In a recent data breach discovered by the Accellion incident, many of its clients including Kroger, Washington State Auditor, and Jones Day customers are affected. Data breaches are not unusual, and it often happens to the largest companies in the world. The scale of data breaches has grown in recent years, and millions and even billions of people are affected by connected incidents. Data breaches occur from hacking and software vulnerabilities, and nothing is invincible from attacks and leaks
What is a data breach?
Data breach is known as an incident in which confidential, sensitive, and personal data may have been viewed, stolen, or captured by an unauthorized person. Some of the critical information includes personally identifiable information (PII), credit card information (CCI), personal health information (PHI), and intellectual property.
There have been more than 30K incidents over the last 10 years, and the numbers are growing. The scary part of data breaches is that the lost data becomes a public record as the data are sold in dark web or shared in hacker's communities. Personally identifiable information (PII) such as the name, email, password, address, credit card, social security number, and even financial data are leaked through the data breaches.
The companies do their best to protect their data by spending millions of dollars, but vulnerabilities that exist in the software are used to hack into systems and steal personal data. There is nothing you can do to protect your data from those data breaches as you're using some apps and websites from the largest companies. You can only hope that those companies you're using do their job and protect their systems from hackers.
History of data breaches
The transition of data storage from customer premise equipment (CPE) to cloud played a significant role in widespread data breaches. With the advancement in technology, companies adopt cloud computing and shift the workforce to the mobile environment causing data storage from local servers to cloud drives. The noticeable data breaches occur in the early 2000s and skyrocketed beginning around 2005.
Laws and regulations such as HIPAA and PCI compliance is created to provide guidelines for companies to protect their consumer data. Also, the requirement to notify affected customers in the event of data breaches help consumers aware of incidents
There has been a significant number of data breaches that occurred in the last decades including Adobe, Canva, eBay, Equifax, LinkedIn, Sony Pictures, Ashley Madison, and Yahoo to name a few. Those incidents affected millions of people and some are shared in the hacker's forums. Hackers generally breach someone's data to earn money, insult someone, or boast of their abilities. The sad part of this horrible thing is that trend is increasing sharply and the scale is much larger than before. The number of affected records is increasing to millions and billions with no sign of stopping.
Conclusion
With more and more data moving to the cloud, hackers are more aggressive in breaching data from the largest companies in the world. As there is nothing we can do to prevent data breaches, we need to protect our online accounts with a strong password and 2FA so that no one can sabotage your personal and financial accounts even if one of your accounts is affected by a data breach. Fraudsters use stolen information to further damage victims with what's known as the identity theft.
Share this post
Popular Articles
Email Delivery Problems Explained
November 12, 2006
With ever growing number of spam emails flooding the Internet, more and more ISPs tighten their email filtering system to prevent spams delivered to their clients. It is virtually impossible to block even 50% of the spams arriving in a mail server, and there will always be false positives (legitimate emails filte [...]
Learn moreWhat is an IP Address?
February 16, 2007
The Internet Protocol Address (or IP Address) is a unique address that computing devices such as personal computers, tablets, and smartphones use to identify themselves and communicate with other devices in the IP network. Any device connected to the IP network must have a unique IP address within the network.
Learn moreWhat is a Subnet Mask?
February 22, 2007
address and the host address. A subnet mask separates the IP address into the network and host addresses (<network><host>). Subnetting further divides the host part of an IP address into a subnet and host address (<network><subnet><host>) if additional subnetwork is needed. Use the Learn more
What is a MAC Address?
March 18, 2007
MAC, Media Access Control, address is a globally unique identifier assigned to network devices, and therefore it is often referred to as hardware or physical address. MAC addresses are 6-byte (48-bits) in length, and are written in MM:MM:MM:SS:SS:SS format. [...]
Learn moreWhat is a TCP/IP?
April 8, 2007
TCP/IP, Transmission Control Protocol/Internet Protocol, is the suite of two protocols, TCP and IP, used to interconnect network devices on the Internet. The TCP performs the handshake between the network devices to establis [...]
Learn moreLeave a comment
All comments are moderated. Spammy and bot submitted comments are deleted. Please submit the comments that are helpful to others, and we'll approve your comments. A comment that includes outbound link will only be approved if the content is relevant to the topic, and has some value to our readers.
Comments (0)
No comment