Information Leakage Countermeasures: Causes and Solutions

Information Leakage Countermeasures: Causes and Solutions

Information leakage risks are a constant concern for all companies, regardless of industry or sector. To minimize the damage from potential or actual information leaks, it is crucial to develop thorough countermeasures in advance.

This article explains the causes and risks of information leakage, and the key points to consider when implementing information leakage countermeasures. We will also briefly introduce how to respond in the event of an incident, so please read on.

Table of Contents

  1. Risks of Information Leakage
    1. Causes of Information Leakage
  2. Key Points for Information Leakage Countermeasures
    1. Be Careful About Taking Data Out
    2. Be Careful About Leaving Data Unattended
    3. Be Careful About Discarding Data
    4. Do Not Bring Data In
    5. Be Careful About Lending, Borrowing, and Transferring Data
    6. Do Not Publicly Disclose Information
    7. Report Problems Immediately
  3. How to Respond to Information Leakage
  4. Summary

1. Risks of Information Leakage

There are three main types of information leakage: “Confidential Information Leakage,” “Customer Information Leakage,” and “Personal Information Leakage.” All of these can cause significant damage and must be strictly managed.

For example, the following risks are associated with confidential information leakage:

Risks of Confidential Information Leakage

  • Loss of competitive advantage due to leaked business strategies
  • Loss of market share to similar products developed based on leaked product information
  • Damage to the company’s reputation due to perceived lack of information management capabilities

The main risks associated with customer and personal information leakage are as follows:

Risks of Customer and Personal Information Leakage

  • Penalties under personal information protection laws
  • Loss of trust from customers and society
  • Loss of customers
  • Suspension of business transactions
  • Lawsuits
  • Stock price decline
  • Financial compensation
  • Decreased future profits and sales
  • Significant time, cost, and personnel required for post-incident response

1-1. Causes of Information Leakage

According to statistics released by Tokyo Shoko Research in 2021, the top four causes of information leakage at listed companies and their subsidiaries are as follows:

Virus Infection/Unauthorized Access 49.6%
Misdisplay/Misdelivery 31.3%
Loss/Improper Disposal 11.6%
Theft 5.8%

Source: “Listed Companies’ Personal Information Leakage/Loss Accidents: Record High of 137 Cases, Affecting 5.74 Million People (2021)”

More than 80% of information leakage incidents occur via the internet, highlighting the importance of cybersecurity measures.

2. Key Points for Information Leakage Countermeasures

For information leakage via the internet, the introduction of information security software and tools is effective. At the same time, it is necessary to provide sufficient security education to those who handle information, and to establish a management system with key points and thorough dissemination of rules.

Here are seven key points for information leakage countermeasures.

2-1. Be Careful About Taking Data Out

To prevent information leakage, it is important to prevent information that should remain within the company from being taken outside. First, aim to establish internal rules for handling information.

Examples of Rules Regarding Taking Data Out

  • Separate business and personal devices/addresses
  • Do not take company computers or memory devices outside the company
  • Use double locks on devices used outside the company
  • Do not allow others to touch business devices
  • Encrypt data taken outside the company
  • Always obtain permission before sending data externally
  • Do not use online storage not designated for business purposes
  • Do not conduct business in undesignated or unauthorized locations

Source: Information-technology Promotion Agency, Japan (IPA), Security Center, “Information Leakage Countermeasures Handbook”

2-2. Be Careful About Leaving Data Unattended

Leakage also occurs when company or organization information is left unattended. Typical countermeasures include the following rules:

Examples of Rules Regarding Leaving Data Unattended

  • Do not leave business smartphones unattended while charging
  • Lock computers even for short absences
  • Do not leave printed documents unattended
  • Do not leave documents or memory devices unattended when leaving or going home
  • Lock shelves storing documents and memory devices
  • Do not leave business memos or notes in visible places
  • Do not make detours or leave business devices/documents unattended

Source: Information-technology Promotion Agency, Japan (IPA), Security Center, “Information Leakage Countermeasures Handbook”

2-3. Be Careful About Discarding Data

There are many examples of leakage accidents caused by carelessness when disposing of information assets.
Even after information is no longer needed for business purposes, it is necessary to thoroughly manage documents and devices containing important information.

Examples of Rules Regarding Disposal

  • Do not leave documents, devices, or memory devices scheduled for disposal in places where anyone can see them
  • Do not dispose of items containing information assets with general waste
  • Erase hard disks of computers and servers before disposal

Particular attention should be paid to the fact that “initialization (formatting) does not erase data.” Either outsource to a specialized vendor or train personnel within the company to handle this.

Source: Information-technology Promotion Agency, Japan (IPA), Security Center, “Information Leakage Countermeasures Handbook”

2-4. Do Not Bring Data In

In addition to taking data out of the company, thorough rules are needed for bringing data in.
This includes not only devices such as computers, but also programs and viruses.

