Skip to main content

DATA BREACH

“Security is an illusion and Privacy is a myth”

Besides maintaining privacy do you think your data is actually secured?No! it’s not. We have heard about so many data stealing commonly known as data breach, but do you know what it means?

A data breach or data leak is the release of sensitive, confidential or protected data to an untrusted environment. It is a security incident in which data is accessed without authorization. It involves information leakage or exfiltration—unauthorized copying or transmission of data, without affecting the source data. In some cases it incites to complete loss of data. For example in case of ransomware attacks, the unauthorized person encrypts your entire data and asks for a huge ransom to decrypt the data.

In other words, in a data breach, hackers or employees release sensitive data. As a result, the data might be lost, or used by perpetrators for various malicious purposes. As technology progresses, more and more of our information has been moving to the digital world. As a result, cyberattacks have become quite common and costly. Globally, the average total cost to a company of a data breach is $3.86 million, according to a study by the Ponemon Institute. This means that at $148 on average per stolen record, online crime is a real threat to anyone on the internet.

In other words, in a data breach, hackers or employees release sensitive data. As a result, the data might be lost, or used by perpetrators for various malicious purposes. As technology progresses, more and more of our information has been moving to the digital world. As a result, cyberattacks have become quite common and costly. Globally, the average total cost to a company of a data breach is $3.86 million, according to a study by the Ponemon Institute. This means that at $148 on average per stolen record, online crime is a real threat to anyone on the internet.


Why do data breaches occur?

Cybercrime is a profitable industry for attackers and continues to grow. Hackers seek personally identifiable information to steal money, compromise identities, or sell over the dark web. This serves an easy way for a well skilled person to ask for a handsome amount of money or ‘Bitcoins- cryptocurrency’ from a well established company.

 

Causes of Data Breaches:

The following are common causes of information leaks at organizations.

      Insider leaks- Insider threats include disgruntled employees, former employees who release credentials to sensitive systems, or business partners. They might be motivated by financial gain, commercially valuable information, or a desire for revenge.

      Unintended disclosure- Many data breaches are not caused by an attack, but rather by unintentional exposure of sensitive information. For example, employees might view sensitive data and save it to a non-secure location, or may discuss with the staff or might share it on the internet.

Examples of some of the biggest data breaches :

Marriott International

Date: 2014-18

Impact: 500 million customers

Details: Marriott International announced in November 2018 that attackers had stolen data of 500 million customers approximately. The attackers were able to take some combination of contact information, passport number, Starwood Preferred Guest numbers, travel information, and other personal information. The credit card numbers and expiration dates of more than 100 million customers were believed to be stolen but the officials were uncertain whether any transaction took place or not.

Yahoo

Date: 2013-14

Impact: 3 billion user accounts

Details: Yahoo announced in September 2016 that in 2014 it had been the victim of what would be the biggest data breach in history. The attackers compromised the names, dates of birth, email addresses and passwords, and security questions and answers of almost 3 billion user accounts.

How can I help protect my personal information in the event of a data breach?

      Use strong, secure passwords.

      Monitor your bank and other financial accounts.

      Use only secure URLs

      Secure your phone

      Back up your files and ensure their safety

      Avoid oversharing on social media

      Implement high-quality security software

 

What are companies doing about data breaches?

Many companies are tightening security measures and reassessing their procedures to better protect the consumer data they use and store. Laws and regulations are in place that require companies to take specific steps in the event of a data breach or other security incident. Most states require companies to send data breach notifications to consumers when their personally identifiable information may have been compromised.

 

 

Comments

Popular posts from this blog

Unhackable Internet

  W hy it matters?   The internet is increasingly vulnerable to hacking; a quantum one would be unhackable. Quantum Computing    A quantum internet could be used to send unhackable messages, improve the accuracy of GPS, and enable cloud-based quantum computing. For more than twenty years, dreams of creating such a the quantum network have remained out of reach in large part because of the difficulty to send quantum signals across large distances without loss.   Now, Harvard and MIT researchers have found a way to correct for signal loss with a prototype quantum node that can catch, store and entangle bits of quantum information. The research is the missing link towards a practical quantum internet and a major step forward in the development of long-distance quantum networks.   The U.S Department of Energy (DoE) explains how a quantum link will make it happen through two quantum phenomenon: the first is quantum entanglement, where two-particle ...

Impact of Social Media on Business

Watch out for that bird! Imagine you are skydiving, you are visiting one of the most beautiful countries in the world and you want to share that experience with your loved ones and friends. Why not send a postcard? Oh wait, you’re already back from the trip by the time that postcard has reached, or it got lost in the mail. If only there was an alternative. This isn’t 1990. You have a platter of platforms to share your adventure. Webster’s dictionary defines social media as-“ forms of electronic communication (such as websites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content (such as videos).”In simple words, social media, are various public platforms where people can share their views, stories, etc. with the help of various mediums. Starting with websites such as MySpace, Orkut, and Facebook, etc. it is now estimated that there are about 200 social media websites in ...

Pegasus Spyware: Flying Through The Air

 Hundreds of millions of people can't imagine life without their smartphones. Almost every aspect of their daily lives, from the most mundane to the most intimate, is within easy reach and hearing distance of their smartphones. Only few people realize that their phones may be used as surveillance devices, with someone hundreds of miles away secretly extracting their messages, photographs, and location while also activating their microphone and recording them in real time. Such capabilities are present in Pegasus, a spyware produced by NSO Group, an Israeli maker of mass surveillance weapons. What is Pegasus? Pegasus is a hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones using either iOS or Android operating systems. The spyware is named after Pegasus, the white winged horse from Greek mythology. It is named so because it "flies through the...