{"id":32709,"date":"2021-04-29T09:59:01","date_gmt":"2021-04-29T07:59:01","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=32709"},"modified":"2021-04-29T10:10:32","modified_gmt":"2021-04-29T08:10:32","slug":"data-leaks-data-types","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/blog-ciberseguridad\/data-leaks-tipos-de-datos\/","title":{"rendered":"What are Data Leaks?"},"content":{"rendered":"<p>Every day there is news about <strong>cyber attacks on public organizations or companies<\/strong> where cybercriminals typically look for<strong> steal information<\/strong> to be able to blackmail companies or even block their computers to demand a ransom to free them.<\/p>\n\n\n\n<p>The <strong>cybersecurity<\/strong> It was born as a need to safeguard information, for which we find cybersecurity experts. If you want to be one of them, you can train with the<strong><a href=\"https:\/\/eiposgrados.com\/eng\/master-in-cybersecurity\/\" class=\"rank-math-link\"> Master in Cybersecurity, Ethical Hacking and Offensive Security<\/a> <\/strong>in <a href=\"https:\/\/eiposgrados.com\/eng\/\" class=\"rank-math-link\">EIP<\/a>. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/que-son-los-data-leaks-y-tipos-de-datos-que-existen-min-1024x684.jpg\" alt=\"What are data leaks and data types?\" class=\"wp-image-32710\" width=\"527\" height=\"352\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/que-son-los-data-leaks-y-tipos-de-datos-que-existen-min-1024x684.jpg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/que-son-los-data-leaks-y-tipos-de-datos-que-existen-min-300x200.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/que-son-los-data-leaks-y-tipos-de-datos-que-existen-min-768x513.jpg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/que-son-los-data-leaks-y-tipos-de-datos-que-existen-min-1536x1025.jpg 1536w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/que-son-los-data-leaks-y-tipos-de-datos-que-existen-min-2048x1367.jpg 2048w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/que-son-los-data-leaks-y-tipos-de-datos-que-existen-min-247x165.jpg 247w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/que-son-los-data-leaks-y-tipos-de-datos-que-existen-min-190x126.jpg 190w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/que-son-los-data-leaks-y-tipos-de-datos-que-existen-min-scaled.jpg 1920w\" sizes=\"(max-width: 527px) 100vw, 527px\" \/><\/figure><\/div>\n\n\n\n<p>Well then,<strong> We call data leaks Data Leaks<\/strong> (hence its name) restricted access by unauthorized parties to this data. The danger exists if these data or <strong>\u201cLeaks\u201d<\/strong> as they are also called, are exposed and published.&nbsp;<\/p>\n\n\n\n<p>Normally, this data theft usually originates from a<strong> web or email attack<\/strong>, but sometimes it can occur through portable storage devices, such as<strong> hard drives, USBs or electronic devices <\/strong>such as laptops, tablets or mobile phones.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Types of Data Leaks<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Accidentally<\/h3>\n\n\n\n<p>Not every data leak comes from a cyber attack, luckily, most <strong>data leaks<\/strong> that are produced in companies are<strong> accidental. <\/strong><\/p>\n\n\n\n<p>For example, him <strong>sending a letter or email to the wrong recipient<\/strong> whose content is confidential data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Disgruntled or ill-intentioned employee<\/h3>\n\n\n\n<p>Also called <strong>\u201cdata leak\u201d<\/strong>, consists as we can imagine in the theft of data by a <strong>own employee of the company<\/strong>. <\/p>\n\n\n\n<p>It may be the case that the<strong> cybercriminals<\/strong> promise a payment to an unreliable employee for the theft of data or this person simply wants to damage the company&#039;s image by making confidential data public.<\/p>\n\n\n\n<p>Theft can be as simple as <strong>take a photo with your mobile, export data to a pendrive<\/strong> or even the <strong>theft of documentation <\/strong>for their evil purposes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing attack<\/h3>\n\n\n\n<p>Unfortunately these types of attacks are the order of the day, they have a<strong> very large success rate in data leak<\/strong> and it grows more every day, possibly because they depend on the human factor as vulnerability.<\/p>\n\n\n\n<p>We already talked to you last week about the <strong>stroke <a href=\"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/new-tax-agency-phishing-attack-2021\/\">phishing<\/a><\/strong> where they impersonated the Tax Agency by referring you to a website to ask for your bank details, but sometimes we can find <strong>malware files <\/strong>which when installed in our system can cause leakage of confidential data.<\/p>\n\n\n\n<p>As an example, on January 11 of this year, a Chinese social media management company, <strong>Socialarks<\/strong>, suffered a Data Leaks due to an unsecured database that exposed the account details and personally identifiable information of at least <strong>214 million users<\/strong> of social networks <strong>Facebook, Instagram and LinkedIn.<\/strong> <\/p>\n\n\n\n<p><strong>The information exposed for each social network varies<\/strong>, but includes usernames, phone numbers, email addresses, profile images and descriptions, and even location, among others.<\/p>","protected":false},"excerpt":{"rendered":"<p>Do you know what data leaks and data types are? We tell you its meaning and the types of Data Leaks you can find. Read more!<\/p>","protected":false},"author":51,"featured_media":32711,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-32709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/32709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=32709"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/32709\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/32711"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=32709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=32709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=32709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}