{"id":3160,"date":"2022-12-22T12:48:50","date_gmt":"2022-12-22T12:48:50","guid":{"rendered":"http:\/\/the-codest.localhost\/blog\/cyber-security-dilemmas-data-leaks\/"},"modified":"2026-03-09T13:03:06","modified_gmt":"2026-03-09T13:03:06","slug":"kibernetinio-saugumo-dilemos-duomenu-nutekejimas","status":"publish","type":"post","link":"https:\/\/thecodest.co\/lt\/blog\/cyber-security-dilemmas-data-leaks\/","title":{"rendered":"Kibernetinio saugumo dilemos: Duomen\u0173 nutek\u0117jimas"},"content":{"rendered":"<p>Kal\u0117dos - tai ne tik ma\u017emenin\u0117s prekybos pramon\u0117s derlius, bet ir svarbiausias metas <strong>kibernetiniai nusikalt\u0117liai<\/strong>. \u0160iuo met\u0173 laiku<strong> \u012fsilau\u017eimo atakos<\/strong> vis da\u017eniau pasitaiko vagys\u010di\u0173 arba suk\u010diavimo atvej\u0173. Tai kelia problem\u0173 ne tik vartotojams, bet ir \u012fmon\u0117ms, kurioms <strong><a href=\"https:\/\/thecodest.co\/lt\/blog\/app-data-collection-security-risks-value-and-types-explored\/\">duomenys<\/a> nutek\u0117jimas<\/strong> rei\u0161kia finansinius nuostolius ir \u017eal\u0105 j\u0173 reputacijai. Pokal\u0117dinis laikotarpis - puikus metas pagalvoti, kaip \u012fmon\u0117s gali apsisaugoti nuo duomen\u0173 nutek\u0117jimo?<\/p>\n<ul>\n<li>Klient\u0173 saugumas yra pasitik\u0117jimo prek\u0117s \u017eenklu k\u016brimo dalis<\/li>\n<li>Kaip apsaugoti duomenis internete apsiperkant<\/li>\n<li>Taikom\u0173j\u0173 program\u0173 ir infrastrukt\u016bros steb\u0117sena - b\u016bdas apsisaugoti nuo duomen\u0173 nutek\u0117jimo<\/li>\n<li>Klient\u0173 duomen\u0173 nutek\u0117jimas - prane\u0161ti ar neprane\u0161ti?<\/li>\n<li>Kaip prane\u0161ti klientams apie duomen\u0173 nutek\u0117jim\u0105?<\/li>\n<\/ul>\n<h2>Saugus apsipirkimas kovoje d\u0117l klient\u0173<\/h2>\n<p>Pastaraisiais metais <a href=\"https:\/\/thecodest.co\/lt\/blog\/top-programming-languages-to-build-e-commerce\/\">e. prekyba<\/a> buvo technologini\u0173 \"ginklavimosi var\u017eyb\u0173\" d\u0117l kiekvieno kliento metas. \u0160iandien mes ne tik apsiperkame internetu, bet ir patiriame asmenin\u0119 apsipirkimo patirt\u012f. Taip siekiama palengvinti <a href=\"https:\/\/thecodest.co\/lt\/blog\/why-us-companies-are-opting-for-polish-developers\/\">mus<\/a> u\u017epildyti m\u016bs\u0173 pirkini\u0173 krep\u0161el\u012f ir paskatinti mus gr\u012f\u017eti \u012f svetain\u0119 ateityje. <\/p>\n<p>Svarbi min\u0117tos teigiamos apsipirkimo patirties dalis yra pasitik\u0117jimas prek\u0117s \u017eenklu. Dalis \u0161io pasitik\u0117jimo - u\u017etikrinti, kad m\u016bs\u0173 klientai gal\u0117t\u0173 saugiai <strong>apsipirkimas internetu<\/strong> patirtis. Tai galime padaryti informuodami naudotojus apie \u012fsilau\u017eimo gr\u0117smes ir investuodami \u012f priemones ir technologijas, kurios apsaugo nuo <strong>kibernetin\u0117s atakos<\/strong>.<\/p>\n<h2>Kaip klientai gali apsaugoti savo duomenis?<\/h2>\n<p>ChronPESEL.pl ir \"Rzetelna Firma\" u\u017esakymu atlikto tyrimo \"Internetini\u0173 parduotuvi\u0173 patikimumas\" duomenimis, kas ketvirtas respondentas yra gird\u0117j\u0119s apie klient\u0173 asmens duomen\u0173 nutek\u0117jim\u0105 i\u0161 parduotuv\u0117s, kuria naudojosi. Kita vertus, 6 proc. internetini\u0173 parduotuvi\u0173 pirk\u0117j\u0173 parei\u0161k\u0117, kad j\u0173 duomenys i\u0161 ties\u0173 buvo pateikti ne\u012fgaliotiems asmenims. Analiz\u0117 <strong>e. prekyba<\/strong> statistinius duomenis apie internetu apsiperkan\u010di\u0173 \u017emoni\u0173 skai\u010di\u0173, daugiau nei 1,3 mln. \u017emoni\u0173 teko susidurti su tokia situacija.