Examples of Rules Regarding Bringing Data In

  • Do not connect personal devices/memory devices to the company network
  • Do not download programs that are not necessary for business
  • Do not use data, programs, Wi-Fi, online services, memory devices, or cards that are not designated for business or have not been authorized
  • Do not browse websites unrelated to business
  • Do not use business addresses for personal use
  • Always keep device OS, applications, and security software up to date

Source: Information-technology Promotion Agency, Japan (IPA), Security Center, “Information Leakage Countermeasures Handbook”

2-5. Be Careful About Lending, Borrowing, and Transferring Data

Not only the devices used for business, but also the lending, borrowing, and transferring of individually assigned privileges for programs and servers require attention. If the number of people with unauthorized privileges increases due to reasons such as “being busy” or “troublesome procedures,” it can lead to information leakage.

【Examples of Rules Regarding Lending, Borrowing, and Transferring】

  • Do not share IDs or passwords without permission
  • Do not reuse the same ID or password
  • Do not write down IDs or passwords in visible places
  • Promptly revoke the privileges of people who do not need them for business purposes

Source: Information-technology Promotion Agency, Japan (IPA), Security Center, “Information Leakage Countermeasures Handbook”

2-6. Do Not Publicly Disclose Information

Although the image of “confidentiality obligations” is strong for doctors and lawyers, it is fundamental in every company to “not divulge information learned in the course of business.”
In general companies, awareness of confidentiality obligations may be weak, so regular reminders and internal education are necessary.

【Examples of Rules Regarding Public Disclosure of Information】

  • Do not post company information on SNS or bulletin boards
  • Do not talk about complaints about superiors or colleagues in bars, etc.
  • Do not make phone calls containing business information in public places
  • Do not provide information to parties whose identity cannot be verified

Source: Information-technology Promotion Agency, Japan (IPA), Security Center, “Information Leakage Countermeasures Handbook”

2-7. Report Problems Immediately

No matter how strict the rules, it is impossible to completely prevent management mistakes or troubles as long as people are involved in the operation. Even if you face an emergency, create rules to minimize the damage.

The worst thing to do is to conceal the fact that information leakage has occurred. The longer the time since the information leakage occurred, the greater the size and scope of the damage will continue to expand. In addition to thoroughly enforcing “people who cause information leakage or find leakage must report immediately,” it is also important to create a system that makes it easy to share the situation.

Source: Information-technology Promotion Agency, Japan (IPA), Security Center, “Information Leakage Countermeasures Handbook”

3. How to Respond to Information Leakage

Although the details of the response will differ depending on the type of information leakage, the basic response methods are the same.

1 Discovery/Reporting
If information leakage is discovered, prompt reporting and preparation for response are required.

  • In the case of information leakage via the internet or programs: refrain from careless operations and leave evidence on the system
  • If there is a report from an external source: keep a record of the reporter’s contact information
2 Initial Response/Situation Assessment/Start of Investigation
Set up a response headquarters and take emergency measures to establish basic response policies and prevent the spread of damage.

  • Grasp when, where, who, what, why, and how it happened
  • Stop using the service and disconnect from the network
  • Identify the manufacturer, model number, and serial number of the lost device
3 Notification/Reporting/Public Announcement/Continued Investigation
Continue the investigation in cooperation with each department, and notify, report, and announce the information leakage.

  • Secure information and evidence to prove the facts
  • Notify the information owner, related parties, and business partners
  • Notify supervisory authorities, police, IPA, etc.
  • Announce through websites, the media, etc.
4 Suppression Measures/Recovery/Continued Investigation
Take measures to suppress the spread of damage caused by information leakage and to restore what is necessary for recovery.

  • Set up a dedicated consultation service
  • Restore stopped services and programs
  • Take concrete measures to prevent recurrence
5 Post-Incident Response/End of Investigation
Troubleshooting and investigation are completed after considering future countermeasures.

  • Compensate victims for damages
  • Take disciplinary action against those responsible
  • Consider and implement measures to prevent recurrence
  • Submit and publish the investigation report

Source: Information-technology Promotion Agency, Japan (IPA), Security Center, “Information Leakage Countermeasures Handbook”

Summary

Information leakage is an accident that can happen to any company. If information leakage occurs, there is a risk that not only will trust from customers and society decline, but also significant damage will continue for a long period of time.

In order to reduce the possibility of information leakage, in addition to ensuring that employees thoroughly follow information security rules, it is also important to create a highly reliable security environment. If you are looking for a security system that is easy to understand, comfortable to operate, and has advanced technology, while also being cost-effective, please contact globalsupport@jiran.com.

Virus Countermeasures Security Software “EXO Security”

Click here for EXO Security usage fees

Click here for EXO Security features

Share posts