* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [Application Advisory/Analysis](https://www.paloaltonetworks.com/blog/category/application-analysis/) * Lessons Learned from Baid... # Lessons Learned from Baidu Collection of Japanese Information [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2014%2F02%2Flessons-learned-baidu-collection-japanese-information%2F) [](https://twitter.com/share?text=Lessons+Learned+from+Baidu+Collection+of+Japanese+Information&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2014%2F02%2Flessons-learned-baidu-collection-japanese-information%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2014%2F02%2Flessons-learned-baidu-collection-japanese-information%2F&title=Lessons+Learned+from+Baidu+Collection+of+Japanese+Information&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2014/02/lessons-learned-baidu-collection-japanese-information/&ts=markdown) \[\](mailto:?subject=Lessons Learned from Baidu Collection of Japanese Information) Link copied By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") Feb 13, 2014 4 minutes [Application Advisory/Analysis](https://www.paloaltonetworks.com/blog/category/application-analysis/?ts=markdown) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [App-ID](https://www.paloaltonetworks.com/blog/tag/app-id/?ts=markdown) [Baidu](https://www.paloaltonetworks.com/blog/tag/baidu/?ts=markdown) [Cloud Computing](https://www.paloaltonetworks.com/blog/tag/cloud-computing/?ts=markdown) [data leakage](https://www.paloaltonetworks.com/blog/tag/data-leakage/?ts=markdown) [file sharing](https://www.paloaltonetworks.com/blog/tag/file-sharing/?ts=markdown) In my previous blog entry on the [Baidu practice of collecting information on Japanese users](https://www.paloaltonetworks.com/blog/2013/12/baidu-secretly-collecting-japanese-user-data/), I discussed the security risks associated with using Baidu IME (Input Method Editor). There are so many applications that use the cloud, so today I want to expand the risk discussion to other cloud-based applications commonly used by businesses. **Office applications:** SkyDrive is the online storage application built-in to Microsoft Office which allows you to save your documents in the cloud. As with similar services, the idea is that you can continue to work with these files from any place such as your home, a café, or a hotel. You can collaborate with your co-workers or even with people outside of your company. [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2014/02/Word3.png) [![Word3](https://www.paloaltonetworks.com/blog/wp-content/uploads/2014/02/Word3.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2014/02/Word3.png) End-users in your organization are using this option for business purposes without any malicious intentions. However, from a corporate perspective, there is a risk of unintentional information leakage by end users or the cloud service may be hacked. **Translation sites:** When you need to translate documents into or from foreign languages, a translation site is considerably handy. The quality of machine translation is rarely perfect, but a rough translation of text provides a quick and decent understanding of the content. Free translation services are offered by companies like Yahoo! and Google. [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2014/02/translation2.png) [![translation2](https://www.paloaltonetworks.com/blog/wp-content/uploads/2014/02/translation2-500x194.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2014/02/translation2.png) The convenience of these services makes them popular. However, if employees translate internal documents, there is a possibility of information leakage because that information will be sent to the company providing the translation service. Yahoo and Google are well-known companies, but there are countless others that are less known and less reliable from a security perspective. There is another risk on translation sites. Usually, translation sites have a function to translate web pages. It's important to remember that this function can be used to bypass company URL filtering policy to access prohibited web sites. **Chat applications:** Business people use chat applications for conversations with internal and external personnel because they are more real-time than email and less disturbing than phone calls. With these convenient communication tools, productivity is higher, but the risk of information leakage is also higher because the company that owns the chat application can monitor all chat logs. For example, the chat application Line, which is very popular in Japan, is supported on PCs, MACs and smartphones and is also used in the corporate sector. Line uses several ports (80, 443,5223,5242,9418) for TCP and dynamic ports for UDP. If you want to block Line from your network, many port-based firewalls will struggle due to the high number of ports in use. And that's not only the case for Line; many chat application use a combination of non-standard ports and dynamic ports to enhance their connectivity. Here are some ways you can prevent information leakage, all of them achievable using Palo Alto Networks technology. **1. Monitor all traffic, including applications that send information to the cloud.** Without visibility, you cannot exert the appropriate controls and it becomes difficult to perform forensics when an information leakage occurs. It may be difficult to identify which applications are sending information to the cloud. To solve this problem, Palo Alto Networks categorizes the application databases into "file-sharing" and "instant-messaging." By using these categories, one can easily monitor the abovementioned applications. Our technology can also break out application functions like chat function/file-sharing in social networking applications for more granular control. **2. Set policies: Maintain application enablement policies by users.** If you blocked all applications for all users that use the cloud, your company's productivity would slow to a crawl. Therefore, you need to set policies that enable applications to maximize the productivity and to minimize the risk. **3. Enforce the policies.** Obviously, you cannot rely on the end users themselves to follow the abovementioned policies without any enforcement. You need to set the policies on the perimeter security platform and enforce them automatically. At our [upcoming Ignite 2014 conference](https://www.paloaltonetworks.com/content/campaigns/ignite/ignite-2014/home.html), we'll be discussing these business challenges in depth. [Register today](https://ignite2014.paloaltonetworks.com/regeng/ignite2014/ignite2014/en/Register.aspx?lib_SGU=2881C4AA-B4B1-4D04-B6C8-2C8EDAF649B9&lib_CST=A4DC7F90-7827-487D-88A6-495282D73B49) and join us in Las Vegas! *** ** * ** *** ## Related Blogs ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) [#### Save Costs and Stay Secure While Accelerating Your Move to the Cloud](https://www.paloaltonetworks.com/blog/security-operations/save-costs-move-to-the-cloud/) ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) [#### Five steps to deploy a zero-trust attack surface management solution](https://www.paloaltonetworks.com/blog/security-operations/zero-trust-attack-surface-management-framework/) ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cloud Workload Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection-platform/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [#### WAAS-Up with Cryptojacking Microservice-Based Web Apps?](https://www.paloaltonetworks.com/blog/cloud-security/waas-cryptojacking-microservice-based-web-apps/) ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [#### How to Set Up Prisma Cloud Threat Detection in 6 Steps](https://www.paloaltonetworks.com/blog/cloud-security/how-to-set-up-prisma-cloud-threat-detection/) ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cloud Workload Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection-platform/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/cloud-security/category/partners/?ts=markdown) [#### Better Together With IBM and Prisma Cloud Compute Edition](https://www.paloaltonetworks.com/blog/cloud-security/better-together-ibm-prisma-cloud/) ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Education](https://www.paloaltonetworks.com/blog/category/education/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/cloud-security/category/partners/?ts=markdown) [#### Cloud Native Education with Prisma Cloud Security Camps](https://www.paloaltonetworks.com/blog/cloud-security/education-prisma-cloud-security-camps/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language