DataLeakTest
DLP Validation and Testing

 please contribute by turning off ad blockers for this site 

Your public IP address is: 3.235.45.196; more info

Updated 3/10/2020

 

SSL is: off ; more info

DLP Auditor

POST Test

GET Test

Upload Test

Email Test

FTP Testing

Session Info

About DLT

Data Loss (DLP) Email Self Test

Email/ SMTP should be detected by all Data Security tools for both Endpoint and Network more info.

To detect Data Loss over email ; Send an email from your corporate mail client to data@dataleaktest.com

If the email is successfully received you will get a response email within a few minutes.

If the Data Security product worked the email would have been blocked and no reply will be received. If a reply is received then the data was successfully leaked.


Email: data@dataLeakTest.com

 

How to test email for Data Loss (DLP)

1) Open your corporate mail client
2) Send an email to: data@dataleaktest.com
3) Add the test data into the email body or attachment or both
4) Send the Email
5) Immediately data@dataleaktest.com will reply if the email was successful
     a. if the email was successful, the data you sent was leaked
     b. if you did not receive a reply, your data was not leaked

Send it an email and it will reply if the email was successful. If no reply then the email was blocked, be sure to check your spam folder for the reply...

How to use this page (3 min)

Just send us an email with your test data

Use your mail client to test!

 

Frequently Asked Questions

1) What just happened?

    If you received a reply message to your email then your data was able to be leaked out of your organization. The data successfully left your possession.

2) Where did my data go?

    Your data was sent to dataleaktest.com mail servers using the email method and the result was sent back to you in the form of a reply. The data you submit is not kept by dataleaktest.com *

3) How do I protect my Data assets from leakage?

    A network based data security tool or an Endpoint based data security tool should be able to stop leaks that use the File Upload method.

4) What internet technologies commonly use the email/ SMTP method to get data?  

  • Email mistakes (extremely common)

  • Data theft

 

 

Email Method is the primary cause of large data leaks due to end user mistakes.

The email Method should be detected by all Data Security tools for data in the BODY as well as ATTACHMENTS for both Endpoint and Network based solutions.

 

---ads here to fund our site, please turn ad blockers off---


Donate to help build free tools: donations help to pay the bills

---ads here to fund our site, please turn ad blockers off---


Free expert DLP help from top experts

 

 

Have data security questions? Want expert advice? Just want to say hello or give suggestions?

Please use the form to instantly message our team.
Name:  
Email:  
Phone:  
Message:

---ads here to fund our site, please turn ad blockers off---


---ads here to fund our site, please turn ad blockers off---


 


2020 IGNITE Cyber Security