Managing Private Content Exposure Risk in 2024

Managing your data privacy and compliance risks becomes increasingly more difficult by the year. Cybercriminals continue to evolve their strategies and approaches, making it more difficult to identify, stop, and mitigate the damages of malicious attacks. Recognising they can breach hundreds, or even thousands, of companies and millions of records with one successful attack, many rogue nation-states and cybercriminals have turned to the supply chain, a trend we believe will increase in 2024. Third-party vendors, including technology providers, represented 15% of all successful data breaches last year. And as generative artificial intelligence (GenAI) large language models (LLMs) take the digital landscape by storm, tracking and controlling our sensitive content became even harder. 

In response, regulatory bodies are evolving their existing data privacy regulations and adding new ones. They also ratcheted up fines and penalties targeting regulatory violations. This “reactionary movement” will not slow down but continue to pick up pace in the coming year. All of this means organisations must track and control content access and generate more audit log reports to demonstrate compliance with relevant compliance requirements.

Big isn’t always better

The number of employees and third parties using generative artificial intelligence (GenAI) large language models (LLMs) will increase in 2024 as the competitive advantages become too significant to ignore. This will expand the threat surface and the potential for sensitive content to be inadvertently or intentionally exposed.

Even with advances in security controls, high-profile data breaches stemming from GenAI LLM misuse are likely. This will force data security to be a central part of GenAI LLM strategies. Organisations slow to adapt will face brand reputation damage, lost revenue opportunities, potential regulatory fines and penalties, and ongoing litigation costs. 

A need for MFT to grow up

Managed file transfer (MFT) tools are used for the digital transfer of data in an automated, reliable, and secure manner using governance tracking and controls for regulatory compliance. However, many are based on decades-old technology. Due to this we have witnessed a spiralling escalation of cyberattacks on them by rogue nation-states and cybercriminals. 

Two major MFT tools experienced zero-day exploits in 2023. In both instances, multiple zero-day vulnerabilities were targeted. If the two MFT attacks in 2023 are any indication, cybercriminals will continue to exploit zero-day vulnerabilities in legacy MFT solutions in 2024. 

Email continues to be targeted

In the past year, malware attacks instigated through email shot up 29%, phishing attacks grew 29% and business email compromise (BEC) increased by 66%. Because of this, more than eight in ten data breaches now target humans as their first line of access using social engineering strategies.  

Unfortunately, legacy email systems lack the requisite security capabilities. Until organisations embrace an email protection gateway where email is sent, received, and stored using zero-trust policy management with single-tenant hosting, email security will remain a serious risk factor. 

Shifting standards

Regulatory bodies will continue evolving data privacy regulations in 2024. They will also likely ratchet up fines too. Recent major fines, like those against Marriott and British Airways, were in large part due to lapses in data security. This precedent indicates regulators will come down hard any organisation that negligently expose personal data. This means businesses will, more than ever, need to track and control content access and generate audit log reports to demonstrate compliance. 

Gartner predicts that personal data for three-quarters of the world’s population will be covered by data privacy regulations by the end of 2024, and the average annual budget for privacy in a company will exceed $2.5 million. 

The need for more stringent data sovereignty

Data sovereignty will be an increasing challenge for organisations in 2024. New privacy laws often require organisations to control the country where data resides. This can be a significant challenge for multinational businesses. Yet at the same time, data democratisation – the practice of making data accessible and consumable for everyone in an enterprise regardless of technical skill – is a trend that will impact data sovereignty. 

The good news is that data sovereignty inherently empowers organisations to maintain compliance with local and international data regulations. This minimises legal risks, establishes a reputation for responsible data handling, and helps companies avoid hefty fines. By prioritising data sovereignty, organisations will be able to build trust with customers and stakeholders alike.

Move towards DRM to protect sensitive content

As files grow every larger, having robust solutions for secure handling and storage of them become ever more important.

Digital rights management (DRM) adoption will clearly accelerate in 2024 as organisations aim to protect sensitive content and comply with expanding regulations. Data classification and DRM policy management will drive organisations to institute data protection using least-privilege access and watermarks for low-risk data, view-only DRM for moderate-risk data, to safe video-streamed editing that blocks downloads and copy and paste for high-risk data. Highly regulated industry sectors such as healthcare and finance will be the biggest adopters. 

Businesses need to hit the reset button

In 2024, businesses will be under heightened strain to protect confidential data amidst escalating cyber threats and to ensure adherence to burgeoning international regulatory standards. It is time for organisations to look at alternatives. 

The landscape of sensitive content communication has changed and will continue to do so over the next 12 months. Yet, by adopting zero-trust architectures, detailed security models based on content, strong access management, integrated DRM, DLP, and other leading-edge security measures, organisations large and small can mitigate risks and uphold compliance. It is time for organisations should hit reset on their sensitive content communication strategies and work to ensure they have the right technologies in place to protect all their file and email data communications.

Tim Freestone

Tim Freestone joined Kiteworks in 2021 and brings over 15 years of experience in marketing and marketing leadership, including demand generation, brand strategy, and process and organisational optimisation. Tim was previously Vice President of Marketing at Contrast Security, a scale-up application security company. Before Contrast, Tim was the Vice President of Corporate Marketing at Fortinet, a multi-billion-dollar, next-generation firewall and cloud security company. Tim holds a Bachelor’s degree in Political Science and Communication Studies from The University of Montana.

Cheltenham MSP is first official local cyber advisor

Neil Smith Managing Director of ReformIT • 23rd April 2024

ReformIT, a Managed IT Service and Security provider (MSP) based in the UK’s cyber-capital, Cheltenham, has become the first MSP in the local area to be accredited as both a Cyber Advisor and a Cyber Essentials Certification Body. The Cyber Advisor scheme was launched by the Government’s official National Cyber Security Centre (NCSC) and the...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...

From Shadow IT to Shadow AI

Mark Molyneux • 16th April 2024

Mark Molyneux, EMEA CTO from Cohesity, explains the challenges this development brings with it and why, despite all the enthusiasm, companies should not repeat old mistakes from the early cloud era.

Fixing the Public Sector IT Debacle

Mark Grindey • 11th April 2024

Public sector IT services are no longer fit for purpose. Constant security breaches. Unacceptable downtime. Endemic over-spending. Delays in vital service innovation that would reduce costs and improve citizen experience.

Best of tech to meet at VivaTech in May

Viva Technology • 10th April 2024

A veritable crossroads for business and innovation, VivaTech once again promises to show why it has become an unmissable stop on the international business calendar. With its expanding global reach and emphasis on crucial themes like AI, sustainable tech, and mobility, VivaTech stands as the premier destination for decoding emerging trends and assessing their economic...