Monday, November 29, 2021
HomeNewsData BreachWhat You Should Know About Data Breaches

What You Should Know About Data Breaches

It is difficult to avoid the fact that cyber security is on everyone’s mind nowadays. It doesn’t take long for cyber security and data breaches to come up in a discussion, whether it’s in the conference room or the cafeteria.

Frequently, story is about the most recent breached organization or what an organization is doing or should be doing to secure itself.


Security Event: An action directed to a system, network, or human intended
to alter the target’s state
Security Incident: An event that violates organizational, regulatory,
legislative or contractual security, or privacy policies
Data Breach: A security incident that:
– Involves the intentional or unintentional access, disclosure,
manipulation or destruction of data; or
– Meets specific definitions of a “Breach” as per state/province or federal
laws or active contracts with clients, third parties or partners

According to definitions above, most organizations have millions of events happen on any day, a number of those are qualified as actual cybersecurity threats, and a part of them are qualified as Breaches.

It is good practice to treat all incidents as potential Breaches until they can be
properly qualified.

Data Breach Statistics (Source: Security Land)
Data Breach Statistics (Source: Security Land)

Source of Data Breach

Data breaches can occur as a result of a wide range of incidents, the most common of those are:

A targeted cyber attack by a criminal specifically targeting an organization
An opportunistic attack such as one by a criminal scanning the internet for vulnerable systems, finding, and exploiting them
Inadvertently through errors and omissions such as an employee who loses a USB key containing sensitive data, or by an event at a third party who was entrusted to protect client data

The above incidents are the most common causes of data breaches, which most security companies examine in greater detail beginning with targeted cyber attacks as a result of cybercrime.

- Advertisement -Threat Intelligence

Latest stories

An In-Depth Guide to Network Security

How much do you know about network security? Do you have a high-level understanding of how it works? Do you know the top priorities...

5 Steps to Protect Yourself Against Ransomware

If you’ve been keeping up with cybersecurity news lately, you’ve likely heard of ransomware, one of the most dangerous cyber threats businesses can face. Ransomware...

How to Spot a Phishing Email

What’s the first thing you do when you get an email in your inbox? If you’re like most people, your answer probably involves something...

Behind The Scenes of a Malware Analysis

Every computer user understands the importance of cybersecurity in today’s world, and businesses must work hard to protect themselves against malicious attacks. But what...

6 Biggest Cybersecurity Threats Facing Businesses

Every day, cybercriminals are finding new ways to target businesses and steal their data, either to sell to the highest bidder or just out...