Home Showbiz Tips to Avoid Data Leaks from Food Delivery Services

Tips to Avoid Data Leaks from Food Delivery Services

Tips to Avoid Data Leaks from Food Delivery Services

Jakarta, Timerilis.com – Data leaks from food delivery services are unlikely to leak details of personal banking information or other sensitive data. However, it can be worse because the perpetrator can find out your personal address.

This includes phone numbers, physical addresses, as well as wealth information, and customer behavior patterns. According to Kaspersky, orders placed on marketplaces can be picked up at a collection point or post office, whereas food orders are always delivered directly to the customer, such as at home or work.

As it turns out, data leaks like this can also threaten businesses, and carry many risks, among them reputational issues. Where leaks cannot be covered up and databases inevitably appear on the dark web. So usually, companies themselves try to report it. But such openness does not help much, security incidents will always shake the trust of customers and partners.

The second risk is regulation. Regulators are always ready to find businesses for violating personal data protection laws. The size of the fine depends on the jurisdiction, and not only the region where the company is registered can play a role, but also the location of its customers.

Last but not least is the material issue. Where, upon discovering their data was leaked, customers are increasingly teaming up to file serious lawsuits. Again, the numbers involved are small, but they are growing as more and more people are ready to sue.

To mitigate threats like this, customers usually have to take several steps. For example, order delivery to a pickup point instead of your exact home address.

But according to Kaspersky, businesses have more options than just changing the delivery address. Unfortunately, it is still not fully utilized:

So what to do to avoid such data leaks?

Limit employee access to internal databases containing personal data;
Carry out periodic audits of security systems;
Do not store unnecessary personal data. This means allowing customers to choose what they want to entrust your business with, and what should be deleted immediately after the order is completed;
Closely monitor what is happening in your infrastructure using MDR-class services. (Eva/Rd)

Source: voi.id