On March 4, the Turkish Personal Data Protection Authority (KVKK) published a notification regarding a data breach incident at Garanti Finansal Kiralama A.Ş. According to the report, the leasing company's information systems experienced an unauthorized data transfer. The regulator classified the incident as an insider leak caused by an employee's actions.

What Happened?
On December 22, 2025, the company's Data Loss Prevention (DLP) system blocked an employee's attempt to send documents containing client data to their personal email address. A subsequent investigation, launched due to suspicions that other attempts might have been successful, revealed that the employee had repeatedly forwarded confidential information from their corporate email to their personal account.
What Data Was Compromised?
The breach exposed a wide range of information, including:
Preliminary analysis indicates that the incident affected 5,664 data subjects.
Effective Protection Against Insider Threats
Insider threats remain one of the most significant challenges for information security teams, particularly in the financial sector. The foundational element for mitigating these internal risks is a DLP system. It's crucial to highlight two critical capabilities of a modern DLP solution that must work in tandem.
The first is comprehensive channel coverage. In this case, the employee used email, but malicious actors are increasingly leveraging a wider, less obvious array of channels and tools. This is why organizations need DLP solutions capable of monitoring and preventing leaks across the broadest possible spectrum of vectors. Sending data to a personal email is just one of many methods for moving information outside the corporate perimeter. Next-gen DLP from SearchInform, for instance, monitors data transfer not only via email but also through cloud storage, messaging apps, removable media, printing devices, and even HTTP traffic.
The second is preventive control and in-depth investigation. Modern systems provide a complete picture of user activity, enabling the detection of suspicious and potentially dangerous behavior on corporate workstations and the collection of detailed evidence. This approach makes it possible to stop a leak at the preparation stage, before any data actually leaves the company's perimeter. Furthermore, such systems allow for retrospective investigations, uncovering instances of corporate fraud and enabling timely intervention to prevent security incidents.
The SearchInform Next-gen DLP solution is built on a comprehensive approach that combines extensive analysis of on-device activity with control over all information transmission channels. This allows for a complete understanding of a potential incident before it materializes. The system is designed to prevent data leaks rather than just managing their aftermath, thereby minimizing both reputational and financial damage to the business, and mitigating a wide range of internal risks – from theft and moonlighting to document forgery and systematic idleness.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!