{"id":14290,"date":"2023-10-23T12:35:45","date_gmt":"2023-10-23T10:35:45","guid":{"rendered":"https:\/\/immune.institute\/?p=14290"},"modified":"2023-10-23T12:35:45","modified_gmt":"2023-10-23T10:35:45","slug":"que-es-una-fuga-de-datos","status":"publish","type":"post","link":"https:\/\/immune.institute\/en\/blog\/que-es-una-fuga-de-datos\/","title":{"rendered":"What a data breach is and why companies should start worrying about it"},"content":{"rendered":"<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:30% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/immune.institute\/wp-content\/uploads\/2023\/02\/Alfonso-Fuentes_Edit_2-1024x1024.png\" alt=\"\" class=\"wp-image-11298 size-full\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2023\/02\/Alfonso-Fuentes_Edit_2-1024x1024.png 1024w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/02\/Alfonso-Fuentes_Edit_2-256x256.png 256w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/02\/Alfonso-Fuentes_Edit_2-512x512.png 512w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/02\/Alfonso-Fuentes_Edit_2-768x768.png 768w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/02\/Alfonso-Fuentes_Edit_2-12x12.png 12w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/02\/Alfonso-Fuentes_Edit_2.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"wp-block-paragraph\" style=\"font-size:17px\">Alfonso Jos\u00e9 Fuentes, a 3rd year student of the <a href=\"https:\/\/immune.institute\/en\/programas\/grado-en-ingenieria-de-desarrollo-de-software\/\" data-type=\"programas\" data-id=\"7753\">Software Development Engineering Degree <\/a>in IMMUNE.<\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Throughout my academic career, my deepest interests have revolved around the<strong> data engineering<\/strong> and <strong>cybersecurity<\/strong> because of my conviction that these fields affect people in all professions. Whether you work in the bakery, aerospace engineering or the arts, we live in an increasingly globalised world. <strong>hyper-connected world<\/strong> in which our <strong>information <\/strong>is constantly exposed.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This impact is particularly evident in the<strong> work environment,<\/strong> where the risks and costs associated with <strong>IT security<\/strong> are significant. In today's article, I will explain what a leak is. <strong>of data,<\/strong> the importance of establishing <strong>secure internal systems <\/strong>in companies, as well as exploring the <strong>strategies <\/strong>y <strong>trends <\/strong>that are shaping this reality. <\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What is a data breach and when does it occur?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Let's put yourself in this situation: you work for a company that handles tons of data. Customer data, financial data, you name it. Imagine that the company doesn't take the necessary steps to store its information properly and \u00a1<em>boom<\/em>! Your worst nightmare comes true: a data leak happens. All that confidential information is accessible to anyone.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A <strong>data leakage<\/strong>also known as <a href=\"https:\/\/immune.institute\/en\/blog\/brecha-de-seguridad\/\">DATA GAP<\/a> or data breach, is an incident in which the <strong>confidential or sensitive information <\/strong>of an organisation is intentionally or accidentally disclosed, shared or accessed in an unauthorised manner. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Data leaks can occur at various times and in various situations, such as:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Unauthorised access: <\/strong>When someone without permission gains access to an organisation's systems and obtains confidential data.<br><\/li>\n\n\n\n<li><strong>Loss or theft of devices:<\/strong> If a device such as a <em>laptop<\/em>If an external storage unit, mobile phone or USB memory stick containing confidential data is lost or stolen.<br><\/li>\n\n\n\n<li><strong>Cyber attacks:<\/strong> They include intrusions into computer systems, such as hacker attacks, <em>malware<\/em> o <em>ransomware<\/em> that may lead to data exposure.<br><\/li>\n\n\n\n<li><strong>Human error:<\/strong> When an employee or individual makes a mistake, such as sending confidential information to the wrong email address or failing to adequately protect data.<br><\/li>\n\n\n\n<li><strong>Security breaches in third parties:<\/strong> When data is compromised due to security breaches at a supplier or business partner handling the organisation's information.<br><\/li>\n\n\n\n<li><strong>Internal data leaks: <\/strong>When an employee or collaborator of the organisation intentionally or accidentally discloses confidential information.<\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Irrespective of the size of the company, large or small<strong>to prevent such incidents<\/strong> The risk of data leakage becomes a priority, and it is precisely here that data engineering and cyber security become of vital importance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The importance of a reliable internal system<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">First of all: What is a <strong>internal system<\/strong>? Basically it's like the backbone of the <strong>digital infrastructure<\/strong> of a company. It is where all your data, applications and applications are stored, <em>know-how<\/em> and processes. Now, let's talk about why it should be foolproof (or very close to it):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data protection:<\/strong> Companies that handle a large amount of data every day have valuable customer information, trade secrets and confidential records. If this gets into the wrong hands, it can be disastrous. That is why having a secure internal system is like the fortress that holds all this treasure.<br><\/li>\n\n\n\n<li><strong>Reputation:<\/strong> We as users of <em>apps<\/em> Whether it's social media, financial or health, we trust big companies with our data. If they leak data, it is as if they are breaking that trust. This causes their reputation to plummet.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Legal consequences:<\/strong> Data breaches can land a company in legal trouble, such as facing substantial fines, lawsuits and compliance issues, which can be a major headache.