What is a Data Breach and How to Prevent It? | Fortinet (2024)

What Can Attackers Do with Stolen Data?

Attackers tend to target high-value data such as corporate data or personally identifiable information (PII), which they can sell for financial gain or cause harm to the individual or organization. As attackers become increasingly sophisticated, their methods become meticulously planned to unearth vulnerabilities and identify individuals who are susceptible to an attack.

Once they gain access to data, the effects can be hugely damaging. A data breach can lead to organizations not only losing their data, which could be sensitive financial information or corporate secrets, but they can also suffer fines, financial loss, and reputational damage, which are often irreparable. An attack on a government agency could leave confidential and highly sensitive information, such as military operations, national infrastructure details, and political dealings, exposed to foreign agencies, which could threaten the government and its citizens.

Individuals who suffer a breach could lose their personal data, such as banking details, health information, or Social Security number. Armed with this information, a cyber criminal could steal the individual’s identity, gain access to their social accounts, ruin their credit rating, spend money on their cards, and even create new identities for future attacks.

Some of the biggest data compromise events in history had long-lasting effects on the organizations that suffered them. These data breach examples include:

Yahoo

In 2016, internet giant Yahoo revealed that it had suffered two data breaches in 2013 and 2014. The attacks, which affected up to1.5 billion Yahoo accounts, were allegedly caused by state-sponsored hackers who stole personal information, such as email addresses, names, and unencrypted security questions and answers.

Equifax

A data breach against financial firm Equifax between May and June 2017 affected more than153 million peoplein Canada, the U.K., and the U.S. It exposed customers’ personal data, including birth dates, driver’s license numbers, names, and Social Security numbers, as well as around 200,000 credit card numbers.The breach was caused by a third-party software vulnerability that was patched but not updated on Equifax’s servers.

X (formerly Twitter)

In 2018, Twitter urged its330 million usersto change and update their passwords after a bug exposed them. This was the result of a problem with the hashing process, which Twitter uses to encrypt its users’ passwords. The social networking site claimed it found and fixed the bug, but this is a good example of potential vulnerability exploits.

Twitter also suffered a potential breach inMay 2020, which could have affected businesses using its advertising and analytics platforms. An issue with its cache saw Twitter admit it was “possible” that some users’ email addresses, phone numbers, and the final four digits of their credit card numbers could have been accessed.

First American Financial Corporation

In May 2019, insurance firm First American Financial suffered an attack that saw more than885 millionsensitive documents exposed. The attack resulted in files containing bank account numbers and statements, mortgage records, photos of driver’s licenses, Social Security numbers, tax documents, and wire transfer receipts dating back to 2003 digitized and made available online.

The attack is believed to have been caused by an insecure direct object reference (IDOR), a website design error, which makes a link available to a specific individual. Unfortunately, that link became publicly available, meaning anyone could view the documents.

Facebook

In September 2019, a server containing phone numbers linked to more than419 millionFacebook users’ account IDs was exposed. The server was not password-protected, which meant that anyone could find, access, and search the database. Three months later, a database containingroughly 300 millionFacebook users’ names, phone numbers, and user IDs was exposed by hackers and left unprotected on the dark web for around two weeks.

What is a Data Breach and How to Prevent It? | Fortinet (2024)

FAQs

What is data breach and how can it be prevented? ›

Data Breach Definition

It can be the consequence of an accidental event or intentional action to steal information from an individual or organization. For example, an employee could accidentally expose sensitive information or they could purposely steal company data and share it with—or sell it to—a third party.

What is data breach? ›

To define data breach: a data breach exposes confidential, sensitive, or protected information to an unauthorized person. The files in a data breach are viewed and/or shared without permission. Anyone can be at risk of a data breach — from individuals to high-level enterprises and governments.

What are the 4 common causes of data breaches? ›

The 8 Most Common Causes of Data Breaches
  • Weak and stolen credentials.
  • Backdoor and application vulnerabilities.
  • Malware.
  • Social engineering.
  • Too many permissions.
  • Ransomware.
  • Improper configuration and exposure via APIs.
  • DNS attacks.
Apr 19, 2024

How do I protect myself from a data breach? ›

Staying secure in light of data breaches
  1. Keep an eye on your bank and credit card accounts. ...
  2. Monitor your identity with the help of a service. ...
  3. Place a fraud alert. ...
  4. Look into freezing your credit if needed. ...
  5. Update your passwords. ...
  6. Consider taking out identity theft coverage. ...
  7. Clean up your personal data online.

Why is my iPhone telling me my passwords have been compromised? ›

Why did Apple send you a data leak notification? To enhance your security, Apple compares the passwords you store on your iPhone against known leaked passwords to try to find matches. The company does this using methods that don't reveal your passwords to Apple. All the processing happens on your device only.

What is an example of a data breach? ›

Examples of personal data breaches include: Human error, for example an email attachment containing personal data being sent to the incorrect recipient or records being deleted accidentally. Sharing of passwords or other credentials with third parties.

What are the three 3 kinds of data breach? ›

The most common types of data breaches are: Ransomware. Phishing. Malware.

How to fix a data breach? ›

Update all impacted accounts with strong passwords and two-factor authentication (2FA). If you reuse passwords across accounts, make sure you update all of them. Contact your bank or credit card company to cancel your cards and request new ones. Continue to monitor your statements for signs of fraud.

How do most data breaches occur? ›

Hacking attacks may well be the most common cause of a data breach but it is often a weak or lost password that is the vulnerability that is being exploited by the opportunist hacker.

What causes 90% of data breaches? ›

A data breach can be disastrous for a business. In nine cases out of ten, human error is a significant contributing factor.

How did my data get breached? ›

The vast majority of data breaches are caused by stolen or weak credentials. If malicious criminals have your username and password combination, they have an open door into your network.

What are the three biggest data breaches of all time? ›

  1. 1. Yahoo. Year: 2013-2016. Number of records affected: Over 3 billion user accounts. ...
  2. Equifax. Year: 2017. ...
  3. 3. Facebook. Year: 2019. ...
  4. First American Financial Corporation. Year: 2019. ...
  5. Aadhaar. Year: 2018. ...
  6. MySpace. Year: 2013. ...
  7. LinkedIn. Year: 2021. ...
  8. Friend Finder Networks. Year: 2016.
Aug 21, 2024

How to avoid a data breach? ›

Use strong passwords that are difficult to guess, and keep them secure. Never share or reveal your passwords, even to people or organizations you trust. Use different passwords for work and non-work accounts.

Can I sue for data breach? ›

Anyone who has been affected by a data breach may have the right to file a lawsuit, including individuals, businesses, or organizations that have suffered harm due to the breach.

What would be considered as a data breach? ›

Answer. A data breach occurs when the data for which your company/organisation is responsible suffers a security incident resulting in a breach of confidentiality, availability or integrity.

What is the most common data breach? ›

Read on, and we'll discuss the seven most common types and how they can affect your business.
  1. Stolen Information. ...
  2. Ransomware. ...
  3. Password Guessing. ...
  4. Recording Keystrokes. ...
  5. Phishing. ...
  6. Malware or Viruses. ...
  7. Distributed Denial-of-Service (DDoS)

How to get rid of data breach? ›

Update all impacted accounts with strong passwords and two-factor authentication (2FA). If you reuse passwords across accounts, make sure you update all of them. Contact your bank or credit card company to cancel your cards and request new ones. Continue to monitor your statements for signs of fraud.

Is the Apple data leak warning real? ›

Even though Apple calls it a data leak, it actually means your data ended up in a data breach, and your sensitive details are exposed online (it doesn't mean your phone has been hacked).

What are the 5 steps of data breach? ›

These five steps are:
  • Containment. While 60% of data breaches are discovered within days, one Verizon report notes that 20% could take months to be identified. ...
  • Assessment. ...
  • Notification. ...
  • Investigation. ...
  • Remediation & Evaluation.
May 16, 2023

Top Articles
Ways to Have a Fabulous Christmas on a Budget
30 ways to stay warm, save money this winter
Joe Taylor, K1JT – “WSJT-X FT8 and Beyond”
Best Pizza Novato
Loves Employee Pay Stub
Mopaga Game
Truist Park Section 135
Acts 16 Nkjv
سریال رویای شیرین جوانی قسمت 338
CHESAPEAKE WV :: Topix, Craigslist Replacement
Midway Antique Mall Consignor Access
Locate Td Bank Near Me
Campaign Homecoming Queen Posters
LeBron James comes out on fire, scores first 16 points for Cavaliers in Game 2 vs. Pacers
Erin Kate Dolan Twitter
Conduent Connect Feps Login
4302024447
U/Apprenhensive_You8924
Jc Post News
Five Day National Weather Forecast
Craigslist Malone New York
Busby, FM - Demu 1-3 - The Demu Trilogy - PDF Free Download
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Nhl Tankathon Mock Draft
Caledonia - a simple love song to Scotland
[Cheryll Glotfelty, Harold Fromm] The Ecocriticism(z-lib.org)
2024 INFINITI Q50 Specs, Trims, Dimensions & Prices
Quest: Broken Home | Sal's Realm of RuneScape
Euro Style Scrub Caps
Providence Medical Group-West Hills Primary Care
Xfinity Cup Race Today
R&S Auto Lockridge Iowa
Wkow Weather Radar
Ihub Fnma Message Board
When Does Subway Open And Close
Villano Antillano Desnuda
Summoners War Update Notes
Martins Point Patient Portal
Used Safari Condo Alto R1723 For Sale
Khatrimmaza
In Branch Chase Atm Near Me
1400 Kg To Lb
The Best Carry-On Suitcases 2024, Tested and Reviewed by Travel Editors | SmarterTravel
Sunrise Garden Beach Resort - Select Hurghada günstig buchen | billareisen.at
Publictributes
Craigslist Putnam Valley Ny
Gateway Bible Passage Lookup
Windshield Repair & Auto Glass Replacement in Texas| Safelite
Ephesians 4 Niv
18 Seriously Good Camping Meals (healthy, easy, minimal prep! )
Ocean County Mugshots
Anthony Weary Obituary Erie Pa
Latest Posts
Article information

Author: Madonna Wisozk

Last Updated:

Views: 5800

Rating: 4.8 / 5 (68 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Madonna Wisozk

Birthday: 2001-02-23

Address: 656 Gerhold Summit, Sidneyberg, FL 78179-2512

Phone: +6742282696652

Job: Customer Banking Liaison

Hobby: Flower arranging, Yo-yoing, Tai chi, Rowing, Macrame, Urban exploration, Knife making

Introduction: My name is Madonna Wisozk, I am a attractive, healthy, thoughtful, faithful, open, vivacious, zany person who loves writing and wants to share my knowledge and understanding with you.