back caretBlog

ExtraHop Security Advisory: Phoning Home Data

Four examples plus best practices to avoid this potential risk

If you rely on third-party vendors for anything from infrastructure and applications to security, those vendors likely "phone home" your data to their environments.

"Phoning home" is the common practice of a host connecting to a server for the purpose of sending data to the server, and it has several legitimate benefits. But if it's done without your consent, it can pose risks to your data security, privacy, and compliance.

Download the security advisory to see four real-world examples of data being "phoned home" without permission, plus learn security, privacy, and compliance best practices, and get questions every customer should ask their vendors.

ExtraHop Reveal(x) Live Activity Map

Stop Breaches 87% Faster

Investigate a live attack in the full product demo of ExtraHop Reveal(x), network detection and response, to see how it accelerates workflows.

Start Demo

Sign Up to Stay Informed