What Is A Data Breach?
What Is A Data Breach?
What Is A Data Breach?
A data breach occurs when a cybercriminal successfully infiltrates a data source and
extracts sensitive information. This can be done physically by accessing a computer or
network to steal local files or by bypassing network security remotely. The latter is often
the method used to target companies. The following are the steps usually involved in a
typical a breach operation:
Every day almost 7 million data records are compromised, with no organisation or sector
immune. Organisations are facing a war on data breaches, so it’s imperative that ‘know
your enemy’ becomes part of their battle tactics.
Data breaches come in various forms and sizes – not all incidents are caused by
sophisticated cyber attacks. To help you understand what your organisation is facing,
here’s a breakdown of some of the most common types of data breaches.
1|Page
i. Employee negligence/error
Something as simple as including the wrong person in the Cc field of an email or
attaching the wrong document to an email could cause a data breach. We’re all guilty of
making mistakes – it’s human nature – but employees need to understand the most
important elements of information security, and non-technical staff need to be made
familiar with security awareness policies and procedures.
v. Ransomware
Ransomware is a type of malicious program that demands payment after launching a
cyber attack on a computer system. If the organisation fails to comply with the extortion,
its essential data is destroyed, although there’s no guarantee that it will regain access to its
data even after paying up.
vii. Phishing
Emails are a common part of our daily lives, making them a
popular attack vector for cyber criminals. Crooks might
adopt the seemingly legitimate credentials of such
companies as insurers, banks, etc. to gain access to your
personal information by encouraging you to click an unsafe
link or download a malicious attachment.
2|Page
3. COMMON TYPES OF DATA STOLEN
Cyber attacks have become a regular occurrence in the last
few years; in fact, you can’t turn the news on without some
mention of a business suffering an attack. Most attacks are
fuelled by criminals looking to steal valuable information,
but what type of information is being stolen?
i. Payment Data
No surprises here of course. Card payment data is a very attractive form of information
for cyber criminals to steal. Card data provides quick access to money in multiples ways
such as siphoning the victims account, using their card for purchases or selling on the
black market.
Selling and purchasing card payment data online is terrifyingly easy, so easy in fact that
you could have bought several card details in the time it’s taken you to read this far.
Unfortunately, humans are subjects to bad habits such as using the same password for
online accounts. So if cyber criminals manage to get hold of your Facebook password,
then they will most likely be able to login to any of your accounts.
Medical ID theft is worse than financial identity theft, because there are fewer legal
protections for consumers. Many victims are forced to pay out of pocket for health
services obtained by the thieves, or risk losing their insurance and/or ruining their credit
ratings.
3|Page
v. Classified Information
Depending on how you define classified, this could include information such as your
organization’s top secret product idea or the code for your security door. Either way, if
it’s labeled classified then you don’t want it to be in the hands of cyber criminals.
i. Diminished reputation
A good reputation is often a company’s most prized asset as a business must work
constantly to build and maintain the integrity of its brand. However, one compromising
episode like a data breach can tarnish even the best of reputations. While every hack is
different and effects enterprises in various ways, companies that have been breached will
often say their reputation was negatively impacted.
Before the Internet, businesses may have been able to recover more quickly without
stories spreading at such a wide distribution in such a short amount of time. Today,
however, that is clearly not the case. News of a data breach travels far and wide, affecting
a company’s identity for customers around the world.
4|Page
5. BIGGEST DATA BREACHES
It’s the top ten countdown no one wants to be on. Here’s our list of the 10 biggest data
breaches of all time. You may be able to guess many of the companies featured on this
list, but there might be a few surprises as well.
Yahoo—again | 3 billion
Keep data transferring at a minimum. Only shift data from one device to another
if necessary. Removable media is easily lost, putting all the data on it at risk.
Shred paper files always.
5|Page
iv. Train and Educate
Training and educating staff is vital to keeping a company safe and relatively problem-
free. Experts advise classifying the different types of data on a scale and educating
employees on this new system.
v. Use Encryption
If you deal with private data regularly, encryption is vital. An encrypted document or
email can only be decoded with the associated key.
It helps you protect sensitive data wherever it is, even if a document is sent to the wrong
email or a work laptop is stolen and the data ends up in the wrong hands. If the
recipient doesn’t know the proper encryption key, they’ll be unable to access the data.
vi. User Authorization & Accessibility
It makes more sense to control data access right from the beginning than to hand it out
carelessly and try to take it back later. There’s no need for everyone to have access to
everything, so only give employees access to files that are necessary for them to complete
their jobs..
vii. Track Data & Monitor Use
Even though there’s a bit of an ethical battle about this, system monitoring might be a
great additional layer of security for your company.what files. They can follow sequences
of who saved or sent something and where.
viii. Regular Audits & Assessments
Perform vulnerability assessments once a month or even weekly. Regularly scan the
security controls and contents of every system in the network (internal and external) to
identify threats and be prepared for attacks.
ix. Backup Data
This step won’t necessarily prevent a data breach from happening, but it will make
repairing the damage much easier. Not all hackers want to steal your files to sell them,
trade them or use them for illegal activity. Some cybercriminals want to stir the pot by
deleting your data
7. REFERENCES
https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/data-breach-
101
http://www.brightonpittsfordagency.com/BPA/the-four-most-common-types-of-
data-breach/
https://chiefexecutive.net/understanding-seven-types-data-breach/
https://www.vantiv.com/vantage-point/safer-payments/data-breach-side-effects
https://bigdata-madesimple.com/15-ways-to-prevent-data-security-breaches/
6|Page