Skip to content

SoftwareReviews: Safetica is a DLP Emotional Footprint Award Champion

DLP software users evaluated how they feel about their products across 26 dimensions, from vendor-client relationship to product effectiveness. Safetica and McAfee DLP both placed in the Champion Quadrant.

In February, SoftwareReviews published their Emotional Footprint Awards 2022. Safetica and McAfee were the only companies to reach the Championship Quadrant for Best Data Loss Prevention Software.

Safetica: DLP Diamond Champion

With 53 reviews, Safetica earned a +95% emotional footprint. The only other DLP provider to place in the DLP Diamond was McAfee DLP.  McAfee received 20 reviews and had a final score of +98%.

This is what Safetica customers think of us. And we are very proud of it.

  • Service Experience 
    Safetica was highly rated as respectful, caring, time saving.

  • Conflict Resolution
    Customers appreciated client-friendly policies, altruism, and trustworthiness of Safetica.

  • Negotiations and Contracts
    Users believe Safetica is generous, transparent, friendly in negotiations, and that they over deliver and put client’s interests first.

  • Strategy and Innovation
    According to users, Safetica helps innovate, is continually improving, includes product enhancements, is inspiring.

  • Product Impact
    Users consider Safetica performance enhancing and protecting security.

    (Safetica placed in the top two in each of the areas above.)


We at Safetica believe that data protection should make running your business easier, not harder. We are very pleased that our customers agree that we make their bussines more secure – and that our cooperation is a pleasant and nice experience.

Richard Brulík

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

The Top 5 Biggest Data Leaks in 2021

Data breaches are a common phenomenon in the world of data and can pose serious threat to organizations. When a data breach occurs, a company’s reputation is at risk, and fines from legal authorities may be imposed. The costs of such breaches can be enormous. According to IBM’s Cost of a Data Breach Report, issued in conjunction with the Ponemon Institute, in 2021 the average cost of a data breach reached $4.24 million per incident, in healthcare it was $7.13 million. Let us walk you through the biggest data breaches of 2021.

#1 Twitch

Number of records leaked: 5 billion

The Amazon-owned streaming service experienced a data breach in October. There was an error in a Twitch server configuration change that resulted in access to 100GB of data by a malicious third party and data leak.

An investigation was launched immediately, the company fixed the configuration and secured the systems. This leak was caused by a human error, hence an insider threat.

Types of data exposed: 

  • User data
  • Client list
  • Twitch’s source code
  • Security tools
  • Three years of payment information
 

#2 Astoria Company

Number of records leaked: 30 million

Astoria Company LLC focuses on lead generation from various websites and collects data for its clients.

In January, the team at Night Lion Security discovered several new breached databases of Astoria Company for sale on the dark web. Night Lion notified Astoria Company, the company was not aware of the breach.

Types of data exposed: 

  • Social security numbers
  • Bank accounts
  • Driver’s license numbers
  • Names
  • Email addresses
  • Dates of birth
  • Mobile phone numbers
  • Physical addresses
  • IP addresses
  • Credit history
  • Medical data
  • Home and vehicle information
 

#3 Park Mobile

Number of records leaked: 21 million

Park Mobile provides the largest cashless parking app in the U.S. In March, the company experienced a data breach in which the personal data of 21 million customers was sold online by Russian hackers.

The breach occurred due to vulnerability in a third-party software that is being used by the company. Park Mobile immediately launched an investigation, notified legal authorities, and recommended that customers change their passwords.

Types of data exposed: 

  • License plate numbers
  • Email addresses
  • Phone numbers
  • Vehicle nicknames

 


#4 ClearVoiceResearch.com

Number of records leaked: 15.7 million

ClearVoice Research focuses on market research surveys. In April, the company discovered that a backup file of one of their survey databases from 2015 was exposed and sold online.

The company launched an investigation, located the backup file, secured it and eliminated any further exposure. Other files were checked to see whether they were secured properly against other breaches.

ClearVoice Research reset the passwords of people whose data might have been compromised and implemented security measures to prevent the recurrence of such an event.

