Ebook - A Complete Guide To Data Breaches
Ebook - A Complete Guide To Data Breaches
Data Breaches
Table of Contents
Introductioniii
Data Breaches 6
www.upguard.com ii
Introduction
In 2022, the average cost of a data breach reached a record high
of US$4.35 million1, and in 2023, that figure is expected to rise
to $5 million. Every week, a new round of businesses make news
headlines for suffering a breach. Some barely recover from the
reputational damages that follow, and others never do. Without
sufficient security controls in place to prevent data breaches,
it’s only a matter of time before your business becomes another
costly breach statistic.
1. IBM (2022). Cost of a data breach 2022. [online] www.ibm.com. Available at:
https://www.ibm.com/reports/data-breach.
www.upguard.com iii
Getting Started with
Data Breaches
www.upguard.com 1
Getting Started with Data Breaches
Data breaches are most prevalent in industries that deal with large amounts of
personal data, such as the healthcare and financial sectors. However, with digital
transformation multiplying connections between businesses, their vendors, and
customers, every organization is now a potential link to a data breach target, making
data breaches an increasingly industry-agnostic threat.
www.upguard.com 2
Getting Started with Data Breaches
Data Leaks
Any unintentional exposure of sensitive data to the public is classified as a data
leak. These events could include overlooked misconfigurations exposing internal
databases, or the unauthorized publishing of sensitive information on the internet.
www.upguard.com 3
Getting Started with Data Breaches
The data leak was caused by a default Power Apps misconfiguration resulting in the
exposure of over 38 million sensitive records.
UpGuard notified Microsoft about the leak, who promptly responded to it,
preventing a potential large-scale data breach impacting many reputable
organizations, including:
• American Airlines
• Ford
• J.B. Hunt
“We found one of these [portals] that was misconfigured to expose data,
and we thought, we’ve never heard of this. Is this a one-off thing, or is this
a systemic issue?”
Greg Pollock
UpGuard’s vice-president of cyber research
www.upguard.com 4
Getting Started with Data Breaches
• Insider threats publishing internal trade secrets and intellectual property on the
internet.
www.upguard.com 5
Getting Started with Data Breaches
Data Breaches
A data breach, on the other hand, is the outcome of a planned cyberattack. These
events are caused by an external party forcing their way through an IT boundary
and into sensitive network resources, usually by exploiting security vulnerabilities.
It's important to understand the difference between data breaches and data leaks,
as each event follows a distinct data compromise pathway requiring a unique set of
security controls.
The most successful data breach prevention strategies address the complete
scope of data breach attack vectors, including data leaks. An example of such an
integration is provided in the data breach prevention framework on page x of this
ebook.
www.upguard.com 6
The Cyber Attack
Pathway
www.upguard.com 7
The Cyber Attack Pathway
www.upguard.com 8
The Cyber Attack Pathway
In 2022, phishing was the most expensive initial attack vector, resulting in
average data breach damage costs of USD 4.91 million2
2.
2022 Cost of a Data Breach Report by IBM and the Ponemon Institute.
www.upguard.com 9
The Cyber Attack Pathway
Once inside this critical region, cybercriminals begin the hunt for the following
types of sensitive data:
• Personal data;
• Customer data;
• Any digital footprint details that could be used in an identity theft campaign (to
potentially arm further, more targeted phishing attacks);
www.upguard.com 10
Preventing Data
Breaches
www.upguard.com 11
Preventing Data Breaches
Stage 1 Stage 2
Preventing network compromise. Preventing access to sensitive data.
www.upguard.com 12
Preventing Data Breaches
Stage 1:
Preventing Network Compromise
Data breach attempts are much harder to stop after a cybercriminal has entered
your private network. The objective of stage 1 is to stop data breach attempts
before your network is compromised - that is, to prevent hackers from progressing
beyond phase 1 of the cyberattack lifecycle.
www.upguard.com 13
Preventing Data Breaches
www.upguard.com 14
Preventing Data Breaches
www.upguard.com 15
Preventing Data Breaches
Implementing cyber awareness training will equip your employees to avoid falling
victim to phishing attempts. And if your training is effective, this single effort
could protect your business from the leading cause of data breaches globally3.
3
Cisco Umbrella. (n.d.). 2021 Cybersecurity threat trends: phishing, crypto top the list. [online] Available at:
https://umbrella.cisco.com/info/2021-cyber-security-threat-trends-phishing-crypto-top-the-list.
www.upguard.com 16
Preventing Data Breaches
Security ratings are a simple, high-level metric for tracking data breach
susceptibility.
www.upguard.com 17
Preventing Data Breaches
www.upguard.com 18
Preventing Data Breaches
The average cost of a data breach in 2022 was USD 4.35 million4
According to the 2022 Cost of a Data Breach report by IBM and the Ponemon
Institute, victims that respond to data breaches in less than 200 days spend
an average of $1.1 million less on data breach damages. So if you're currently
a victim of data leaks, not only are you increasing your risk of suffering an
expedited data breach, you're also increasing your risk of paying more in data
breach damages.
Both internal and third-party data leaks impact your risk of suffering a data
breach. A data leak management strategy should be capable of discovering and
shutting down leaks across these threat landscapes.
4.
2022 Cost of a Data Breach Report by IBM and the Ponemon Institute
www.upguard.com 19
Preventing Data Breaches
When choosing a data leak detection solution, there are two important
considerations:
1. False Positives
Not all data leak announcements are legitimate. Cybercriminals often falsify
such announcements in ransomware blogs to mislead and divert security
investigations. Due to the high likelihood of this happening, detected data
leaks should always be manually reviewed for false positives - either by
internal IT security teams or externally if leveraging the support of managed
data leak detection services.
The scope of data leak dumps is vast and ever-expanding. Tracking data leaks
at a rate that matches their appearance across thousands of potential hosts
can only be successfully managed with the support of an automated scanning
solution.
www.upguard.com 20
Preventing Data Breaches
For the most comprehensive coverage of potential data leaks linked to your
business or any of your vendors, UpGuard continuously monitors common data
leaks hosts on the dark web, including ransomware blogs and data collection
releases.
www.upguard.com 21
Preventing Data Breaches
www.upguard.com 22
Preventing Data Breaches
Stage 2:
Preventing Access to Sensitive Data
www.upguard.com 23
Preventing Data Breaches
www.upguard.com 24
Preventing Data Breaches
Network Segmentation
After a hacker has breached a network, they start moving laterally to identify where
all the sensitive resources are located. Lateral movement can be disrupted by
To maximize obfuscation, all user accounts with access to these closed regions
should be guarded with Multi-Factor Authentication, with all connection requests
approved from within jump boxes (hardened machines in an isolated network
hosting privileged credentials).
www.upguard.com 25
Preventing Data Breaches
Data Encryption
Should all the above stage 2 controls fail, and hackers gain access to a sensitive
customer database, the data contained therein will be of very little use to hackers if
it's encrypted. The Advanced Encryption Standard is the ideal encryption method to
use since its the standard trusted by government entities.
A data encryption policy should apply to all internal data at rest and in motion - not
just the sensitive regions. Encrypting all internal data could prevent hackers from
learning user behaviors to arm their lateral movement and privilege compromise
efforts, thereby disrupting the attack's progression between phases three and four
of the attack pathway.
www.upguard.com 26
Protect Your Organization from
Data Breaches with UpGuard
UpGuard's suite of features reduces data breach risks across multiple threat categories to
create the most comprehensive data breach prevention solution.
www.upguard.com 650 Castro Street, Suite 120-387, Mountain View CA 94041 United States
+1 888-882-3223
© 2023 UpGuard, Inc. All rights reserved. UpGuard and the UpGuard
logo are registered trademarks of UpGuard, Inc. All other products or
services mentioned herein are trademarks of their respective companies.
Information subject to change without notice.