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Now, let's get to the good stuff: how do data engineering and cybersecurity teams ensure that these leaks don't happen?<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/principal.immune.institute\/wp-content\/uploads\/2023\/10\/Fuga-de-datos_IMMUNE_Blog.png\" alt=\"IMMUNE_data_leakage_Blog\" class=\"wp-image-14324\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Fuga-de-datos_IMMUNE_Blog.png 1920w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Fuga-de-datos_IMMUNE_Blog-256x144.png 256w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Fuga-de-datos_IMMUNE_Blog-512x288.png 512w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Fuga-de-datos_IMMUNE_Blog-768x432.png 768w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Fuga-de-datos_IMMUNE_Blog-1024x576.png 1024w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Fuga-de-datos_IMMUNE_Blog-1536x864.png 1536w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Fuga-de-datos_IMMUNE_Blog-18x10.png 18w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What to do in case of information leakage<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Access control:<\/strong> This is like a doorman in a building. You make sure that only the right people can enter. Companies use the <strong>role-based access control (RBAC) <\/strong>to restrict who can see what data. You won't see the caretaker reading the CEO's emails with this in place.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data encryption:<\/strong> is like putting data in a safe. Even if a <em>hacker <\/em>If he succeeds, he will not be able to decrypt it and thus be able to view it. Encryption is the strategy to be followed to protect the data both in <strong>movement<\/strong>information that is circulating through networks or systems, such as in <strong>rest<\/strong>data that is not in constant motion.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Regular audits and monitoring:<\/strong> companies need to constantly monitor their systems. Regular audits and monitoring help detect suspicious activity in real time, preventing a total loss.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Employee training and awareness<\/strong>You can have the most sophisticated security technology, but sometimes humans screw up. Basic cybersecurity training for a company's employees is a must.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Trends in Data Engineering and Cybersecurity<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">To be a good<strong> data engineer <\/strong>o<strong> cybersecurity professional<\/strong> and to be able to prevent or fight against a data leak, it is essential to be aware of the <strong>technology trends<\/strong>. I will tell you some of them:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>AI and machine learning:<\/strong> today it is impossible to talk about technology without mentioning the <a href=\"https:\/\/blog.hubspot.es\/website\/aplicaciones-inteligencia-artificial\" data-type=\"link\" data-id=\"https:\/\/blog.hubspot.es\/website\/aplicaciones-inteligencia-artificial\" target=\"_blank\" rel=\"noreferrer noopener\">artificial intelligence,<\/a> Right? Indeed, AI has transcended science fiction and has become a fundamental tool. Companies are using it to detect unusual patterns in their data. If the system detects something strange, it can generate an alarm. It's like having a digital watchdog.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Zero Trust Architecture (<em>zero-trust architecture<\/em>):<\/strong> en los viejos tiempos, confiabas en las personas y los sistemas dentro de tu red. Pero, con todas estas filtraciones de datos, las empresas est\u00e1n adoptando un enfoque de \u00abno confiar en nadie\u00bb. <em>Zero Trust<\/em> means that everyone, including those within the network, must prove their credentials on an ongoing basis.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em style=\"font-weight: bold;\">DevSecOps<\/em><b>:<\/b> This is like combining the roles of developers, IT and security into one team. By working together from the beginning, they ensure that security is not a surprise. These precautions are built into the code from the start.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cloud security:<\/strong> With so many companies moving their data and systems to the cloud, the <strong>cloud security<\/strong> is a big problem. Companies are focusing on protecting their data in the cloud as much as they would in their own data centres. But that's where choosing a reliable cloud provider comes in.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<p class=\"wp-block-paragraph\">What we have discussed in this article sheds light on the vital importance of maintaining a secure internal system in companies and how data engineering and cyber security are playing a key role in this area. It's not just about protecting data; it's about safeguarding the trust, reputation and future of the company, as well as the security and confidentiality of its customers. What do you think?<\/p>","protected":false},"excerpt":{"rendered":"<p>Alfonso Jos\u00e9 Fuentes, alumno de 3\u00ba a\u00f1o del Grado de Ingenier\u00eda de Desarrollo de Software en IMMUNE. A lo largo de mi trayectoria acad\u00e9mica, mis intereses m\u00e1s profundos han girado en torno a la ingenier\u00eda de datos y la ciberseguridad debido a mi convicci\u00f3n de que estos campos afectan a personas de todas las profesiones. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":14322,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[156],"tags":[74],"class_list":["post-14290","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","tag-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/14290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/comments?post=14290"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/14290\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/14322"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=14290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/categories?post=14290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/tags?post=14290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}