"https:\/\/edorteam.com\/en\/","name":"Consultor\u00eda Compliance y protecci\u00f3n de datos","description":"Empresa de Ciberseguridad y Protecci\u00f3n de Datos","publisher":{"@id":"https:\/\/edorteam.com\/en\/#organization"},"alternateName":"Edorteam","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/edorteam.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/edorteam.com\/en\/#organization","name":"Edorteam | Cibersecurity services and data protection company","alternateName":"Edorteam","url":"https:\/\/edorteam.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/edorteam.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/edorteam.com\/wp-content\/uploads\/cropped-favicon.png","contentUrl":"https:\/\/edorteam.com\/wp-content\/uploads\/cropped-favicon.png","width":512,"height":512,"caption":"Edorteam | Cibersecurity services and data protection company"},"image":{"@id":"https:\/\/edorteam.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/edorteam\/","https:\/\/x.com\/edorteam","https:\/\/www.linkedin.com\/company\/edorteam\/","https:\/\/www.instagram.com\/edorteam\/"]},{"@type":"Person","@id":"https:\/\/edorteam.com\/en\/#\/schema\/person\/8d561d676383bddf2086b1de4aec37b6","name":"Edorteam","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/edorteam.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g","caption":"Edorteam"},"sameAs":["http:\/\/edorteam.com"],"url":"https:\/\/edorteam.com\/en\/author\/web_edorteam\/"}]}},"_links":{"self":[{"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/posts\/7603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/comments?post=7603"}],"version-history":[{"count":0,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/posts\/7603\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/media\/6114"}],"wp:attachment":[{"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/media?parent=7603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/categories?post=7603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/tags?post=7603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}