Six Types of Data Breaches Your Company Needs to Prepare For
Just months removed from the cyberattack that shut down the colonial pipeline and forced an executive order on cybersecurity, public and private sector organizations alike have taken stock of their security processes to assess potential vulnerabilities and prevent similar attacks. Data breaches are a top cybersecurity threat, opening the door to data leaks and ransom attacks that cause massive disruption and make national headlines.
We all know the risks. According to a survey conducted by the World Economic Forum, almost 80% of senior cybersecurity leaders called ransomware a “dangerous” and “growing threat to our public safety.”
Despite knowledge of these risks, the volume of data breaches is increasing. According to Statista, “the number of data breaches in the U.S. has significantly skyrocketed within the past decade from a mere 662 in 2010 to over a thousand by 2020.” As we’ve written before, “breaches can and will occur,” leaving cybersecurity challenged with the gargantuan task of minimizing data risk in a sea of vulnerable and interconnected accounts, portals, databases and cloud assets.
In order to take on this challenge, it’s important to know the basics. Let’s discuss the types of data breaches, how they occur and some best practices for mitigating risk and securing the organization.
What is a Data Breach?
A data breach is the unauthorized intrusion of protected systems with access to sensitive information conducted by a threat actor. Once inside, threat actors can leverage their access to steal valuable user data, hijack system controls and generally wreak havoc for the organization. Data breaches can occur in any size organization, impacting both small businesses and large corporate enterprises.
Common targets of a data breach include both employee and customer data such as personally identifiable information (PII), health records, credit card numbers and login credentials. Other targets include guarded corporate or government data such as intellectual property (IP), trade and state secrets, private records and more.
The consequences of a data breach and subsequent data leakage can lead to lost revenue, reputational damage, operational downtime and even legal action. These costs can vary, ranging anywhere from $30,000 on average to even as high as $1.6 million in some cases. The recovery costs from the colonial pipeline attack are estimated to be ranging upwards of tens of millions of dollars on top of the $4.4 million ransom already paid out in cryptocurrency to the hacker group.
What Are the Types of Data Breaches?
Threat actors use a wide variety of attack tactics and methods to gain access to an organization's protected data. While the breach relates to the point of intrusion, it often refers to the attack itself. According to the 2021 Verizon Data Breach Investigations Report (DBIR), a data breach refers to “an incident that results in the confirmed disclosure—not just potential exposure—of data to an unauthorized party.”
With this in mind, here are six of the most common types of data breaches that your company’s security team should look out for.
Due to their relative effectiveness, along with easy-to-deploy phishing kits, phishing and spear phishing have been on the rise. A recent FBI Internet Crime Complaint Center (IC3) report noted that “phishing scams resulted in 241,342 complaints and losses of over $54 million in 2020 alone.”
Preventing These Types of Data Breaches
Preventing these types of data breaches and mitigating risk is a huge challenge for security teams facing off against a growing and evolving threat landscape. According to the ZeroFox Report, The Future of Digital Threats: 2020 Insights, 2021 Predictions, threat actors largely doubled down on existing capabilities and continued to challenge defenders to stop them.
Security teams should be sure to take the following steps to mitigate threat trends and safeguard their organization from data breaches:
- Enable multi-factor authentication for all accounts
- Focus on intrusion chains rather than attribution for more effective disruption
- Maintain security best practices and enforce a security control on the creation of new cloud instances
- Always plan for the future and be proactive in evolving policies and plans to mitigate risk while supporting future-state business operations (such as supporting a remote workforce)
- Double down on training and education to cut down on user errors and help employees make safe, risk-averse decisions
How You Can Protect Your Company
The ZeroFox team continues to produce informative resources and engaging events to help security teams and organizations as a whole navigate unknown territory as the landscape continues to evolve. To learn more about the top threat trends from 2020, as well as predictions on the tactics and techniques expected to increase in 2021, download the free ZeroFox report on The Future of Digital Threats and watch the on-demand webinar.