

A weak or non - existing document disposal proceduremay cause
leakage of company information
by improper use or other reason(passive) caused by
Any personal leakage of information
casewill discover
information leaks
by people(passive) caused by
information leaks
by Attack Techniques(passive) Caused by
Information Leaks
malware or employees(passive) caused by
information leaks
cyberattacks as a material risk for the Group(passive) caused by
information leaks
by malware(passive) caused by
information leaks
malware(passive) caused by
information leaks
by negligence(passive) caused by
information leaks
the vulnerabilityto cause
information leaks
by direct work into this(passive) caused by
information leak
by hackers(passive) caused by
information leaks
by cyber - attacks(passive) caused by
information leaks
Missing initialization flaws in the Linux kernelcould lead
information leaks
The hackingcould cause
information leaks
only half of companiesdiscover
information leaks
by hacks(passive) caused by
Information leaks
A set of Januarydiscovered
information leaks
the sitesare designed
leak information
The WebRTC bugcan cause
information leaks
glitches(passive) caused by
information leaks
persistent abilityto cause
information leaks
by individual processes(passive) caused by
Information leak
by carelessness and human error(passive) caused by
information leaks
more open accesscan cause
information leaks
breaches in the structure which can be some of the employees or other executives in the organizationmight have caused
information leaks
by a natural disaster(passive) caused by
information leaks
Attackers may exploit the vulnerabilityto cause
information leaks
Attackers can exploit this vulnerabilityto cause
information leak
to download some files without authorizationcausing
information leak
shadow IT and advanced cyber attacks(passive) caused by
information leaks
by outside attackers exploiting software vulnerabilities(passive) caused by
information leaks
by malicious but authorized insiders(passive) caused by
information leaks
Attackers with high permissions can exploit this vulnerabilityto cause
information leak
by repetitive blocks(passive) caused by
information leak
unencrypted DNS requests(passive) caused by
information leaks
a too long message ... ableto cause
leakage of precious information
glitches or the inability to locate precisely where a design is leaking information(passive) caused by
information leaks
the electrons to transfer between the gatesthereby causing
information leak
in a loss of confidentialitywould result
in a loss of confidentiality
in a loss of confidentiality andwould result
in a loss of confidentiality and
to big troublecan leads
to big trouble
to significant monetary lossescan lead
to significant monetary losses
to loss of potential investment opportunitiescould lead
to loss of potential investment opportunities
to reputation loss and ultimatelyleading
to reputation loss and ultimately
to identity theftcould lead
to identity theft
in identity theftresult
in identity theft
from the underground worldoriginating
from the underground world
the most common listlead
the most common list
through several mechanismscan result
through several mechanisms
in embarrassment to some official or departmentresults
in embarrassment to some official or department
from side - channel attacksresulting
from side - channel attacks
with your advisory teamseldom originate
with your advisory team
to some slippery situations for somehave led
to some slippery situations for some
to corruption investigationscould lead
to corruption investigations
anxiety among employeescan cause
anxiety among employees
the reliability and trust of an organizationcan even influence
the reliability and trust of an organization
a containment breachcould cause
a containment breach
you being sued or even facing criminal chargescould lead
you being sued or even facing criminal charges
in longer time frames and more workresult
in longer time frames and more work
problems within the rankscan cause
problems within the ranks
to de - anonymizationcould lead
to de - anonymization
issues within the ranksmay cause
issues within the ranks
to heavy risk and loss for a companymight lead
to heavy risk and loss for a company
the US electionto influence
the US election
in business lossmay result
in business loss
in loss of competitive advantage and brand damagemay result
in loss of competitive advantage and brand damage
to heavy risk and lossmight lead
to heavy risk and loss
the damage(passive) caused by
the damage
the damage(passive) caused by
the damage
a lot of direct harm to the customerwill ... cause
a lot of direct harm to the customer
serious loss and damage to a customermay cause
serious loss and damage to a customer
problemscan cause
problems
damage to the national securitycould cause
damage to the national security
in severe issuescan result
in severe issues
severe issuesmay cause
severe issues
to huge chaosto lead
to huge chaos