Types of data exposed: 

  • Names
  • Email addresses
  • Addresses
  • Home addresses
  • Phone numbers
  • Dates of birth
  • Passwords from 2015
  • Responses to various questions (such as health conditions, political affiliation and ethnicity)

 


#5 Jefit

Number of records leaked: 9.05 million

Jefit is a workout tracking app. In March, the company experienced a data breach due to a security bug. The breach impacted clients’ accounts that were registered before 20th September 2020.

The company secured the servers and impacted accounts immediately and launched an investigation and contacted the authorities. Jefit also adopted new security measures to avoid another breach in the future.

Types of data exposed: 

  • Account usernames
  • Email addresses associated with the accounts
  • Encrypted passwords
  • IP addresses when creating the account

How to avoid data breaches

There are various ways to avoid data breaches. The tips below might help you to protect your company’s valuable data.

  • Identify all the sensitive data in your company and review who can access it and why.
  • Review security policies and make sure they are not too difficult to understand and follow.
  • Educate your employees and reiterate why data security is important.
  • Implement a DLP solution that helps you to perform security audits and set and manage security policies.

Eighty-five percent of companies experience a data breach and 60% of small businesses close within 6 months due to a major data leak. At Safetica, we help all companies, large and small, from various sectors to protect their data against leakage and insider threats. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

What is an Insider Threat? Definition, Examples and Solution

An insider threat is a data breach security risk caused by people that have legitimate access to an organization’s data. Insider threats can be either unintentional or malicious. Insider threats are on the rise and are intensified by digital workspaces, flexible and remote work, and the agile behavior of companies without strict policies.

What is insider threat?

Insider threat is a malicious or unintentional threat to an organization that originates from internal operations or people who have access to an organization’s data.

The overall costs of an insider threat incident have increased from $11.45 million in 2020 to $15.4 in 2021. For even better context, overall costs were $8.76 million in 2018 (Ponemon). The longer it takes to detect an internal threat, the higher the costs. On average, it takes nearly three months (85 days) to contain an insider threat incident. Incidents that took more than 90 days to discover cost companies $17.19 million, the average cost of incidents that were discovered in less than 30 days was $11.23 million.

Insider threats are on the rise due to digital workspaces, flexible and remote work, agile and BYOD approaches. The overall number of incidents has increased by 44 percent in the last two years. Most of these threats are unintentional – 56% were caused by negligent insiders, whereas 26% were malicious.

The motivations for malicious insiders to misuse company data may vary. They either want to harm the company or make money. Employees might also be negligent and send data outside the company by accident.

If you process personal data and there are names, contact details, security numbers, card numbers etc. in your CRM, the data could be sold on the dark web where anyone can buy it. Your company is at risk if you sell products or services, or collect application data from customers.

If you have customer databases, your data might be sold directly to a competitor, who would then have access to valuable information about your clients and could easily lure them away. This might happen, for example, if you provide financial services, leasing, etc.

Types of Insider Threats

Insider threats can be divided into the following categories:

  • Data reseller – an employee who is financially motivated to sell a company’s data. Such an employee might willingly harm your company. Your company’s data can be sold on the dark web (if you work with personal data), or directly to your competitors (i.e., customer databases).
  • Lazy worker – an employee who is negligent and does not follow a company’s security policies. This type of employee is only doing their job and does not comprehend all the complexity behind data security. If a company’s policies are too strict and make daily business more complicated, the risk of non-compliance increases.
  • Owner – exiting employees who think that everything they created during their employment is their own property. They may take data with them to show to future employers, or take a company’s customers to a competitor.
  • Gullible employee – an employee who is a victim of a phishing campaign. For example, an employee opens an attachment or clicks through an email sent by an external social engineer, who steals the employee’s credentials and accesses company data. This type of leak is very difficult to spot since the thief then acts under the identity of the employee. A good DLP software might help with this.

 

How can I protect against Insider Threats?

