A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Glossary › Data Exfiltration
What is Data Exfiltration ?
Data exfiltration occurs when attackers or unauthorized users move sensitive information outside approved environments using malware, encrypted channels, or insider methods. In TPRM, preventing exfiltration is essential because vendors often process regulated or sensitive data..
FAQs
Is exfiltration always detected quickly?
Often it is not due to stealth techniques.
Are vendors at higher risk?
Vendors with broad access or weak controls are prime targets.
What prevents exfiltration?
DLP, behavioral analytics, access restriction, and logging.
Responsible-AI TPRM Guide
Discover how risk teams apply AI responsibly to reduce third-party blind spots and stay audit-ready across global regulations.
Easier third-party onboarding. Seamless compliance. Complete risk control.