DETECTION OVERVIEW
Risk Factors
Unusual data transfers can be associated with risky activity such as sharing malicious files between compromised devices or data staging. Data staging is the process of collecting and preparing data for exfiltration. Depending on the sensitivity of the transferred files, the impact can be devastating if important, proprietary, or customer data is leaked.
The system might change the risk score for this detection.
Kill Chain
Risk Score
60
N/A
Implement strict rules for outbound traffic on devices that contain valuable data
Track suspicious activity by implementing strict audit controls on important documents