Keeping sensitive data secure requires a combination approach. However, it is easier than it might sound to protect your data against insider threats.

policy 

Evaluate your security policies

Make sure that your security policies are clear and easy to understand. The more complicated your policies are, the higher the chances employees will ignore them. It is also important that your employees understand why data security is important and why they should handle sensitive data with care.

badge 

Screen new hires and monitor your compromised employees

Make sure that you perform a background check on your new hires. Create a secure off-boarding process to make sure that exiting employees will not take any data with them. If you are aware of any employees who might be compromised, keep an eye on them and check what type of data they have access to and if they need it.

school 

Educate your employees

The importance of data security might be too abstract for some employees, so it is important to constantly educate them. They should be aware of what type of data your company considers sensitive and how it can be misused. However, make sure you are also clear about the consequences of stealing your data. Your goal is to motivate people to protect your data, and to not take it outside.

search

Investigate past incidents

Have you ever experienced an insider initiated data leak? Then you know how unpleasant the process of investigating can be. When this happens, it is imperative that you investigate it properly and set appropriate measures after the incident. Also, notify fellow employees about the incident and advise them on how to comply with security policies.

verified_user

Implement a data security solution

All the steps above can help you with data security, but your most powerful tool is a software solution that helps you do it all. One advantage of such software is that it will not interrupt the daily work flow or lower the productivity of your employees in any way. The solution runs in the background and keeps data secure at all times.

With Safetica, for instance, you can even label your sensitive data by context and see how your employees access and work with it. You can set specific security policies – block file operations, data capture (like screenshots), or specific email domains, restrict usage of external devices, restrict data upload to the cloud and so on. On top of that, Safetica is super simple to implement, integrate and use. If you are interested, check out this link for more information.

Insider threats examples

#1 Ubiquiti

Ubiquiti is one of the top worldwide producers of wireless communication devices. The company had a malicious insider among its employees. Nickolas Sharp stole gigabytes of company data and tried to ransom his employer.

Nickolas Sharp used his cloud administrator credentials to clone and steal confidential data. He tried to hide his activity and changed log retention policies so his identity would remain unknown. When he obtained the data, he demanded almost $2 million from Ubiquiti in exchange for the return of the files. However, the company refused to pay, found him and changed all of the employees’ credentials.

In January 2021, Ubiquiti issued a data breach notification, and Nickolas Sharp was arrested for data theft and extortion.

#2 Amazon

In October 2021 a few Amazon employees were responsible for leaking customer data, including email addresses, to an unaffiliated third-party. This behavior violated company policies. The company fired these employees and referred them to law enforcement. Amazon never announced how many customers were impacted.

#3 The Swedish Transport Agency (STA)

In September 2015, the Swedish government had a data leak and the data of millions of citizens were exposed. The Swedish Transport Agency (STA) outsourced the management of its database and IT services to companies outside of Sweden. STA uploaded their entire database onto these companies’ cloud servers and some of their employees received full access to the database. The leaked data included all Swedish drivers’ licenses, personal details of Sweden’s witness relocation program, elite military units, fighter pilots, pilots and air controllers, citizens in a police register, details of all Swedish government and military vehicles and information about road and transportation infrastructure.

The director of the STA, General Maria Ågren, resigned and was found guilty by a Swedish court. She had to pay a fine of half of her monthly salary, which was, according to some citizens, not sufficient.

The data is still under the management of the two non-Swedish companies.

#4 Coca-Cola

In 2018, The Coca-Cola Company announced a data breach. A former employee was found to have an external hard drive that contained information stolen from Coca-Cola.

“We are issuing data breach notices to about 8,000 individuals whose personal information was included in computer files that a former employee took with him when he left the company,” a Coca-Cola spokesperson told Bleeping Computer.

#5 Trend Micro

In 2019, Trend Micro experienced a leak of personal data caused by a malicious insider. The company learned that some of their customers were getting scam calls claiming to be Trend Micro support.

An investigation was launched right away, and it confirmed that it was an insider threat. An employee got access to a customer support database with names, email addresses, Trend Micro support ticket numbers and telephone numbers. The employee sold the sensitive data to a third-party malicious actor.

The employee was fired immediately, and customers were advised not to react to the scam calls.

Summary

Insider threats are on the rise due to various “new normal” ways of working. When protecting your data, keep in mind that there are two types of employees that can put your data at risk.

The first group is aware that sensitive data is a valuable commodity that can be sold to a third party. These employees are constantly trying to find ways to steal data while remaining undetected.

