
{"id":3190,"date":"2017-03-07T00:00:00","date_gmt":"2017-03-07T00:00:00","guid":{"rendered":"http:\/\/otava.test\/what-is-data-jacking-and-how-do-you-protect-against-it\/"},"modified":"2017-03-07T00:00:00","modified_gmt":"2017-03-07T00:00:00","slug":"what-is-data-jacking-and-how-do-you-protect-against-it","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/","title":{"rendered":"How to prevent data jacking"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17121 alignright\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/data-jacking.jpg\" alt=\"Data Jacking\" width=\"350\" height=\"245\" \/>As the gap between desktop and mobile becomes smaller and smaller, businesses are encouraging the use of mobile apps and a BYOD environment. But with this power of creativity and productivity comes responsibility to security, and that\u2019s something many CISOs are worried about.<\/p>\n<p>One of these threats to enterprise security is <strong>data jacking<\/strong>. It\u2019s the misuse or theft of data on a mobile from its primary owner. Examples of data jacking include <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/what-is-ransomware-and-how-do-you-protect-against-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware<\/a>, mobile malware, and theft of mobile devices that have sensitive, unencrypted information such as medical data or financial records. In fact, 24 percent of <a href=\"https:\/\/www.hipaajournal.com\/largest-healthcare-data-breaches-of-2016-8631\/\" target=\"_blank\" rel=\"noopener noreferrer\">data breaches<\/a> reported to the Office of Civil Rights in 2016 involved the loss or theft of an unencrypted device such as a USB drive, laptop or cellphone. Data encryption technology on those devices could have prevented the exposure of 1.5 million records last year due to data jacking.<\/p>\n<p>Data jacking also extends to the network at large. <a href=\"https:\/\/threatpost.com\/open-databases-a-juicy-extortion-target\/123688\/\" target=\"_blank\" rel=\"noopener noreferrer\">Reports<\/a> surfaced from Kaspersky Lab and others in December 2016 of criminals exploiting open installations of MongoDB and Hadoop databases and holding the information hostage. In that case, attackers simply scanned the internet for the open installations, copied and deleted the contents, and left behind a ransom note for the victim. In some instances, the data was permanently destroyed beforehand\u2014meaning the company never got it back despite paying the ransom. These types of attacks increased 400 percent over a matter of weeks since they were first discovered.<\/p>\n<p>As BYOD, mobile platforms and cloud computing continue to grow, CISOs are understandably worried. According to a 2014 Gartner report, more than 75 percent of mobile applications would fail basic security tests. Between the security vulnerabilities and employee carelessness, what can you do to protect yourself?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Four_steps_to_take_to_prevent_data_jacking\"><\/span>Four steps to take to prevent data jacking<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><strong>Put strong security measures in place when using third-party or open source software<\/strong>. It is worth noting that the default installation of MongoDB does not require authentication to access the database\u2014a real security risk.<\/li>\n<li><strong>Test your systems more than once a year<\/strong>. Is everything working properly? Are there any security holes that might have popped up? Testing doesn\u2019t just provide benefits to your <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/testing-testing-why-you-shouldnt-wait-for-a-live-failover\/\" target=\"_blank\" rel=\"noopener noreferrer\">disaster recovery<\/a>\u00a0system, it&#8217;s good for your production as well.<\/li>\n<li><strong>Limit app permissions<\/strong>. Do you really need your health app to access your contacts? The more data you give an app permission to see, the more you put yourself at risk should it be compromised.<\/li>\n<li><strong>Ensure secure, encrypted phone messaging<\/strong>. Employees don\u2019t regularly worry if their communications are secure. If you automatically enable encrypted messaging on work devices, you won\u2019t have to worry about it, either.<\/li>\n<\/ol>\n<p>Ransomware and <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/how-does-ransomware-as-a-service-work\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ransomware-as-a-Service<\/a> have\u00a0paved the way for data jacking in general, so it\u2019s sure to become more common as hackers seek to make easy profits with little work involved. In a growing cloud adoption world, it\u2019s more important than ever to make sure your network is as secure as possible and protect your <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/why-you-should-value-your-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">data<\/a>. If you\u2019re interested in learning more about a secure cloud infrastructure or a <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">defense-in-depth<\/a> strategy, visit our <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\" target=\"_blank\" rel=\"noopener noreferrer\">cloud page<\/a>\u00a0or <a href=\"https:\/\/otavawebsite.wpengine.com\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\">contact us<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the gap between desktop and mobile becomes smaller and smaller, businesses are encouraging the use of mobile apps and a BYOD environment. But with this power of creativity and productivity comes responsibility to security, and that\u2019s something many CISOs are worried about. One of these threats to enterprise security is data jacking. It\u2019s the misuse or theft of data on a mobile from its primary owner. Examples of data jacking include ransomware, mobile malware, and theft of mobile devices that have sensitive, unencrypted information such as medical data or financial records. In fact, 24 percent of data breaches reported to the Office of Civil Rights in 2016 involved the loss or theft of an unencrypted device such as a USB drive, laptop or cellphone. Data encryption technology on those devices could have prevented the exposure of 1.5 million records last year due to data jacking. Data jacking also extends to the network at large. Reports surfaced from Kaspersky Lab and others in December 2016 of criminals exploiting open installations of MongoDB and Hadoop databases and holding the information hostage. In that case, attackers simply scanned the internet for the open installations, copied and deleted the contents, and left behind&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-3190","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to prevent data jacking | OTAVA<\/title>\n<meta name=\"description\" content=\"One of these threats to enterprise security is data jacking. It\u2019s the misuse or theft of data on a mobile from its primary owner.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to prevent data jacking\" \/>\n<meta property=\"og:description\" content=\"One of these threats to enterprise security is data jacking. It\u2019s the misuse or theft of data on a mobile from its primary owner.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-07T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/data-jacking.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"How to prevent data jacking\",\"datePublished\":\"2017-03-07T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/\"},\"wordCount\":522,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/data-jacking.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/\",\"url\":\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/\",\"name\":\"How to prevent data jacking | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/data-jacking.jpg\",\"datePublished\":\"2017-03-07T00:00:00+00:00\",\"description\":\"One of these threats to enterprise security is data jacking. It\u2019s the misuse or theft of data on a mobile from its primary owner.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/data-jacking.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/data-jacking.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to prevent data jacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to prevent data jacking | OTAVA","description":"One of these threats to enterprise security is data jacking. It\u2019s the misuse or theft of data on a mobile from its primary owner.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/","og_locale":"en_US","og_type":"article","og_title":"How to prevent data jacking","og_description":"One of these threats to enterprise security is data jacking. It\u2019s the misuse or theft of data on a mobile from its primary owner.","og_url":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/","og_site_name":"OTAVA","article_published_time":"2017-03-07T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/data-jacking.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"How to prevent data jacking","datePublished":"2017-03-07T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/"},"wordCount":522,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/data-jacking.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/","url":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/","name":"How to prevent data jacking | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/data-jacking.jpg","datePublished":"2017-03-07T00:00:00+00:00","description":"One of these threats to enterprise security is data jacking. It\u2019s the misuse or theft of data on a mobile from its primary owner.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/data-jacking.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/data-jacking.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"How to prevent data jacking"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=3190"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3190\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=3190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=3190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=3190"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=3190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}