Skip to main content

DATA BREACH

“Security is an illusion and Privacy is a myth”

Besides maintaining privacy do you think your data is actually secured?No! it’s not. We have heard about so many data stealing commonly known as data breach, but do you know what it means?

A data breach or data leak is the release of sensitive, confidential or protected data to an untrusted environment. It is a security incident in which data is accessed without authorization. It involves information leakage or exfiltration—unauthorized copying or transmission of data, without affecting the source data. In some cases it incites to complete loss of data. For example in case of ransomware attacks, the unauthorized person encrypts your entire data and asks for a huge ransom to decrypt the data.

In other words, in a data breach, hackers or employees release sensitive data. As a result, the data might be lost, or used by perpetrators for various malicious purposes. As technology progresses, more and more of our information has been moving to the digital world. As a result, cyberattacks have become quite common and costly. Globally, the average total cost to a company of a data breach is $3.86 million, according to a study by the Ponemon Institute. This means that at $148 on average per stolen record, online crime is a real threat to anyone on the internet.

In other words, in a data breach, hackers or employees release sensitive data. As a result, the data might be lost, or used by perpetrators for various malicious purposes. As technology progresses, more and more of our information has been moving to the digital world. As a result, cyberattacks have become quite common and costly. Globally, the average total cost to a company of a data breach is $3.86 million, according to a study by the Ponemon Institute. This means that at $148 on average per stolen record, online crime is a real threat to anyone on the internet.


Why do data breaches occur?

Cybercrime is a profitable industry for attackers and continues to grow. Hackers seek personally identifiable information to steal money, compromise identities, or sell over the dark web. This serves an easy way for a well skilled person to ask for a handsome amount of money or ‘Bitcoins- cryptocurrency’ from a well established company.

 

Causes of Data Breaches:

The following are common causes of information leaks at organizations.

      Insider leaks- Insider threats include disgruntled employees, former employees who release credentials to sensitive systems, or business partners. They might be motivated by financial gain, commercially valuable information, or a desire for revenge.

      Unintended disclosure- Many data breaches are not caused by an attack, but rather by unintentional exposure of sensitive information. For example, employees might view sensitive data and save it to a non-secure location, or may discuss with the staff or might share it on the internet.

Examples of some of the biggest data breaches :

Marriott International

Date: 2014-18

Impact: 500 million customers

Details: Marriott International announced in November 2018 that attackers had stolen data of 500 million customers approximately. The attackers were able to take some combination of contact information, passport number, Starwood Preferred Guest numbers, travel information, and other personal information. The credit card numbers and expiration dates of more than 100 million customers were believed to be stolen but the officials were uncertain whether any transaction took place or not.

Yahoo

Date: 2013-14

Impact: 3 billion user accounts

Details: Yahoo announced in September 2016 that in 2014 it had been the victim of what would be the biggest data breach in history. The attackers compromised the names, dates of birth, email addresses and passwords, and security questions and answers of almost 3 billion user accounts.

How can I help protect my personal information in the event of a data breach?

      Use strong, secure passwords.

      Monitor your bank and other financial accounts.

      Use only secure URLs

      Secure your phone

      Back up your files and ensure their safety

      Avoid oversharing on social media

      Implement high-quality security software

 

What are companies doing about data breaches?

Many companies are tightening security measures and reassessing their procedures to better protect the consumer data they use and store. Laws and regulations are in place that require companies to take specific steps in the event of a data breach or other security incident. Most states require companies to send data breach notifications to consumers when their personally identifiable information may have been compromised.

 

 

Comments

Popular posts from this blog

Pegasus Spyware: Flying Through The Air

 Hundreds of millions of people can't imagine life without their smartphones. Almost every aspect of their daily lives, from the most mundane to the most intimate, is within easy reach and hearing distance of their smartphones. Only few people realize that their phones may be used as surveillance devices, with someone hundreds of miles away secretly extracting their messages, photographs, and location while also activating their microphone and recording them in real time. Such capabilities are present in Pegasus, a spyware produced by NSO Group, an Israeli maker of mass surveillance weapons. What is Pegasus? Pegasus is a hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones using either iOS or Android operating systems. The spyware is named after Pegasus, the white winged horse from Greek mythology. It is named so because it "flies through the...

8 TECH SUPPORT STORIES. A MUST READ!

MOVE THE MOUSE! I asked a user to move her mouse all the way to the right. They picked up the mouse physically and put it on the right side of her desk. RIGHT CLICK! I told the user to right click on the desktop to select properties. She replied that nothing was happening. I asked her again to do the same. She replied with the same answer. When I went to her desk, she had written the word CLICK on a paper on her desk. LAPTOP NOT WORKING! A user was once shouting at me that her laptop was not working even though she hit the keys and tried the touch pad. I run down to her, she shows her laptop still shouting that I wasn’t working properly and couldn’t do my job etc. I look at her laptop, switch it on, turn around and leave the room. OUTAGE PROBLEM! A user once asked if they could download “download the Internet” in case there was a power outage and they could still use it. COMPUTER WON’T TURN ON! Once, a user said that her computer won’t turn on. I asked her to check ...

Facebook Smart Glasses Coming ‘Sooner Than Later’ Without AR

Facebook’s smart glasses will let users record the world around them, and take pictures. Facebook says its first pair of consumer “smart glasses” will be releasing next year as a branded Ray-Ban product , CEO Mark Zuckerberg announced during the opening keynote of its all-virtual Facebook Connect conference. It’s not clear what features the device will have, but Facebook has confirmed to  The Verge  that the device will not be classified as an AR device, and it will not have an integrated display of any kind. The company has talked for years about its plans to build AR devices that resemble a standard pair of glasses, and the company is now working with Ray-Ban maker Essilor Luxottica to design the frames of its first consumer smart glasses, confirming rumours last fall that the company had partnered with the Italian eyewear brand.     What are Facebook Ray-Ban Stories? What exactly do these do? Facebook’s first ‘smart’ glasses capitalise on the iconic Wayfarer desi...