Data leaks: three of the most important human causes

Since January 2016 there is a duty to report data leaks. This means that companies have to inform
the authorities as soon as a data leak occurs. Just in 2017 10000 leaks have been registered, most of
which came from health care institutions, financial services and public administration.


Recently I spoke with Jaap Nieuwmeijer, coordinator information security at Partners voor Jeugd, on
the increased focus on data leaks. The time wherein a public prosecutor got away with just a simply
warning about leaving a computer with sensitive information in the garbage bin, is long gone.
According to Jaap, the reason for this, is that our awareness concerning the consequences of data
leaks has grown. Additionally lawmakers wants to increase this awareness, and protect the European
citizen using the General Data Protection Regulation (GDPR). If your company cannot verify that
sufficient measures have been taken to prevent a data leak, not only a will your reputation be
damaged, but will also receive a warning and/or a high fine.



What is the most important cause for a data leak?


Let’s first determine what a data leak actually is. A data leak originates when sensitive personal
information ends up in the wrong hands. When thinking about data leaks, most people think about
hackers that loot some badly protected database. However, in actual practice most of the time
human errors are the reason for a data leak. Mistakes and sloppiness occur due to a high workload,
and data leak is hardly ever on purpose. Based on a risk analysis, Jaap Nieuwmeijer has identified the
three most common causes for the leaking of sensitive personal information.


Sending an email to the wrong person


Everybody has done this at some point in their life. You want to send an email to Jimmy. You open
Outlook, type in Jim and the email program adds the name. But when you press Send you suddenly
realise that you have sent the email to the wrong Jimmy.
If this message contained personal information, it is a data leak. The annoying thing about email is
that you cannot really recall a message once it has been sent. At the same time, you are lawfully
obliged to confine the implications of a leak. There is nothing else to do than to call the receiver and
ask him to erase your message. Your reputation fully rests in their hand and that is not where you
want it to be.


Misdirecting an envelope


We are living in the digital era. However, we still send a lot of documents by snail mail. As a security
consideration we sometimes even sent digital files by ordinary postal mail. In most cases this goes
flawless. Sometimes however, somebody puts the wrong label on an envelope or puts a document in
the wrong envelope. In both cases we are speaking of a data leak. You only notice this type of data
lake when the receiver gives you a call; again your fate and reputation fully rests in their hands.



Losing your phone


A third common leak occurs when someone loses their mobile phone. A phone gets easily lost and
contains lots and lots of personal information, think about personal addresses, emails and
documents. Nowadays most phones are protected with a passwords, but unfortunately this
protection is insufficient. Sometimes you can erase your phone remotely but this does not give you
100% certainty and is only possible when the phone has a network connection. Fortunately most
new phones have some type of encryption that automatically encrypts your saved data.



How do I prevent these and other data leaks?


As you can see: accidents happen. The results however can be quite substantial. As already stated
before, now that the GDPR has come into force, a leak results not only in (significant) loss of
reputation, but also in a high fine. That’s why you as a CISO have to do everything in your power to
prevent this. On the one side this means creating a sense of awareness amongst your fellow
employees. In most cases your laptop will automatically encrypt all saved data, but if your laptop bag
contains a notepad with personal information, a leak can still occur. The exchange of files through
public services can also be a potential risk.


On the other hand, it can be wise to install software that operates in the background and assists your
colleagues in making the right choice. Keep in mind that this will only contribute to a safer working
environment if the software does not impede the user in doing his job. If employees have to perform
extra measures, like manually encrypt their files, they will experience this security as a burden. This
will result in your colleagues evading these measures and looking for other alternatives.


We communicate using different devices through several channels. Solid security software therefore
has to protect different channels of communication, like email and chat, on both desktop and mobile
devices. Moreover, an extra form of authentication is needed in order to ensure that only the
intended recipient is able to see and/or read your message. If your software also gives you the
possibility to remotely withdraw email messages, you comply with the GDPR, which obliges you to
take action to prevent data leaks and to reduce any consequences of a leak.



Checklist GDPR


We have described all the necessary steps you have to take in order to meet the GDPR legislation in
our checklist. This document elaborates on things like creating a processors agreement, getting
permission for processing personal information and security measures that have to be taken.

Go to the GDPR Checklist

RELATED
blog emailuitdagingen 1000x500

Why email entails major risks under the GDPR

In 2017 more than 10.000 data leaks occurred. More than half of these leaks was caused by human error.  […]

Read more