• Ürünler
  • Uyumluluk
  • Kaynaklar
  • İş Ortaklarımız
  • Arama Talep Et
  • Türkçe
    • English
    • العربية
    • Español
    • Português
  • SearchInform DLP
    SearchInform Risk Monitor
    SearchInform FileAuditor
    TimeInformer
    İş Ortağımız Olun
    İş Ortağı Girişi
    Hakkımızda
    Blog
    İletişim
    Dil:
    • Türkçe
    • English
    • العربية
    • Español
    • Português
    Bizi takip edin:
    Arama Talep Et
Ana Sayfa — Blog — Connected Devices Remain the Most Popular Data Leakage Channel
Geri
BLOG LİSTESİNE DÖN
Connected Devices Remain the Most Popular Data Leakage Channel
04.12.2023

This was revealed by the survey conducted by SearchInform and NEXTA ÇÖZÜM. 

SearchInform, the leading global risk management product developer, together with its partner NEXTA ÇÖZÜM, IT consultant and distributor, surveyed representatives of 100 Turkish leading companies to find out how their experts ensure data leaks protection, whether they are planning to increase data security budgets and what data channels their security officers consider the riskiest. 

CIOs and CISOs, who took part in the survey, believe that data transmission via USB devices is the riskiest channel in terms of data leaks. Nearly 80% of experts believe that this channel should be controlled first. Other data channels which CIOs and CISOs consider the most unsafe ones are email and messengers. Employees tend to leak data most often via these channels, both accidentally and with a malicious intent.

*some experts chose more than one option 

Elena Varol, SearchInform Regional Manager, Turkey: “The results of the survey reveal that the traditional channels are still among the most unsafe ones. Employees often send emails to incorrect recipients or use messengers to share confidential data in violation of the established information security rules. Intruders, in their turn, also often try not to invent some new techniques, but leak data via flash drives or send it via email. According to our customers’ experience, internal actors attempted to leak data via external devices in 56% of all cases, and email was used for data leak attempts in 21% of cases. The good news is that modern data protection solutions (DLP systems) are capable of controlling all these channels and preventing data leaks. Advanced solutions are capable of preventing data leaks via new messengers, such as Telegram, which popularity is increasing steadily.”

The bad news is that there is a lack of special-purpose protective software. Thus, many companies fail to protect trade secrets, as well as personal data of customers and employees. This, in turn, means that these organizations fail to comply with the KVKK requirements.

Overall, it is required to invest into information security. However, respondents of only 20% of organizations reported an expected increase of budget allocated to information security next year.

Elena Varol, SearchInform Regional Manager, Turkey: “The will to save money is understandable. However, taking into consideration the current information security landscape and the fact that there is a step change in the amount of information security risks that organizations face worldwide, it makes sense to carefully plan the budget allocated for enhancing corporate data security. Information has already turned into one of the most valuable assets for any organization, and investments into its security will pay off. There is a beneficial option, especially for SMEs, to consider the new approach to data protection: instead of purchasing protective software, it may be useful to implement multifunctional modern solutions, which are available on the service model, don’t demand many resources and are deployed in the cloud. This way, companies can spend their budgets more thoughtfully, save resources and ensure protection at the same time.”


Nexta Çözüm Danışmanlık A. Ş. has more than 20 years’ experience in the IT market, developing and implementing complex IT solutions for different industries. Nexta provides consultancy, assessment and research, project management and full technical support for its customers. Deep knowledge of the local IT market and understanding of customer’s needs put Nexta on the leading position and ensure the best quality of its services and full functioning of deployed solutions.

SearchInform is one of the leading risk management product developers. For over a decade, the company has been a technological trailblazer focusing on contemporary cybersecurity threats, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit. More than 4000 companies across all major economic domains, from banking and retail to machinery and fighter jet manufacturers, count on SearchInform regarding efficient holistic risk management solution defending against ever-improving threats and allowing you to avoid ominous consequences.


You can use SearchInform products to provide comprehensive protection against insider threats at all levels of corporate information systems. Follow the link to get a trial period, it's free for the first 30 days.


BLOG LİSTESİNE DÖN
Letter Yararlı makaleler ve beyaz kitaplar almak için abone olun. Sektör trendlerini ele alıyor ve veri sızıntıları ile siber olaylarla nasıl başa çıkılacağı konusunda öneriler sunuyoruz.
E-posta
FileAuditor
DLP
Risk Monitor
TimeInformer
İletişim
Hakkımızda
Müşterilerimiz
İş Ortağımız Olun
İş Ortağı Girişi
Kaynaklar
Blog
SearchInform ürünleri aşağıdaki kuruluşlar tarafından tanınmaktadır
Gartner The Radicati Group
Bizi takip edin:
© 2025 SearchInform LTD – Tüm hakları saklıdır.
Kullanım Şartları
Lisans
Gizlilik ve Çerezler
Çerez ayarları
Web sitemizin kullanımını analiz etmek, hizmetlerimizi daha etkili hale getirmek ve kullanıcı deneyimini iyileştirmek için çerezleri kullanıyoruz. Sitemizi kullanmaya devam ederek çerez politikamızı kabul etmiş oluyorsunuz.
KABUL ET
AYARLAR
ÇEREZ POLİTİKASI
✖

SearchInform, aşağıda açıklanan dört tür çerezi kullanmaktadır. Web sitemizdeki deneyiminizi geliştirmek için hangi çerez kategorilerini kabul edeceğinize siz karar verebilirsiniz. Sitemizde kullandığımız çerezler hakkında daha fazla bilgi edinmek için Çerez Politikamızı okuyun.

TÜR
AYARLAR
ÇEREZ POLİTİKASI

Zorunlu Çerezler

Her zaman aktiftir. Bu çerezler, web sitemizin düzgün çalışması için gereklidir. Kişisel bilgi toplamazlar. Tarayıcınızın İnternet Ayarları bölümünden bu çerezlerin kaydını devre dışı bırakabilirsiniz.

Fonksiyonel Çerezler

Bu çerezler, örneğin web sitesinde hangi dili kullanmak istediğinizi hatırlamak gibi, gelişmiş işlevsellik ve kişiselleştirme sunmamıza olanak tanır.

Performans Çerezleri

Bu çerezler, sizin için en gerekli bilgilerin neler olduğunu anlamamıza yardımcı olur, böylece hizmetlerimizi ve web sitemizi geliştirebiliriz.

Üçüncü Taraf Çerezleri

Bu çerezler, diğer web sitelerinden içerik (örneğin resimler, reklamlar, metinler) yerleştirebilmemiz için üçüncü taraf kaynaklar tarafından oluşturulur.

Ayarları Kaydet
✖

Lütfen Fonksiyonel Çerezleri Etkinleştirin

Fonksiyonel çerezleri devre dışı bıraktınız.
Bizimle iletişime geçebilmeniz ve formu tamamlayabilmeniz için fonksiyonel çerezleri etkinleştirmeniz gerekmektedir. Aksi takdirde, form tarafımıza gönderilemez.

Çerez Ayarları