The second risk group may not be aware that data is an important asset, and thus does not handle it properly, or they misuse it (by taking documents to a new employer). The risk of accidental data loss increases if a company does not use a DLP solution or has unclear security policies. Keep in mind that this is the largest risk group and accidental data leaks are very common.

Protect your data by adopting appropriate measures that will help you to keep your sensitive information safe. Perform an audit of your data and check who can access it and for what purpose. Take care of your employees as well. Education about data security can help a lot, as can easy-to-understand security policies.

Your greatest data security asset is the right software. Find one that combines all the important features and protects your critical data as well as your employees. Remember that if people feel safe, your company’s data will be safe too.

Safetica offers a solution that helps you keep your data safe – from initial (and continuous) discovery of sensitive or other business-critical data in your digital workspace through the efficient dynamic data leak and insider threat protection, to easy integration with other tools and into a multi-domain enterprise environment.

Finally, Safetica is super easy to implement and integrate. And this isn’t just our opinion, but our customers think the same! We placed at the top in 2021 Data Loss Prevention Data Quadrant by SoftwareReviews.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

Safetica prevents data leaks for Voltamp Transformers

VOLTAMP TRANSFORMERS OMAN SAOC is a manufacturer of transformers based in Oman, and data security is one of their top priorities. The company replaced their previous DLP solution with Safetica because it offers the features the company needs to protect its sensitive data, such as client lists, manufacturing processes and R&D prototypes. Using Safetica brings Voltamp peace of mind and reduces their data security costs.

The problem

Their previous DLP solution, TrendMicro, lacked features like OCR blocking, specific path leakage prevention, file-extension based data protection, signature based prevention, etc.

The company decided to use Safetica because it checked all the boxes for DLP and insider threat protection. With help from Salama Integrated Technologies, Safetica ONE was implemented in under a month. It included security Audit, endpoint data protection, security automation, enterprise features and performance monitoring.

Benefits of Safetica

Voltamp’s company data was classified based on importance and criticality, and policies were developed for users and computers to prevent data leakage. After implementing Safetica, both internal data security and security risk level improved as a result of the periodic reviews of actual data leakage.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

Safetica NXT adds dynamic DLP features

Safetica NXT, a cloud-based Insider Threat Prevention solution provided as a service, gets dynamic data protection. It also comes with a self-managed mode, which opens this next-gen cloud data security solution to “non-MSP” business partners and provides end-customers with full control over their environment and maximum privacy. 

Safetica NXT now enables you to enforce data protection policies and restrict employees from leaking your company’s sensitive data. The Insider Threat Prevention solution provided from the secured cloud as a managed service is becoming available also as a self-managed service with dynamic Data Loss Prevention (DLP) features. 

Protection mode with Dynamic DLP

In Safetica NXT’s protection mode*, you can either silently log events, notify employees about the potential risk of an operation and leave it up to them to decide on the next steps, or block the operation to prevent sensitive data from leaving the endpoint device.

New DLP features leverage dynamic digital workspace detection and adaptive data protection. The definition of a company’s safe digital workspace, a vital part of the DLP protection, is being continuously adjusted according to users’ behavior to ensure high security and low-maintenance administration.

Still SaaS but also self-managed

Safetica NXT, with its multitenant architecture, continues to be a cloud-based service that offers core discovery and protection scenarios based on best data security practices.

MSP-managed service is now expanding to include a self-managed mode for customers who prefer maintaining control over their configuration, management, and reporting.

Safetica resellers will now be able to easily turn off the managed mode from the partner’s central management console. Resellers can use the managed mode for pre-configuration and customer guidance through the trial​ period. After switching to “self-managed”, the partner can still see all his customers in the central management console.

The customers still do not need any dedicated hardware infrastructure or additional IT/security staff to manage their data protection. But in self-managed mode, they can do the necessary management on their own and have maximum privacy guaranteed.

Safetica NXT remains a risk-driven SaaS with quick deployment, unmatched time to value, and low maintenance required, thanks to our focus on maximum automation and machine learning.

New features are coming to the market on the 25th of January 2022. Subscriptions are available through our Safetica channel partners. There’s still the same (monthly/yearly) pay-as-you-go billing model for self-managed customers as for those managed by MSPs. 

*DLP/protection rules are currently available only for Windows environments.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×