<\/p>\n<p>K\u0105 reik\u0117t\u0173 priminti klientams, kad jie jaust\u0173si saug\u016bs per prie\u0161\u0161ventin\u012f apsipirkimo \u0161\u0117lsm\u0105 internetin\u0117se parduotuv\u0117se? <\/p>\n<p>Pirmiausia atkreipkime svetain\u0117s naudotoj\u0173 d\u0117mes\u012f \u012f netikras el. parduotuves, ypa\u010d tas, kurios apsimeta kitomis svetain\u0117mis. \u012esp\u0117jamoji lemput\u0117 tur\u0117t\u0173 u\u017esidegti, kai pasi\u016blymai tam tikroje<strong> e. parduotuv\u0117 <\/strong>yra nerealiai patraukli arba kai pati svetain\u0117 atrodo \u012ftartina. <\/p>\n<p>Antra, \u0161vieskime savo klientus apie <strong>suk\u010diavimo atakos<\/strong>. Prie\u0161\u0161ventiniu laikotarpiu elektroniniais lai\u0161kais, telefono skambu\u010diais ir tekstin\u0117mis \u017einut\u0117mis bandoma i\u0161gauti konfidencialius duomenis, kuriuose pateikiama informacija apie tariamai nebaigtus apsipirkimo sandorius ar neapmok\u0117tas kurjeri\u0173 siuntas. Persp\u0117kite klientus, kad jie nespaust\u0173 \u012ftartin\u0173 nuorod\u0173, siun\u010diam\u0173 el. pa\u0161tu ar telefonu, ir kad telefonini\u0173 pokalbi\u0173 metu neteikt\u0173 asmenin\u0117s ar konfidencialios informacijos. Skatinkite saugius mok\u0117jimus, pagr\u012fstus dviej\u0173 etap\u0173 sandori\u0173 autenti\u0161kumo patvirtinimu. <\/p>\n<h2>Kaip saugome savo klient\u0173 duomenis?<\/h2>\n<p>Vienas dalykas yra \u0161viesti klientus, ta\u010diau u\u017etikrinti j\u0173 saugum\u0105 m\u016bs\u0173 svetain\u0117je - atskira problema. \u0160iame am\u017eiuje, kai daug\u0117ja <strong>kibernetini\u0173 nusikalt\u0117li\u0173 veikla<\/strong>, tur\u0117tume b\u016bti pasireng\u0119 <strong>\u012fsilau\u017eimo atakos<\/strong> ir j\u0173 pasekmes. Kaip? Savo \u012fmon\u0117je verta \u012fdiegti ankstyvo gr\u0117smi\u0173 aptikimo politik\u0105, steb\u0117ti verslo program\u0173 ir infrastrukt\u016bros veikim\u0105 ir saugum\u0105. <\/p>\n<p>Svetain\u0117je <a href=\"https:\/\/thecodest.co\/lt\/blog\/vibrant-upturn-charting-the-resolute-rise-of-swedish-firms\/\">The Codest<\/a>, mes teikiame <strong>nuolatin\u0117s steb\u0117senos paslaugos<\/strong> u\u017e kliento nuosavos arba debes\u0173 infrastrukt\u016broje (arba abiejose kartu) veikian\u010di\u0173 IT sistem\u0173 na\u0161um\u0105 ir saugum\u0105.<\/p>\n<p>\u0160is <strong>steb\u0117jimo paslaugos<\/strong> daugiausia d\u0117mesio skiriama veikian\u010di\u0173 sistem\u0173 na\u0161umui, susijusiam su pralaidumu, ir prijungt\u0173 IT sistem\u0173 integracijos kokybei. Tai apima tokius svarbius aspektus<strong> e. prekyba<\/strong> kaip <a href=\"https:\/\/thecodest.co\/lt\/dictionary\/payment-gateways\/\">mok\u0117jimo vartai<\/a>, siuntimo sistemos ir prijungtos CRM bei ERP sistemos.<\/p>\n<p>Svarbiausias apsaugos nuo duomen\u0173 nutek\u0117jimo elementas yra poreikis patikrinti, ar<strong> kibernetini\u0173 atak\u0173 gr\u0117sm\u0117s<\/strong> gamybin\u0117je aplinkoje, t. y. tokioje, kuri prieinama galutiniam klientui. Periodinis testavimas yra skirtas galimoms sistem\u0173 pa\u017eeid\u017eiamoms vietoms u\u017efiksuoti ir leisti jas i\u0161taisyti prie\u0161 \u012fvykstant incidentui. Kiekvienas pakeitimas ir atnaujinimas IT srityje, prie\u0161 j\u012f paskelbiant, yra testuojamas, kad b\u016bt\u0173 i\u0161ai\u0161kintos klaidos. <\/p>\n<p>\u0160i paslauga yra <a href=\"https:\/\/thecodest.co\/services\/devops-engineers\/\">DevOps komandos aptarnavimas vis\u0105 par\u0105, 7 dienas per savait\u0119<\/a>t. y. programavimo ir operacij\u0173 skyriai, kuriuose tiek programavimo, tiek administracin\u0117s kompetencijos specialistai r\u016bpinasi klient\u0173 verslo taikom\u0173j\u0173 program\u0173 na\u0161umo ir saugumo u\u017etikrinimu.