A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Data Exfiltration

Last updated: Nov 26, 2025

Glossary › Data Exfiltration

What is Data Exfiltration ?

Data exfiltration occurs when attackers or unauthorized users move sensitive information outside approved environments using malware, encrypted channels, or insider methods. In TPRM, preventing exfiltration is essential because vendors often process regulated or sensitive data..

FAQs

Is exfiltration always detected quickly?

Often it is not due to stealth techniques.

Are vendors at higher risk?

Vendors with broad access or weak controls are prime targets.

What prevents exfiltration?

DLP, behavioral analytics, access restriction, and logging.

robot-human

Responsible-AI TPRM Guide

Discover how risk teams apply AI responsibly to reduce third-party blind spots and stay audit-ready across global regulations.

Easier third-party onboarding. Seamless compliance. Complete risk control.