A data breach occurs when a threat actor gains unauthorized access to protected data, usually as part of a cybersecurity attack. After gaining access to the data, a threat actor may attempt to steal, disclose it, or extort the data owner.
A data breach can occur in any organization, including small businesses and enterprises. It may affect various types of confidential information, such as trade secrets, personal health information (PHI), and personally identifiable information (PII).
Organizations handling and storing personal data are responsible for protecting it. If threat actors gain unauthorized access to this data and view or steal it, the organization is held accountable by laws and regulations governing data protection. The negative consequences of a data breach can include business disruption, fines, reputation loss, and legal exposure.
In this article:
According to the IBM Cost of Data Breach report, the average cost of a data breach in the US is $4.24 million. Many organizations suffer from the surge in cybercrime, especially from the growth in ransomware attacks.
The actual cost extends beyond the immediate business disruption and technical remediation burden. Additional factors that push up costs include legal penalties, lower productivity, and reputational damage. Organizations may lose customers and investors after a breach, and regulatory bodies may require them to pay hefty fines.
The cost of data breaches is at a record high and will likely continue to rise. The impact of a data breach is especially significant in the healthcare sector, where patient confidentiality is an obligation. Across industries, the largest single factor contributing to the cost of a data breach is the lost revenue resulting from lower customer retention and recruitment rates.
During an attack, systems cannot process data or provide services to customers, resulting in business losses until the organization can repair them. Time is also an important factor—undiscovered vulnerabilities cause more damage when unaddressed for longer. Attackers have more time to exfiltrate data.
Here are examples of recent, highly publicized data breaches:
Compromised passwords are a common cause of data breaches. Many users rely on common phrases for passwords, or reuse passwords between different accounts. Attackers can easily compromise these passwords and once they obtain one, they gain access to multiple accounts owned by the same user.
Organizations must enforce strong password policies, and enforce multi-factor authentication for all sensitive systems and data. Many organizations are transitioning to passwordless authentication, which eliminates the serious security risks associated with weak passwords.
At some point, most software products will experience a security vulnerability that exposes them to cyber attacks. Software vendors regularly discover vulnerabilities, or are informed about them by security researchers, and attempt to remediate them before criminals can exploit them.
Whenever a vulnerability is fixed, the software vendor releases a patch or new version. This patch must be applied as soon as possible by all organizations using the software, as well as their employees and third-party vendors, because attackers will actively seek users who have not yet applied the patch.
Many employees have access to sensitive information, and there is always the possibility that one of them will try to misuse it. Malicious insiders can have different motives, including financial gain, emotional challenges, or a desire for revenge.
Insider threats are extremely difficult to detect using traditional security techniques, because malicious insiders have legitimate access to corporate systems. However, new security technologies such as behavioral analysis make it possible to identify suspicious behavior by existing user accounts, which may indicate an insider threat.
Malware is malicious software that attackers attempt to deploy on a target system, usually via social engineering (tricking users into clicking malicious links or attachments) or by exploiting software vulnerabilities. Malware can compromise credentials or steal data from a victim’s device, encrypt and destroy files on the device, or do other types of damage. Many types of malware can spread rapidly to infect an entire network or environment.
Social engineering is an attempt by an external attacker to trick users into divulging sensitive information or performing actions that violate security policies. A vast majority of cyber attacks leverage social engineering, because users are typically the weakest link of an organization’s cybersecurity defenses. Social engineering techniques include phishing, baiting, pretexting, and scareware.
Organizations should regularly assess their systems to identify vulnerabilities and associated risks. These assessments help determine if the established security policies require updates, strengthening the overall security strategy.
When implementing an Identity and Access Management (IAM) system, organizations should apply the principle of least privilege to ensure that each user only has the necessary access permissions. Maintaining least privilege access can be complicated, especially if the organization has many users with constantly changing roles. However, this security control is essential for ensuring that malicious actors (internal or external) cannot access sensitive data.
Organizations should regularly back up their data and establish a recovery plan to restore their data after a breach. A backup and recovery plan helps ensure a faster response to minimize damage and prevent downtime. Administrators should regularly review the risk management, backup, and recovery policies to prevent attackers or ransomware from accessing backup data.
Penetration tests are simulated attacks that allow ethical hackers to identify vulnerabilities in computer systems, networks, or applications. Organizations may use third-party or in-house penetration testers to mimic an attacker’s techniques and determine how easily they can hack the system.
Penetration tests are also useful for evaluating compliance with security regulations. Organizations use regular pentesting to identify vulnerabilities proactively before an attacker can exploit them.
The HackerOne continual security testing platform combined with the power of ethical hackers prevents data breaches by finding and fixing application flaws before cybercriminals do.
The hacker community surveils an organization's attack surface, looking for the vulnerabilities that are most likely to be exploited. With their experience, creativity, and tenacity they often find vulnerabilities that scanners miss. Hackers recognize the risk context and severity of misconfigurations that can lead to damaging and costly data breaches.
Even in organizations with large internal security teams and mature vulnerability management processes, hackers routinely find and fix a significant number of critical vulnerabilities, assuring that unintended flaws don’t become open doors for bad actors.