The continued rise of data breaches


Since the onset of the pandemic, we have frequently depended on technology for business, education, and social interaction. Nevertheless, this reliance has also led to an increase in various scams and data breaches, prompting concern.

What is a data breach?

A data breach occurs when personal information is accessed by an unauthorized user, disclosed without consent, or authorization. This can happen from a number of scenarios:

  • When a USB or mobile device containing personal information or personal files is stolen.
  • A database that contains personal information is hacked.
  • Someone’s personal information is sent to the wrong person.

The impact of data breaches can vary greatly from financial loss, identity theft, and emotional distress. Anyone is vulnerable to a data breach, from big organizations to not-for-profit organizations to individuals.

Why do data breaches happen?

Sometimes, data breaches occur due to human error resulting from a lack of awareness and unauthorized access, such as weak credentials on a computer or ineffectual passwords. In more severe instances, cybercriminals operate in groups to extort money or blackmail organizations into meeting their demands. This can lead to the theft and unauthorized sale of personal identity information (PII), resulting in significant damage. In other, more malicious cases, cybercriminals instigate data breaches to gather information for the purpose of tarnishing the reputation of an organization or an individual.

Cybercriminals follow a standard pattern when targeting an organization for a breach, requiring organized planning. They conduct thorough research on their targets to identify vulnerabilities, including gaps in operating system updates and employees’ susceptibility to phishing campaigns.

Malicious criminals tend to follow a basic pattern: targeting an organization for a breach takes planning. They research their victims to learn where the vulnerabilities are, such as missing or failed updates and employee susceptibility to phishing campaigns.

Hackers identify the vulnerabilities of a target and subsequently devise a strategy to persuade insiders into unintentionally downloading malicious software. On occasion, they may directly target the network.

Once infiltrated, nefarious individuals possess the liberty to meticulously scour for desired data, with ample time at their disposal, given that the average breach remains undetected for over five months.

How to minimize a data breach

Cybersecurity is everyone’s problem as everyone can be a victim. There are some things that we can all do to minimize the risk of being a victim of a data breach.

  • Minimize the gathering of personal information: Disclose only the necessary information to organizations in order for them to provide services, as opposed to fulfilling all their requests. For instance, when prompted for a home address, carefully assess whether the organization truly needs this information, particularly if it is not mandatory.
  • Look for organizations that demonstrate a commitment to cybersecurity. Be cautious of organizations with a subpar cybersecurity reputation. Review an organization’s privacy policy to comprehend the type of information they collect, the methods of collection, and how the organization utilizes that information.
  • Embracing multi-factor authorization: also known as two-factor authentication (2FA), enhances the security of your personal information and account access by adding an additional layer of protection against unauthorized access. Despite potential concerns about its complexity, individuals can utilize various user-friendly apps and programs to facilitate authorization of websites, emails, and applications from their smartphones. While many of these authorization applications are available for free, some paid options offer additional services.
  • Changing passwords regularly is essential to bolstering the security of your network. Consider utilizing a password manager to achieve this. Various password managers offer both free and paid services, allowing you to generate intricate passwords to mitigate the risk of cyber attacks. Additionally, you can opt to create a pass-key as a password replacement. Numerous applications and websites provide this service, catering to both free and paid users.
  • Cybersecurity training: Whether you are already involved in the IT or cybersecurity sector or not, it is advisable to contemplate pursuing formal cybersecurity training. This can be offered by your IT or Human Resources department, and if not available internally, there are numerous reputable courses provided by organizations such as Google, Microsoft, Codecademy, and LinkedIn, offering valuable insights from industry experts.

While it may be impossible to entirely eradicate scams and hacking, concerted efforts can be made to mitigate their impact on businesses, organizations, individuals, and the global community. Safeguarding data, preserving one’s digital identity, and upholding the ethical considerations of information technology are all part of a collective global endeavor.

Data breaches will continue to rise due to a lack of cybersecurity awareness.


Leave a Reply

Discover more from Smartie Bytes

Subscribe now to keep reading and get access to the full archive.

Continue reading