{"id":30540,"date":"2020-10-05T00:38:33","date_gmt":"2020-10-04T19:08:33","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=30540"},"modified":"2020-10-05T00:38:33","modified_gmt":"2020-10-04T19:08:33","slug":"email-threat-types-data-exfiltration","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/email-threat-types-data-exfiltration\/","title":{"rendered":"Email threat types:  Data exfiltration"},"content":{"rendered":"<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Data exfiltration, sometimes referred to as data theft, is the unauthorized transfer of data from your computer, network, or other devices. The stolen data is transferred from the victim to a control server or some other device that is controlled by the attacker. This data is often sold on the dark web and used by other criminals for\u00a0<a class=\"pretty-link-keyword\" title=\"Barracuda Spear Phishing Blog \" href=\"https:\/\/blog.barracuda.com\/spearphishing\" target=\"_blank\" rel=\"noopener noreferrer\">spear phishing<\/a>, identity theft, and other advanced threats.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">A comprehensive data loss prevention (DLP) system will scan all outbound emails and other network traffic to look for pre-determined patterns or keywords, such as credit card numbers or HIPAA medical terms. Emails containing this type of information are either blocked, encrypted, or quarantined for a review.<\/span><\/p>\n<p><span style=\"color: #800000;\"><strong><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Video | 13 Email Threat Types<\/span><\/strong><\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"13 Email Threat Types to Know About Right Now | Data Exfiltration\" width=\"696\" height=\"392\" src=\"https:\/\/www.youtube.com\/embed\/NBJ-UdLeaoo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Data exfiltration is one of the threats identified in our free e-book,\u00a0<a href=\"https:\/\/www.barracuda.com\/13-threats-report?utm_source=blog&amp;utm_medium=41983\">13 Email Threats to Know About Right Now<\/a>, and is\u00a0<a href=\"https:\/\/blog.barracuda.com\/2020\/04\/27\/why-maze-ransomware-is-so-dangerous-to-healthcare\/\">sometimes part of a larger attack<\/a>.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Download your free copy of the e-book,\u00a0<a href=\"https:\/\/www.barracuda.com\/13-threats-report?utm_source=blog&amp;utm_medium=41983\">13 Email Threats to Know About Right Now<\/a>, to learn how to defend against data exfiltration and other dangerous email threats.<\/span><\/p>\n<h3><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\"><a href=\"https:\/\/www.barracuda.com\/13-threats-report?utm_source=blog&amp;utm_medium=41983\">Get your copy of the e-book<\/a><\/span><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>Data exfiltration, sometimes referred to as data theft, is the unauthorized transfer of data from your computer, network, or other devices. The stolen data is transferred from the victim to a control server or some other device that is controlled by the attacker. This data is often sold on the dark web and used by [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13764,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[13731,14347,14348],"class_list":{"0":"post-30540","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-pics-and-videos","8":"tag-data-exfiltration","9":"tag-email-threat-types","10":"tag-types-of-email-threats"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/30540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=30540"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/30540\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/13764"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=30540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=30540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=30540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}