{"id":21670,"date":"2016-04-07T13:00:00","date_gmt":"2016-04-07T13:00:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3754073"},"modified":"2016-04-07T13:00:00","modified_gmt":"2016-04-07T13:00:00","slug":"plugging-data-leaks-by-psilvas-cloudexpo-cloud-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/plugging-data-leaks-by-psilvas-cloudexpo-cloud-security\/","title":{"rendered":"Plugging Data Leaks By @PSilvas | @CloudExpo #Cloud #Security"},"content":{"rendered":"<p>Whether intentional or accidental, data leaks are a huge concern for organizations. And it has been for years. Going back to a 2004 survey from an IT security forum hosted by Qualys, found that 67% of security executives do not have controls in place to prevent data leakage, A December 2006 survey, Boston-based researchers Simon Management Group noted that some 78% of respondents said they were &#8220;very concerned&#8221; about data exposure. A 2010 article published by Trustwave on CSOonline.com said that 65% of leakage occurs due to the following combined methods: Microsoft SMB sharing, Remote Access Applications, and Native FTP clients.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3754073\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether intentional or accidental, data leaks are a huge concern for organizations. And it has been for years. Going back to a 2004 survey from an IT security forum hosted by Qualys, found that 67% of security executives do not have controls in place t&#8230;<\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-21670","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/21670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=21670"}],"version-history":[{"count":2,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/21670\/revisions"}],"predecessor-version":[{"id":21907,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/21670\/revisions\/21907"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=21670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=21670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=21670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}