<\/p>\n<p><a href=\"https:\/\/thecodest.co\/contact\"><img decoding=\"async\" src=\"\/app\/uploads\/2024\/05\/interested_in_continuous_monitoring_services_.png\" alt=\"margaspalvis tekstas su rausvu mygtuku\" title=\"steb\u0117senos paslaug\u0173 reklaminis skydelis \" \/><\/a><\/p>\n<h2>Klient\u0173 duomen\u0173 nutek\u0117jimas - k\u0105 numato \u012fstatymai?<\/h2>\n<p>Iki BDAR \u012fsigaliojimo duomen\u0173 valdytojo pareiga informuoti apie <strong>duomen\u0173 nutek\u0117jimas<\/strong> buvo neprivalomas, neatsi\u017evelgiant \u012f gr\u0117sm\u0117s mast\u0105. \u0160iuo metu, jei duomen\u0173 atskleidimas gali sukelti padidint\u0105 nukent\u0117jusi\u0173 asmen\u0173 teisi\u0173 ir laisvi\u0173 pa\u017eeidimo rizik\u0105, duomen\u0173 valdytojas privalo informuoti \u0161iuos asmenis apie duomen\u0173 nutek\u0117jim\u0105 ar vagyst\u0119. Apie tai taip pat privalome prane\u0161ti <strong>Duomen\u0173 apsaugos institucija<\/strong>. Ta\u010diau \u010dia kyla keletas klausim\u0173. <\/p>\n<p>Pirma, valdiklis turi nustatyti, ar <strong>duomen\u0173 nutek\u0117jimas<\/strong> yra nedidelis incidentas (apie kur\u012f nereikia informuoti naudotoj\u0173) arba jau yra asmens duomen\u0173 saugumo pa\u017eeidimas. Antra, BDAR i\u0161vardyti keli pagrindai, kuriais remiantis nereikia informuoti naudotoj\u0173 apie tai, kad j\u0173 duomenys nutek\u0117jo. <\/p>\n<p>Tod\u0117l daugelis \u012fmoni\u0173 susiduria su dilema, k\u0105 daryti, kai j\u0173 klient\u0173 duomenys i\u0161vysta dienos \u0161vies\u0105. The Codest po\u017ei\u016briu, daugeliu atvej\u0173 apie tok\u012f \u012fvyk\u012f tur\u0117tume informuoti klientus. B\u016btent tai ir yra pasitik\u0117jimo prek\u0117s \u017eenklu k\u016brimas. <\/p>\n<h2>Kaip prane\u0161ti klientams apie duomen\u0173 nutek\u0117jim\u0105?<\/h2>\n<p>Pienas i\u0161siliejo. Tapome duomen\u0173 nutek\u0117jimo auka. K\u0105 tur\u0117tume daryti toliau? Pirmiausia tur\u0117tume parengti veiksm\u0173 strategij\u0105. Viena vertus, ji turi apimti operatyvines priemones, t. y. atsakom\u0105sias priemones, skirtas duomen\u0173 nutek\u0117jimo padariniams suma\u017einti. Kita vertus, tur\u0117tum\u0117te palaikyti skaidr\u0173, nuolatin\u012f bendravim\u0105 su klientais apie duomen\u0173 nutek\u0117jim\u0105. Tai pad\u0117s jums i\u0161vengti galimos \u012fvaizd\u017eio kriz\u0117s ir klient\u0173 pasitik\u0117jimo praradimo arba apriboti jos eskalavim\u0105. <\/p>\n<p>Kitos apklausos, kuri\u0105 Chronpesel.pl u\u017esak\u0117 kartu su Nacionaliniu skol\u0173 registru, duomenimis, nuo duomen\u0173 nutek\u0117jimo nukent\u0117j\u0119 \u017emon\u0117s tikisi, kad jiems kuo grei\u010diau bus prane\u0161ta apie tai, kad buvo pa\u017eeista duomen\u0173 apsauga ir koks yra jos mastas (apie 60 proc. atsakym\u0173). Be to, respondentai nori gauti informacijos apie tai, k\u0105 duomen\u0173 valdytojas padar\u0117, kad ateityje b\u016bt\u0173 i\u0161vengta pana\u0161i\u0173 situacij\u0173 (beveik 57 proc.), taip pat apie tai, kam gal\u0117jo atitekti nutek\u0117j\u0119 duomenys (daugiau kaip 53 proc.).