{"id":2065,"date":"2022-09-05T13:08:42","date_gmt":"2022-09-05T11:08:42","guid":{"rendered":"https:\/\/www.ixperta.com\/tech-talks\/ako-predchadzat-uniku-citlivych-dat\/"},"modified":"2025-10-10T10:51:42","modified_gmt":"2025-10-10T08:51:42","slug":"how-to-prevent-sensitive-data-leaks","status":"publish","type":"post","link":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/","title":{"rendered":"Interview: How to Prevent Sensitive Data Leaks?"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Imagine your medical records ending up on the dark web, with someone threatening to use them against you. Among the biggest cybersecurity challenges of 2022 are remote work, attacks on cloud systems, phishing, and ransomware. How can organizations effectively face these risks?<\/p>\n","protected":false},"author":2,"featured_media":1626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[55],"tags":[79,77],"class_list":["post-2065","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interview-en","tag-digitalization","tag-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Prevent Data &amp; Information Loss<\/title>\n<meta name=\"description\" content=\"Roman Varga, CSO at D\u00f4vera, shares insights on preventing sensitive data leaks. Read the full interview.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Prevent Data &amp; Information Loss\" \/>\n<meta property=\"og:description\" content=\"Roman Varga, CSO at D\u00f4vera, shares insights on preventing sensitive data leaks. Read the full interview.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/\" \/>\n<meta property=\"og:site_name\" content=\"IXPERTA\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-05T11:08:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-10T08:51:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ixperta.com\/wp-content\/uploads\/2022\/09\/roman-Varga.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Katarina Kub\u016f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katarina Kub\u016f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/\"},\"author\":{\"name\":\"Katarina Kub\u016f\",\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/#\\\/schema\\\/person\\\/313dc266794e227463cd8f06bd17d063\"},\"headline\":\"Interview: How to Prevent Sensitive Data Leaks?\",\"datePublished\":\"2022-09-05T11:08:42+00:00\",\"dateModified\":\"2025-10-10T08:51:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/\"},\"wordCount\":7,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ixperta.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/roman-Varga.webp\",\"keywords\":[\"Digitalization\",\"Technology\"],\"articleSection\":[\"Interview\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/\",\"url\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/\",\"name\":\"How to Prevent Data & Information Loss\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ixperta.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/roman-Varga.webp\",\"datePublished\":\"2022-09-05T11:08:42+00:00\",\"dateModified\":\"2025-10-10T08:51:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/#\\\/schema\\\/person\\\/313dc266794e227463cd8f06bd17d063\"},\"description\":\"Roman Varga, CSO at D\u00f4vera, shares insights on preventing sensitive data leaks. Read the full interview.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ixperta.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/roman-Varga.webp\",\"contentUrl\":\"https:\\\/\\\/www.ixperta.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/roman-Varga.webp\",\"width\":640,\"height\":427},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/how-to-prevent-sensitive-data-leaks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interview: How to Prevent Sensitive Data Leaks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/\",\"name\":\"IXPERTA\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/#\\\/schema\\\/person\\\/313dc266794e227463cd8f06bd17d063\",\"name\":\"Katarina Kub\u016f\",\"url\":\"https:\\\/\\\/www.ixperta.com\\\/en\\\/tech-talks\\\/author\\\/katarina-kubu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Prevent Data & Information Loss","description":"Roman Varga, CSO at D\u00f4vera, shares insights on preventing sensitive data leaks. Read the full interview.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/","og_locale":"en_US","og_type":"article","og_title":"How to Prevent Data & Information Loss","og_description":"Roman Varga, CSO at D\u00f4vera, shares insights on preventing sensitive data leaks. Read the full interview.","og_url":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/","og_site_name":"IXPERTA","article_published_time":"2022-09-05T11:08:42+00:00","article_modified_time":"2025-10-10T08:51:42+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.ixperta.com\/wp-content\/uploads\/2022\/09\/roman-Varga.webp","type":"image\/webp"}],"author":"Katarina Kub\u016f","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Katarina Kub\u016f","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/#article","isPartOf":{"@id":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/"},"author":{"name":"Katarina Kub\u016f","@id":"https:\/\/www.ixperta.com\/en\/#\/schema\/person\/313dc266794e227463cd8f06bd17d063"},"headline":"Interview: How to Prevent Sensitive Data Leaks?","datePublished":"2022-09-05T11:08:42+00:00","dateModified":"2025-10-10T08:51:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/"},"wordCount":7,"commentCount":0,"image":{"@id":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ixperta.com\/wp-content\/uploads\/2022\/09\/roman-Varga.webp","keywords":["Digitalization","Technology"],"articleSection":["Interview"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/","url":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/","name":"How to Prevent Data & Information Loss","isPartOf":{"@id":"https:\/\/www.ixperta.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/#primaryimage"},"image":{"@id":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ixperta.com\/wp-content\/uploads\/2022\/09\/roman-Varga.webp","datePublished":"2022-09-05T11:08:42+00:00","dateModified":"2025-10-10T08:51:42+00:00","author":{"@id":"https:\/\/www.ixperta.com\/en\/#\/schema\/person\/313dc266794e227463cd8f06bd17d063"},"description":"Roman Varga, CSO at D\u00f4vera, shares insights on preventing sensitive data leaks. Read the full interview.","breadcrumb":{"@id":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/#primaryimage","url":"https:\/\/www.ixperta.com\/wp-content\/uploads\/2022\/09\/roman-Varga.webp","contentUrl":"https:\/\/www.ixperta.com\/wp-content\/uploads\/2022\/09\/roman-Varga.webp","width":640,"height":427},{"@type":"BreadcrumbList","@id":"https:\/\/www.ixperta.com\/en\/tech-talks\/how-to-prevent-sensitive-data-leaks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ixperta.com\/en\/"},{"@type":"ListItem","position":2,"name":"Interview: How to Prevent Sensitive Data Leaks?"}]},{"@type":"WebSite","@id":"https:\/\/www.ixperta.com\/en\/#website","url":"https:\/\/www.ixperta.com\/en\/","name":"IXPERTA","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ixperta.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ixperta.com\/en\/#\/schema\/person\/313dc266794e227463cd8f06bd17d063","name":"Katarina Kub\u016f","url":"https:\/\/www.ixperta.com\/en\/tech-talks\/author\/katarina-kubu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ixperta.com\/en\/wp-json\/wp\/v2\/posts\/2065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ixperta.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ixperta.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ixperta.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ixperta.com\/en\/wp-json\/wp\/v2\/comments?post=2065"}],"version-history":[{"count":3,"href":"https:\/\/www.ixperta.com\/en\/wp-json\/wp\/v2\/posts\/2065\/revisions"}],"predecessor-version":[{"id":3293,"href":"https:\/\/www.ixperta.com\/en\/wp-json\/wp\/v2\/posts\/2065\/revisions\/3293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ixperta.com\/en\/wp-json\/wp\/v2\/media\/1626"}],"wp:attachment":[{"href":"https:\/\/www.ixperta.com\/en\/wp-json\/wp\/v2\/media?parent=2065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ixperta.com\/en\/wp-json\/wp\/v2\/categories?post=2065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ixperta.com\/en\/wp-json\/wp\/v2\/tags?post=2065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}