{"id":5221,"date":"2021-06-23T14:17:54","date_gmt":"2021-06-23T12:17:54","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?p=5221"},"modified":"2025-11-18T09:56:18","modified_gmt":"2025-11-18T08:56:18","slug":"data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/","title":{"rendered":"Data protection: one in two leaks is linked to an internal problem in the company"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"940\" height=\"350\" alt=\"Banner article DOT Protection des donn\u00e9es\" title=\"Banner article DOT Protection des donn\u00e9es\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\" class=\"lazyload img-responsive wp-image-6239\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png 940w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:left;\"><p><em>As the years go by, companies are building larger and larger datasets. The development of the Internet of Things and the arrival of new technologies such as 5G are increasing the number of data sources and the amount of information collected is growing every day. To store all this information, companies rely on external solutions, involving phases of migration and information exchange, thus increasing the risk of data leakage.<\/em><\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\"><strong>Storing and exchanging information from the cloud: beware of dangers <\/strong><\/h2><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;\"><p>On the corporate side, most data is stored in the cloud. For reasons such as cost optimization, centralization and ease of use, this is now the preferred method of storage for companies. In fact, if the data is stored remotely, this means that in order to be able to use this information, there must be exchanges between the storage platform and the company\u2019s offices. This multiplication of exchanges increases the risk of leakage and hacking. However, according to the latest figures published by IBM in 2018, more than one in two breaches was caused by human error or a problem with the system. Conversely, only 48% of information leaks were related to attacks... In other words, more than one in two leaks could be avoided as they are due to a company\u2019s operations and internal mistakes.<\/p>\n<p>Moreover, no sector is immune. According to an IBM study, data breaches affect all sectors. While some, such as the financial sector (16 %) and the service sector (15%) are more affected, whereas others, such as commerce (7%) and the public sector (7%) are also exposed.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:#ea5050;--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p><strong>Personal Data and Anonymisation: 5 tips for a successful anonymization project<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#105378;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/resources\/guides-resources\/dot-guide-5-tips-for-a-successful-anonymization-project\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download the Guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\"><strong>Anonymize data and create a secure ecosystem within your company. <\/strong><\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:left;\"><p>To limit problems and data leaks within the company, it is important to create a secure ecosystem, where all parties using information in any way are declared and aware of the risks related to their use of information. In addition to this secure ecosystem, a mapping of information paths must be set up where all areas of data exchange are defined and clearly and precisely supervised. By clarifying data usage in this way, data leaks are avoided by revealing where and when information must be protected and anonymized.<\/p>\n<p>Finally, to avoid system-related errors, the entire ecosystem and tools must be checked to ensure they are compatible, up-to-date and that there are no known errors in the IT infrastructure.<\/p>\n<p>By implementing all these solutions, from data anonymization to the creation of a secure work environment, companies can protect themselves from at least one in two leaks in their system. This is a significant investment, but a positive one in the long term for companies, especially when you consider that the IBM study concluded that the average cost of a single record included was almost $150.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:560px;--awb-max-height:315px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"Iv-vbM6J3FE\" class=\"landscape\" params=\"wmode=transparent&autoplay=1rel=0&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"560\" height=\"315\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anonymize data and create a secure ecosystem at the heart of your business to minimize problems and data leakage. <\/p>\n","protected":false},"author":5,"featured_media":6239,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113],"tags":[],"class_list":["post-5221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data protection: one in two leaks is due to an internal problem in company<\/title>\n<meta name=\"description\" content=\"Data protection: Anonymize data and create a secure ecosystem at the heart of your business to minimize problems and data leakage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data protection: one in two leaks is due to an internal problem in company\" \/>\n<meta property=\"og:description\" content=\"Data protection: Anonymize data and create a secure ecosystem at the heart of your business to minimize problems and data leakage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-23T12:17:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T08:56:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"Data protection: one in two leaks is linked to an internal problem in the company\",\"datePublished\":\"2021-06-23T12:17:54+00:00\",\"dateModified\":\"2025-11-18T08:56:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/\"},\"wordCount\":3198,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/\",\"name\":\"Data protection: one in two leaks is due to an internal problem in company\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\",\"datePublished\":\"2021-06-23T12:17:54+00:00\",\"dateModified\":\"2025-11-18T08:56:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"Data protection: Anonymize data and create a secure ecosystem at the heart of your business to minimize problems and data leakage.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\",\"contentUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png\",\"width\":940,\"height\":350,\"caption\":\"Banner article DOT Protection des donn\u00e9es\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data protection: one in two leaks is due to an internal problem in company","description":"Data protection: Anonymize data and create a secure ecosystem at the heart of your business to minimize problems and data leakage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/","og_locale":"en_US","og_type":"article","og_title":"Data protection: one in two leaks is due to an internal problem in company","og_description":"Data protection: Anonymize data and create a secure ecosystem at the heart of your business to minimize problems and data leakage.","og_url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2021-06-23T12:17:54+00:00","article_modified_time":"2025-11-18T08:56:18+00:00","og_image":[{"width":940,"height":350,"url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png","type":"image\/png"}],"author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"Data protection: one in two leaks is linked to an internal problem in the company","datePublished":"2021-06-23T12:17:54+00:00","dateModified":"2025-11-18T08:56:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/"},"wordCount":3198,"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/","url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/","name":"Data protection: one in two leaks is due to an internal problem in company","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png","datePublished":"2021-06-23T12:17:54+00:00","dateModified":"2025-11-18T08:56:18+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"Data protection: Anonymize data and create a secure ecosystem at the heart of your business to minimize problems and data leakage.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-protection-one-in-two-leaks-is-linked-to-an-internal-problem-in-the-company\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png","contentUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/06\/Banner-article-DOT-Protection-des-donnees.png","width":940,"height":350,"caption":"Banner article DOT Protection des donn\u00e9es"},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/5221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/comments?post=5221"}],"version-history":[{"count":3,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/5221\/revisions"}],"predecessor-version":[{"id":13039,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/5221\/revisions\/13039"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media\/6239"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media?parent=5221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/categories?post=5221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/tags?post=5221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}