How data loss can occur?


image (forbes)


Whether your business has 100 customers or 1,000,000 protecting your data from various risks is a priority. Because a data loss is lethal.

A Data loss can change the course of your life. 

When sensitive information is exposed individuals, businesses, government can face huge complications. In the connected world no one is safe from hackers. Their weapon could be SMS, Bluetooth, an email or a website that will use a small vulnerability  in your phone or laptop to do a lager damage to you and your organization.‌

Most people are unaware of how modern security threats work, because they do not give it enough attention to information security.

So! What exactly is a data breach?

A data breach exposes confidential, sensitive, or protected information to an unauthorized person without permission. 

Data breaches happen due to weaknesses in technology and human actions weather intentional or not. We use many new digital devices with minimal security testing, and expose ourselves to hacking.

Data Breaches are not only resulted from an outside hacker, some attacks are caused by malicious insider. Loss of an unlocked laptop or external hard drive or a smart phone containing sensitive information can cause a data breach.


Most malicious data breaches result from cyberattacks given below.


Phishing

Brute Force Attacks

Malware


Phishing attackers deceive insiders to steal credential or access to sensitive data. 

Hackers use various software tools guess passwords to your systems or networks.

Malware make use of security flaws in your software or operating system to infect undetected and steal data.

The real damage of data breaches occur when a hackers steals and sells Personally Identifiable Information (PII) or corporate intellectual data for financial gain.

Data data breach can have a devastating effect on any organization. It can harm reputation and financial stability. Businesses like Facebook, Target, and Yahoo have been the victims of a data breach. 

Compromised data in government organizations, will result exposing highly confidential information on Military, Legal and Political activities. Hackers access to sensitive information critical infrastructure can pose a major threat to the citizens.

Data leaks can reveal personal information from banking information and credentials of individuals. Identity theft is a major threat to data breach victims.


Niranjan Meegammana 

Comments

Popular posts from this blog

The 7 Layers of Cyber Security : Attacks on OSI model

Best Practices for secure Software Development

ISO 27001 ISMS in a Nutshell