DATA LEAKAGE

Data leakage is the unauthorised transfer of business information from a computer or data centre to the outside world against policy. Using Azure Information Protection capabilities, we help you classify and control emails, files and data.

Data leakage is the unauthorised transmission of data from within an organisation to an external destination or recipient. Data leakage threats usually occur via the web and email but can also occur via mobile data storage devices such as optical media, USB keys, and laptops. Rarely a day goes by without a confidential data breach hitting the headlines. Also known as low and slow data theft, is a huge problem for data security and the damage caused to any business regardless of size or industry can be serious.

Cyber Essentials Internal Image

GET THE MINIMUM REQUIREMENT WITH CYBER ESSENTIALS

There are many different types of data leakage and as the problem can be initiated via an external or internal source, ACS understand that protective measures need to address all areas and ensure that the most common data leakage threats are prevented.

From declining revenue to a tarnished reputation or massive financial penalties to crippling lawsuits, data leakage is a threat that every

It’s important to consider that an unauthorised data leakage does not necessarily mean intended or malicious, is can be accidental which most breaches thankfully are. As an example, an employee may unintentionally choose the wrong recipient when sending an email containing confidential data but unfortunately, unintentional data leakage can still result in the same penalties and reputational damage as those breaches that occur from malicious intent.

We commonly think of data loss as information being held on stolen or misplaced laptops or data that is leaked over email but in fact most data loss occurs via printers, cameras, photocopiers, removable USB drives and even through rubbish where discarded documents have been thrown out, not electronically at all.

These days most organisations provide their employees with access to the internet, to email, and even instant messaging as part of their role but the problem with this is that all these channels are capable of file transfer or accessing external sources over the internet. Malware attacks are usually designed to target these mediums and they often see a high success rate. A cyber criminal could quite easily spoof a legitimate business email account and request sensitive information to be sent to them. The employee or user could unwittingly send the information which could contain financial data or sensitive pricing information.

Phishing attacks are yet another cyber attack method with a high data leakage success rate. Simply by clicking on a link and visiting a web page that contains malicious code, an employee could allow an attacker to access a computer or network and retrieve the information they need.

Our Process

Our true end-to-end service delivery enables clients to have a
single point of contact and offers a simple, consolidated billing process.

01.

DISCOVER

We create scalable project solutions that inspire
the path ahead.

02.

PROCURE

We will be transparent
when we procure what
we agreed together.

03.

BUILD

We will do the hard work
for you so you can
stay stress free.

04.

DELIVER

We will deliver on our promises so you can enjoy a seamless experience.

05.

SUPPORT

We have a support team committed to giving you
peace of mind.

Testimonials.

What our customers say about us.

“ACS have expertise and are not sold on selling you anything that they have, they will sell you a solution that is right for you.”

Rob Parkes
Head of commercial operations at the Silverstone experience

“By working in partnership our IT spend is fixed and user satisfaction has also increased across the business.”

Paul Griffiths
Chief Executive- Northamptonshire Chamber

“We have been using ACS as our preferred supplier for 9 years after a recommendation from a parent. We purchase our day to day IT equipment from ACS. I can rely on them to deliver and supply the technology that I need within my budget. The overall services that ACS provide are cost effective, reliable and the team is always friendly.”

Chris Dicken
Teacher & IT Coordinator- Parklands Primary School

“ACS have been our trusted partner of choice for best value workplace ideas and IT support for 21 years. A ‘true’ partnership means you share the good times of growth and the tough times the economy can give you. A 21 year partnership speaks volumes!“

Simon Bond, O’Riordan Bond
Joint Managing Director

CEHCisco Coloured LogoKnow Be 4 Coloured LogoMicrosoft Gold Partner Coloured LogoMimecast Coloured LogoWebroot Coloured Logo

not found what you’re looking for?

Discover our other services

Technology Icon White

technology

We provide and implement Technology for a more connected, efficient and modern workplace.

Communication Icon White

communications

We deliver integrated Communications around your workforce behaviour for real business benefit.

Interiors Icon White

interiors

We create bespoke interior designs that places your workforce behaviour at the heart of our approach.

Get In Touch

We are focused and ready to respond in winning ways

We want all our clients to feel calm and assured of their choices. Our team understand that engaging ACS for workplace projects is big deal for you. Your needs are our focus and your budget can be honoured. We will take the time to discover your bespoke needs then take you on a step by step journey of delivery. Our support team are always on hand to help.

The ACS Brochure

We strive to help businesses perform at their best