<br \/>\nMa\u017eiausiai norime, kad jie su\u017einot\u0173 apie <strong>duomen\u0173 nutek\u0117jimas<\/strong> i\u0161 laikmenos arba antivirusin\u0117s programin\u0117s \u012frangos. Turime suteikti jiems galimyb\u0119 pasir\u016bpinti ir \"apsaugoti\" savo asmenyb\u0119. <\/p>\n<p>Kokios yra auksin\u0117s bendravimo taisykl\u0117s, kai susiduriama su duomen\u0173 nutek\u0117jimu? Pirmiausia informuokime klientus apie incident\u0105. Parodykime, kad situacija kontroliuojama, kad s\u0105moningai j\u0105 valdome. Nurodykime, k\u0105 darome, kad suma\u017eintume neigiam\u0105 duomen\u0173 nutek\u0117jimo poveik\u012f. Galiausiai, kokias priemones planuojame \u012fgyvendinti, kad ateityje pana\u0161ios situacijos nepasikartot\u0173.<\/p>\n<h2>Apsaugokite duomenis, apsaugokite klient\u0105 <\/h2>\n<p>Remiantis \"Gemius\" parengta ataskaita \"E-commerce Lenkijoje\", 77 proc. vis\u0173 interneto naudotoj\u0173 jau perka internetu. Kas tre\u010dias respondentas pripa\u017e\u012fsta, kad dabar tai daro da\u017eniau nei prie\u0161 pandemij\u0105. Pana\u0161us procentas pastebi, kad po pandemijos internetu perka daugiau produkt\u0173. . <strong>e. prekyba <a href=\"https:\/\/thecodest.co\/lt\/dictionary\/what-is-the-size-of-your-potential-reachable-market\/\">rinka<\/a><\/strong> taip pat auga itin spar\u010diai. D\u0117l to daug\u0117ja kibernetini\u0173 i\u0161puoli\u0173 prie\u0161 interneto naudotoj\u0173 asmeninius duomenis. Apie tai verta pagalvoti, ypa\u010d prie\u0161 Kal\u0117das, ir investicijas \u012f saugum\u0105, kad apsaugotume savo naudotoj\u0173 duomen\u0173 bazes, laikyti geriausia prakti\u0161ka kal\u0117dine dovana, kuri\u0105 galime padovanoti savo klientams.<\/p>","protected":false},"excerpt":{"rendered":"<p>Prie\u0161\u0161ventinis skub\u0117jimas \u012fsib\u0117g\u0117ja. Ie\u0161kodami dovan\u0173 savo artimiesiems, \u017emon\u0117s vis da\u017eniau ry\u017etasi \"\u0161turmuoti\" internetines parduotuves.<\/p>","protected":false},"author":2,"featured_media":3161,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[16,4,8],"tags":[12],"class_list":["post-3160","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-e-commerce","category-enterprise-scaleups-solutions","category-software-development","tag-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Security Dilemmas: Data Leaks - The Codest<\/title>\n<meta name=\"description\" content=\"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thecodest.co\/lt\/tinklarastis\/kibernetinio-saugumo-dilemos-duomenu-nutekejimas\/\" \/>\n<meta property=\"og:locale\" content=\"lt_LT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Dilemmas: Data Leaks\" \/>\n<meta property=\"og:description\" content=\"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thecodest.co\/lt\/tinklarastis\/kibernetinio-saugumo-dilemos-duomenu-nutekejimas\/\" \/>\n<meta property=\"og:site_name\" content=\"The Codest\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-22T12:48:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T13:03:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"thecodest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"thecodest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\"},\"author\":{\"name\":\"thecodest\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/person\\\/7e3fe41dfa4f4e41a7baad4c6e0d4f76\"},\"headline\":\"Cyber Security Dilemmas: Data Leaks\",\"datePublished\":\"2022-12-22T12:48:50+00:00\",\"dateModified\":\"2026-03-09T13:03:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\"},\"wordCount\":1267,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/should-companies-tell-customers-about-data-leaks_-1-.png\",\"keywords\":[\"IT\"],\"articleSection\":[\"E-commerce\",\"Enterprise &amp; Scaleups Solutions\",\"Software Development\"],\"inLanguage\":\"lt-LT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\",\"url\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\",\"name\":\"Cyber