Indusface Lays Out Top Data Breach Threats that Enterprises Should be Aware Of

With the number of data breach incidents continuously rising, enterprises must proactively prepare themselves against top threats, suggests Indusface

New Delhi, India – April 29, 2015  – Indusface, a leading provider of application security solutions for web and mobile applications, has worked out the potential threats that can lead to data breaches, along with ways to deal with these loopholes. While many organisations do understand the importance of sensitive information as most important business decisions are based on such data, not many organisations take proactive measures to protect the same.

Mr Ashish Tandon, Chairman and CEO, Indusface says, “Where big organisations have the resources to handle a data breach, the small and medium enterprises don’t. With big data and cloud being deemed as the way into the future, there is a need to identify the risk factors and deal with them without losing time.

Here are some potential threats that can lead to data breaches, along with ways to deal with these loopholes:

  • Top Web App Vulnerabilities

According to a Gartner report, 75 % of the hacking attempts take place at the application layer. The Open Web Application Security Project, popularly known as the OWASP, has listed top 10 application vulnerabilities that can be exploited by attackers. of these the input injection or SQL injection is the most sought after measure deployed by the attackers to access a database. Hackers use malicious codes to trick web applications into providing unauthorized access.

The detected application vulnerabilities can then be mitigated through a managed web application firewall. It shields the application without any changes to the code and makes sure that attackers cannot exploit the vulnerabilities.

  • Unrestricted Access to Employees

Most organisations face an internal abuse of the database and server privileges. The lack of implementing controlled access to trusted employees often leads to a loss of sensitive information. Privilege control mechanism control according to job profiles need to be monitored periodically.

  •  Malware

Malware is another example of the widely used attack mechanism used by the hackers that install these executable code scripts that remain untraced for long periods and send data to the owner in batches without any notification to the system administrator.

 Regular malware hunting is critical for enterprise and government websites to prevent the transmission of sensitive data. System and web application scanning can help detect malware through the OSI layers.

  •  Weak Database Management

Databases record huge chunks of information and it’s often impossible to keep track of what’s where on the server. As a matter of fact, most organizations do not really pay a lot of attention in the direction and that’s exactly where they fail. Many times during the testing phase of applications too, unknown new databases are created randomly that the security team might not be able to locate. 

  • Weak or No Encryption

Whether it is backup database or data communication over the internet, encryption with unique keys is the best way to ensure that it’s not sniffed around. However, till today, most companies have not switched to best encryption practices and with vulnerabilities like POODLE and FREAK, it gets easier to hack. And for unencrypted data, it’s a nightmare.

In this day and age, data seems to be the most important asset for any organization and there is a need to proactively handle the possible vulnerabilities that may pose serious threats to businesses. Organizations need to adopt advanced encryption techniques. Updated SSL certificates with strong encryption and web application scanning to mark the loopholes would help in dealing with data breaches.” says Mr Tandon.

 # # #

About Indusface

Indusface is an award winning SaaS based total application Security Company with over 700 customers worldwide. It helps safeguard web and mobile applications using its flagship product IndusGuard. The company has been positioned in Magic Quadrant for Application Security Testing by Gartner, recognized by NASSCOM DSCI, Deloitte Technology, Red Herring Top 100 Asia, and ChannelWorld 100. It has also been empanelled by PCI ASV and CERT-IN. please visit our official website:


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: