What is the cause of the data leak?

Reading time: 2 min.
Tomasz Jurgielewicz

What is the cause of the data leak?

Until a few years ago, data security topics were discussed by narrow groups of specialists in the field of cybersecurity. Before the era of ubiquitous logins and passwords - the awareness of data security threats was not a concern of many people. Those times are gone forever.
Why is cybersecurity important and what is the root cause of data leakage?
We will answer these questions in the article below.

Login data leak

In the circulation of information available to the average person, more and more often comes the information that represents various aspects of data security. Mainly those are login data leakage messages from popular portals or information about the theft of money by cybercriminals. We live in an age where we can talk about IT security with virtually anyone. This is because security topics are widely covered in the mass media.

Examples of security breaches:

    1. A well-known journalist described his case, during which, becoming a victim of phishing, he lost a lot of money from his accounts,
    1. One of the banks turned off the default acceptance of transfers via SMS code, then a phishing attack was carried out, which was caught by many of the bank's customers,
    1. An entrepreneur discusses in a few minutes' video how he lost 40,000 zlotys (virus replacing bank account numbers),
  1. DHS report that discusses security vulnerabilities in SAP - we discussed the report on our blog.

There are many examples. My idea  is an attempt to answer the question - what is the main cause of data leakage. The answer seems to be - simple: IGNORANCE!

Types of attacks on security systems

Phishing attacks

It is mainly preying on someone's naivety and little knowledge about the dangers.

Attacks by replacing account numbers on the bank's website

it is letting a virus into your computer (the way it is absolutely negligible, the great value for criminals is that users are simply inattentive).

For example, when verifying bank account numbers in a control SMS.

Attacks via known vulnerabilities 

primarily due to the ignorance of system administrators who have failed to respond to a known vulnerability for several years.

SUMMARY

Summing up: I treat this postwith a pinch of salt because the real causes of fraud lie both in the error layer of (more or less informed) users, but also in the technical layer of the systems.
It is also noteworthy that in the vast majority of cases of unauthorized access to data in systems, it is the so-called the protein interface is certainly crucial.

GOOD TO READ ABOUT SAP SECURITY:

If you find this article valuable, please share it.
This will allow us to reach new people. Thank you in advance!

We will take care of the digital transformation of your business

Do you want to protect your business against cyber attacks? Or maybe you are planning a digital transformation or looking for IT specialists for a project? We are happy to help. We are here for you. Let's talk about professional IT services for your company.
Contact Us
Darmowy e-book

Wszystko, co musisz wiedzieć
o migracji z SAP ERP na SAP S/4HANA

Nasz zespół ekspertów przygotował dla Ciebie
e-poradnik, dzięki któremu zrobisz to łatwo, bezboleśnie i bez szkody dla bezpieczeństwa
Twojej firmy.

To praktyczna wiedza podana w przystępnym
języku - zupełnie za darmo.
Pobierz darmowego e-booka
Address Information
ul. Tęczowa 3 , 60-275 Poznań
NIP: 5213683072
REGON: 360098885
Visit our Social Media:
Lukardi 2022. All Rights Reserved. 
Made with