Skip to content

Threat types

Coro provides the means to reduce the risk of data breaches and to protect sensitive information from unauthorized access and misuse. A number of threats can place an organization's data at risk and it is important to be aware of them and take measures to limit their impact:

Cyber attacks

Cybercriminals can use a variety of methods to access sensitive information, such as hacking into systems, phishing scams, and malware.

Insider threat

Employees and contractors may intentionally or unintentionally access or misuse sensitive information.

Physical theft

Sensitive information can be stolen or lost through physical theft or misplacement of laptop and smartphone devices.

Human error

Human error such as accidentally sending sensitive information to the wrong person, can result in data breaches.

Log into the Coro console with your admin credentials to configure, review, and analyze the data protection activities that are being captured for both protected and unprotected users in your organization.