Skip to main content

DATA BREACH

“Security is an illusion and Privacy is a myth”

Besides maintaining privacy do you think your data is actually secured?No! it’s not. We have heard about so many data stealing commonly known as data breach, but do you know what it means?

A data breach or data leak is the release of sensitive, confidential or protected data to an untrusted environment. It is a security incident in which data is accessed without authorization. It involves information leakage or exfiltration—unauthorized copying or transmission of data, without affecting the source data. In some cases it incites to complete loss of data. For example in case of ransomware attacks, the unauthorized person encrypts your entire data and asks for a huge ransom to decrypt the data.

In other words, in a data breach, hackers or employees release sensitive data. As a result, the data might be lost, or used by perpetrators for various malicious purposes. As technology progresses, more and more of our information has been moving to the digital world. As a result, cyberattacks have become quite common and costly. Globally, the average total cost to a company of a data breach is $3.86 million, according to a study by the Ponemon Institute. This means that at $148 on average per stolen record, online crime is a real threat to anyone on the internet.

In other words, in a data breach, hackers or employees release sensitive data. As a result, the data might be lost, or used by perpetrators for various malicious purposes. As technology progresses, more and more of our information has been moving to the digital world. As a result, cyberattacks have become quite common and costly. Globally, the average total cost to a company of a data breach is $3.86 million, according to a study by the Ponemon Institute. This means that at $148 on average per stolen record, online crime is a real threat to anyone on the internet.


Why do data breaches occur?

Cybercrime is a profitable industry for attackers and continues to grow. Hackers seek personally identifiable information to steal money, compromise identities, or sell over the dark web. This serves an easy way for a well skilled person to ask for a handsome amount of money or ‘Bitcoins- cryptocurrency’ from a well established company.

 

Causes of Data Breaches:

The following are common causes of information leaks at organizations.

      Insider leaks- Insider threats include disgruntled employees, former employees who release credentials to sensitive systems, or business partners. They might be motivated by financial gain, commercially valuable information, or a desire for revenge.

      Unintended disclosure- Many data breaches are not caused by an attack, but rather by unintentional exposure of sensitive information. For example, employees might view sensitive data and save it to a non-secure location, or may discuss with the staff or might share it on the internet.

Examples of some of the biggest data breaches :

Marriott International

Date: 2014-18

Impact: 500 million customers

Details: Marriott International announced in November 2018 that attackers had stolen data of 500 million customers approximately. The attackers were able to take some combination of contact information, passport number, Starwood Preferred Guest numbers, travel information, and other personal information. The credit card numbers and expiration dates of more than 100 million customers were believed to be stolen but the officials were uncertain whether any transaction took place or not.

Yahoo

Date: 2013-14

Impact: 3 billion user accounts

Details: Yahoo announced in September 2016 that in 2014 it had been the victim of what would be the biggest data breach in history. The attackers compromised the names, dates of birth, email addresses and passwords, and security questions and answers of almost 3 billion user accounts.

How can I help protect my personal information in the event of a data breach?

      Use strong, secure passwords.

      Monitor your bank and other financial accounts.

      Use only secure URLs

      Secure your phone

      Back up your files and ensure their safety

      Avoid oversharing on social media

      Implement high-quality security software

 

What are companies doing about data breaches?

Many companies are tightening security measures and reassessing their procedures to better protect the consumer data they use and store. Laws and regulations are in place that require companies to take specific steps in the event of a data breach or other security incident. Most states require companies to send data breach notifications to consumers when their personally identifiable information may have been compromised.

 

 

Comments

Popular posts from this blog

Pegasus Spyware: Flying Through The Air

 Hundreds of millions of people can't imagine life without their smartphones. Almost every aspect of their daily lives, from the most mundane to the most intimate, is within easy reach and hearing distance of their smartphones. Only few people realize that their phones may be used as surveillance devices, with someone hundreds of miles away secretly extracting their messages, photographs, and location while also activating their microphone and recording them in real time. Such capabilities are present in Pegasus, a spyware produced by NSO Group, an Israeli maker of mass surveillance weapons. What is Pegasus? Pegasus is a hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones using either iOS or Android operating systems. The spyware is named after Pegasus, the white winged horse from Greek mythology. It is named so because it "flies through the...

8 TECH SUPPORT STORIES. A MUST READ!

MOVE THE MOUSE! I asked a user to move her mouse all the way to the right. They picked up the mouse physically and put it on the right side of her desk. RIGHT CLICK! I told the user to right click on the desktop to select properties. She replied that nothing was happening. I asked her again to do the same. She replied with the same answer. When I went to her desk, she had written the word CLICK on a paper on her desk. LAPTOP NOT WORKING! A user was once shouting at me that her laptop was not working even though she hit the keys and tried the touch pad. I run down to her, she shows her laptop still shouting that I wasn’t working properly and couldn’t do my job etc. I look at her laptop, switch it on, turn around and leave the room. OUTAGE PROBLEM! A user once asked if they could download “download the Internet” in case there was a power outage and they could still use it. COMPUTER WON’T TURN ON! Once, a user said that her computer won’t turn on. I asked her to check ...

HOW TO SEE INCOGNITO HISTORY AND DELETE IT

We have heard about private or incognito browsing. It’s the mode that doesn’t store anything in history. While it does store cookies, but are deleted after the session is exited. This mode is known as Incognito browsing in Google Chrome, Private Browsing in Mozilla Firefox, and InPrivate Browsing in Internet Explorer. Whatever we may want to call it, the mode works the same in all browsers. However, sometimes we might want to go back to a page that you previously opened. The question is – can you check your incognito history? Problem is, there is no easy way to go back to that page. So all are search queries we saw is effectively lost. Unless you can Google it up and it shows again. But if it’s not there on the first page of Google, it’s gone forever. But we can still get to know about the websites that have been browsed under the incognito mode. Yes, the private browsing mode has a loophole. You can see the browsing history of someone using incognito mode but only if you h...