Security Dilemmas: Data Leaks - The Codest\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/should-companies-tell-customers-about-data-leaks_-1-.png\",\"datePublished\":\"2022-12-22T12:48:50+00:00\",\"dateModified\":\"2026-03-09T13:03:06+00:00\",\"description\":\"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#breadcrumb\"},\"inLanguage\":\"lt-LT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/should-companies-tell-customers-about-data-leaks_-1-.png\",\"contentUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/should-companies-tell-customers-about-data-leaks_-1-.png\",\"width\":960,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/thecodest.co\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Dilemmas: Data Leaks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#website\",\"url\":\"https:\\\/\\\/thecodest.co\\\/\",\"name\":\"The Codest\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/thecodest.co\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"lt-LT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\",\"name\":\"The Codest\",\"url\":\"https:\\\/\\\/thecodest.co\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/03\\\/thecodest-logo.svg\",\"contentUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/03\\\/thecodest-logo.svg\",\"width\":144,\"height\":36,\"caption\":\"The Codest\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/pl.linkedin.com\\\/company\\\/codest\",\"https:\\\/\\\/clutch.co\\\/profile\\\/codest\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/person\\\/7e3fe41dfa4f4e41a7baad4c6e0d4f76\",\"name\":\"thecodest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"caption\":\"thecodest\"},\"url\":\"https:\\\/\\\/thecodest.co\\\/lt\\\/author\\\/thecodest\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kibernetinio saugumo dilemos: Duomen\u0173 nutek\u0117jimas - The Codest","description":"Su\u017einokite, kaip \u012fmon\u0117s gali u\u017ekirsti keli\u0105 duomen\u0173 nutek\u0117jimui ir kibernetin\u0117ms atakoms, apsaugoti klient\u0173 informacij\u0105 ir stiprinti pasitik\u0117jim\u0105 taikydamos grie\u017etesn\u0119 kibernetinio saugumo praktik\u0105.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thecodest.co\/lt\/tinklarastis\/kibernetinio-saugumo-dilemos-duomenu-nutekejimas\/","og_locale":"lt_LT","og_type":"article","og_title":"Cyber Security Dilemmas: Data Leaks","og_description":"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.","og_url":"https:\/\/thecodest.co\/lt\/tinklarastis\/kibernetinio-saugumo-dilemos-duomenu-nutekejimas\/","og_site_name":"The Codest","article_published_time":"2022-12-22T12:48:50+00:00","article_modified_time":"2026-03-09T13:03:06+00:00","og_image":[{"width":960,"height":540,"url":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","type":"image\/png"}],"author":"thecodest","twitter_card":"summary_large_image","twitter_misc":{"Written by":"thecodest","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#article","isPartOf":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/"},"author":{"name":"thecodest","@id":"https:\/\/thecodest.co\/#\/schema\/person\/7e3fe41dfa4f4e41a7baad4c6e0d4f76"},"headline":"Cyber Security Dilemmas: Data Leaks","datePublished":"2022-12-22T12:48:50+00:00","dateModified":"2026-03-09T13:03:06+00:00","mainEntityOfPage":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/"},"wordCount":1267,"commentCount":0,"publisher":{"@id":"https:\/\/thecodest.co\/#organization"},"image":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","keywords":["IT"],"articleSection":["E-commerce","Enterprise &amp; Scaleups Solutions","Software Development"],"inLanguage":"lt-LT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/","url":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/","name":"Kibernetinio saugumo dilemos: Duomen\u0173 nutek\u0117jimas - The Codest","isPartOf":{"@id":"https:\/\/thecodest.