Data Leak Test

 

Your public IP address is: 3.81.29.254; more info

 

SSL is: off ; more info

Data Leak Testing Home

Test 1 POST

Test 2 GET

Test 3 Upload

Test 4 Email

Industry Information

Session Info

About DLT

Data Loss (DLP) Email Self Test

Email/ SMTP should be detected by all Data Security tools for both Endpoint and Network based tools more info.

"Email" send an email though your corporate mail client to data@dataleaktest.com SMTP email traffic should be seen at the Data Security network layer and the Data Security Endpoint should detect data in the mail client. If the email is successfully received you will get a response email within a few minutes.

Test Email

How to test email for Data Loss (DLP)

1) Open your mail client
2) To: data@dataleaktest.com
3) Add test data to email body or attachment or both
4) Send the Email
5) Immediately data@datalekatest.com will reply if the email was successful
     a. if the email was successful, the data you sent was leaked
     b. if you did not receive a reply, your data was not leaked

Send it an email and it will reply...


Use your mail client to test!

 

Frequently Asked Questions

1) What just happened?

    If you received a reply message to your email then your data was able to be leaked out of your organization. The data successfully left your possession.

2) Where did my data go?

    Your data was sent to dataleaktest.com mail servers using the email method and the result was sent back to you in the form of a reply. The data you submit is not kept by dataleaktest.com *

3) How do I protect my Data assets from leakage?

    A network based data security tool or an Endpoint based data security tool should be able to stop leaks that use the File Upload method.

4) What internet technologies commonly use the email/ SMTP method to get data?  

  • Email mistakes (extremely common)

  • Data theft

 

 

Email Method is the primary cause of large data leaks due to end user mistakes.

The email Method should be detected by all Data Security tools for data in the BODY as well as ATTACHMENTS for both Endpoint and Network based solutions.

If the Data Security product worked the email would have been blocked and no reply will be received. If a reply is received then the data was successfully leaked to the world.

 

*Email submissions are deleted upon arrival

 

Need help understanding how to protect your data? Please contact us and we will guide you.

Contact

 

 

Have data security questions? Want expert advice? Just want to say hello or give suggestions? Please use the form below to get in touch with us immediately.

 

Name:  
Email:  
Phone:  
Message: