What is Data Breach and most common causes of Data Breaches?
Author
March 17, 2019
A data breach, or data leak, is a security event in which protected data is accessed by or disclosed to unauthorized viewers. A data breach is different from data loss, which is when data can be no longer accessed because of hardware failure, deletion, or other causes. Protected data can include information about individual customers, or employees, such as personally identifiable information (PII), personal health information, payment card information, and Social Security numbers. It can also include corporate information or intellectual property (IP), such as trade secrets, details about manufacturing processes, supplier and customer data, information about mergers and acquisitions, or data about lawsuits or other litigation.
Data breaches are not always intentional. Users can accidentally send protected data to the wrong email address or upload it to the wrong share; in fact, mistakes account for 17% of breaches, according to the well-known Verizon’s 2018 Data breach investigation Report. But the report found that most breaches are deliberate and financially motivated. While different methods are used to gain access to sensitive data, 28% of breaches involve insiders, according to the Verizon report.
Major causes of Data Breaches
- Cyber-attacks: Hackers use malware, phishing, social engineering, skimming, and related techniques to gain access to protected information.
- Theft or loss of devices: Laptops, smartphones, thumb drives, and other data storage media can be lost, stolen, or disposed of improperly. If they contain protected information and it ends up in the wrong hands, that’s a data breach.
- Employee data theft or data leak: Employees, especially those who are departing soon, might deliberately access protected information without authorization with malicious intent.
- Human Error: Mistakes happen, and people are negligent. Employees accidentally send proprietary data to the wrong person, upload it to public shares or misconfigure servers where it is stored.
World's biggest data breaches
When it Happened: series of breaches in 2013 and 2014
When it disclosed: 2016
In 2016, Yahoo estimated that over 1 billion user accounts might have been compromised in the 2014 breach. Later, in 2017, it admitted all 3 billion of its user accounts had been hacked. The breaches involved the theft of user account details such as email addresses, telephone numbers, hashed passwords, dates of birth, and, in some cases, answers to security questions. Fortunately, no payment information, such as credit card numbers or bank account details, was stolen.
Equifax
When it Happened: Mid-May 2017
When it disclosed: September
Hackers gained access to certain files containing Social Security numbers, birth dates, addresses, driver’s license numbers, and other personal information. 209,000 consumers also had their credit card data exposed in the attack.
Marriott International
When it Happened: 2014
When it disclosed: 2018
In 2018, Marriott International announced that cyber thieves had stolen data on approximately 500 million customers. Marriott believes that credit card numbers and expiration dates of more than 100 million customers were stolen, although the company is uncertain whether the attackers were able to decrypt the credit card numbers.
Basic safeguard from data breaches
- Encryption: According to ponemon research, the second-to-top factor that reduces the overall costs of a data breach is encryption. It’s a simple yet often neglected way to secure your data. Even if it’s stolen or breached, properly encrypted data will be useless for malicious actors, they won’t be able to sell it or use it against you or the individuals whose data they stole.
- Data access governance: Regular privilege attestation and data access monitoring will reduce your attack surface and help you spot abnormal activities.
Steps you should take when becoming a victim of the data breach
- Contact the breached company: That means to contact the company whose data was breached. Find out the extent of the damage. Don’t trust Even if they tell you that your stolen information was encrypted.
- Change all your passwords. Don’t make it easy. Use different passwords for different accounts!
- Call your credit card companies and banks: Doing so will lock your accounts and prevent further transactions.
- You can file a report with the Federal Trade Commission (FTC) if you are in the U.S. or similar agencies in other countries.
- Get a copy of your credit report to see if something unusual is on your credit and include that in your police report and FTC report.
In conclusion, we can say that we read frequently about personal data breaches. One of the recent ones happened on German politician’s data. Data breaches might sap our companies and our digital identities, regulations have been made trying to normalize and to block breaches, but unfortunately in 2019 is still easy to get random personal data out of the internet. The main reason for vulnerable websites is un-patched software versions.
Here are a few things that can help you
- Look for solutions that can help automate as many tasks as possible so you and your team can focus on strategically important activities.
- Look for new Cybersecurity developments in various industries and apply those that seem to fit your company best.
Thanks for reading!! Contact Mirketa if you need a consulting on how you can protect your websites and application data.
Pranshu Goyal, Director of Products at Mirekta, states: “We envision DSM to be used by every small to a medium-sized organization dealing with bad data and want to get rid of duplicates easily with no cost. We have faced issues dealing with duplicates in our organization. That inspired us to make a solution that is not only simple to use but can be used widely to make the organization’s data clean to make them more efficient and productive. We want DSM to be a solution for every organization looking for duplicate management capability better than the Salesforce out-of-the-box solution with no additional cost.”
Recent Posts
-
Leveraging AI to Enhance Sales Effectiveness13 Mar 2025 Use-case
-
Revolutionizing Manufacturing with AI: Predictive Maintenance, Supply Chain Optimization, and More11 Mar 2025 E-Book
-
NetSuite for Manufacturing: Streamlining Operations and Solving Key Challenges07 Mar 2025 Blog
-
How to Build Your First Agent in Salesforce Agentforce24 Feb 2025 Blog
-
ERP vs Salesforce Revenue Cloud: Which One is Right for Your Business?24 Feb 2025 E-Book
-
Revolutionizing Manufacturing with Salesforce: A Playbook for Efficiency & Growth18 Feb 2025 E-Book
-
Salesforce 2025 Game-Changing Trends You Need to Know28 Jan 2025 Blog
-
Agentforce 2.0: Everything You Need to Know About the Latest Update22 Jan 2025 Blog
-
The Ultimate Guide to NetSuite Development: Tools and Techniques10 Jan 2025 Blog
-
How Salesforce Nonprofit Cloud Transforms Fundraising Strategies10 Jan 2025 Blog
-
The Impact of Salesforce Development Partners on Small and Medium Businesses08 Jan 2025 Blog
-
Key Questions to Ask When Hiring a NetSuite Development Partner08 Jan 2025 Blog
-
Salesforce Agentforce Demystified: Your Essential Guide08 Jan 2025 Blog
-
Salesforce and NetSuite Integration: Driving Business Efficiency with Precision06 Jan 2025 Blog
-
Everest Group has positioned Mirketa as an Aspirant in the report24 Dec 2024 Press Release
-
Salesforce Einstein20 Dec 2024 E-Book
-
Order to Cash Cycle with NetSuite20 Dec 2024 E-Book
-
Empower Your Marketing Strategy with Salesforce Marketing Cloud's Automation Studio Activities13 Dec 2024 Blog
-
Salesforce CPQ for Subscription-based Businesses10 Dec 2024 Blog
-
Unleashing the Magic of Einstein Prediction Builder10 Dec 2024 Blog
Categories
Featured by