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#primaryimage"},"image":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","datePublished":"2022-12-22T12:48:50+00:00","dateModified":"2026-03-09T13:03:06+00:00","description":"Su\u017einokite, kaip \u012fmon\u0117s gali u\u017ekirsti keli\u0105 duomen\u0173 nutek\u0117jimui ir kibernetin\u0117ms atakoms, apsaugoti klient\u0173 informacij\u0105 ir stiprinti pasitik\u0117jim\u0105 taikydamos grie\u017etesn\u0119 kibernetinio saugumo praktik\u0105.","breadcrumb":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#breadcrumb"},"inLanguage":"lt-LT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/"]}]},{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#primaryimage","url":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","contentUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","width":960,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thecodest.co\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Dilemmas: Data Leaks"}]},{"@type":"WebSite","@id":"https:\/\/thecodest.co\/#website","url":"https:\/\/thecodest.co\/","name":"The Codest","description":"","publisher":{"@id":"https:\/\/thecodest.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thecodest.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"lt-LT"},{"@type":"Organization","@id":"https:\/\/thecodest.co\/#organization","name":"The Codest","url":"https:\/\/thecodest.co\/","logo":{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/thecodest.co\/#\/schema\/logo\/image\/","url":"https:\/\/thecodest.co\/app\/uploads\/2024\/03\/thecodest-logo.svg","contentUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/03\/thecodest-logo.svg","width":144,"height":36,"caption":"The Codest"},"image":{"@id":"https:\/\/thecodest.co\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pl.linkedin.com\/company\/codest","https:\/\/clutch.co\/profile\/codest"]},{"@type":"Person","@id":"https:\/\/thecodest.co\/#\/schema\/person\/7e3fe41dfa4f4e41a7baad4c6e0d4f76","name":"thecodest","image":{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","caption":"thecodest"},"url":"https:\/\/thecodest.co\/lt\/author\/thecodest\/"}]}},"_links":{"self":[{"href":"https:\/\/thecodest.co\/lt\/wp-json\/wp\/v2\/posts\/3160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecodest.co\/lt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecodest.co\/lt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecodest.co\/lt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thecodest.co\/lt\/wp-json\/wp\/v2\/comments?post=3160"}],"version-history":[{"count":5,"href":"https:\/\/thecodest.co\/lt\/wp-json\/wp\/v2\/posts\/3160\/revisions"}],"predecessor-version":[{"id":7779,"href":"https:\/\/thecodest.co\/lt\/wp-json\/wp\/v2\/posts\/3160\/revisions\/7779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecodest.co\/lt\/wp-json\/wp\/v2\/media\/3161"}],"wp:attachment":[{"href":"https:\/\/thecodest.co\/lt\/wp-json\/wp\/v2\/media?parent=3160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecodest.co\/lt\/wp-json\/wp\/v2\/categories?post=3160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecodest.co\/lt\/wp-json\/wp\/v2\/tags?post=3160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}