• About Us
  • Contact
  • Careers
  • Send Us a Tip
Menu
  • About Us
  • Contact
  • Careers
  • Send Us a Tip
CyberNews logo
Newsletter
  • Home
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
Menu
  • Home
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
CyberNews logo

Home » Security » How to avoid data breaches

How to avoid data breaches

by Chris Stokel-Walker
8 September 2020
in Security
0
woman by computer coding
20
SHARES

Mistakes cost big money.

A data breach can be a costly situation – and not just in terms of the data lost. It can literally lose companies money – the average cost of a data breach has risen 130% in the last 14 years to reach $8.2 million, according to research by IBM. But it’s not just the monetary loss, not the value of the precious data that disappears that you have to take account of. 

There’s also the impact on a company’s reputation for misplacing, losing, or having data stolen from them, and the loss of confidence that it can instill in customers. People who might otherwise have been fiercely loyal to a particular company could soon turn sour when confronted with the reality that the organization they trusted to keep their most precious information safe didn’t do so.

So how can you avoid being one of those companies, and making sure that a data breach doesn’t occur? It’s never a foolproof plan, and breaches can happen any time – and aren’t necessarily anyone’s fault. But here’s what you should keep in mind to mitigate the risk of it happening.

It’s not always hackers

Many people assume that every single data breach is the result of an unwanted incursion by a black hat hacker into a system, designed to steal away precious data cargo. But sometimes it isn’t: it can happen within organizations too.

Whether it’s deliberate or not, sometimes data gets misplaced.

Employees can accidentally send data that isn’t meant to leave the organization to a third party, while the insider threat of someone with a plan and a way to gain vengeance on a company is just as likely. For that reason, it’s vital that companies keep track of who has access to what, and when. 

You should also control the way that data can be accessed. It’s easier to lose a cell phone containing precious data than it is a laptop, and USB memory sticks can disappear behind the backs of sofas, between train tracks, and out of pockets. Making sure there are strict limits on how people can take the most precious data and then transfer that physically is important.

Keeping your defenses secure

Of course, the majority of data breaches aren’t accidental. Hackers know the value of data that companies hold, and they’re keen to take advantage of that for their own goals. So it’s important that companies and their employees are aware of the different vectors that hackers use to access data and steal it away.

Most commonly, hackers will find a way into companies’ systems by phishing – social engineering attacks designed to trick workers into inputting personal data or installing software that can then be used to take away data without anyone noticing. 

Being aware of the risk and being suspicious of any unusual activity is important.

Some hackers prefer to force their way in, using brute force attacks by simply guessing at passwords to protected systems until they chance upon the right combination. This method is used less commonly because of the time and computing effort it takes – plus the increased likelihood of getting caught – but it can still happen.

Protecting yourself through common sense

The most obvious advice to stop brute force attacks is to not use the same old passwords for private, secure systems. Make it difficult to guess, and the hackers won’t be able to finagle their way into systems. But that’s not the only way people gain entry.

It’s also possible to exploit gaps in operating systems and software by using carefully targeted malware. This can include spyware, which logs keystrokes and therefore takes all the guesswork out of obtaining passwords. For that reason, it’s vital that you regularly scan systems for unusual software and keep things up to date when it comes to operating systems.

Stopping data breaches is difficult because accidents happen – and there are plenty of bad guys out there. But you can reduce the likelihood of them happening by following good practice that makes the chance of it happening smaller. 

Share20TweetShareShare

Related Posts

Nohow International leaks sensitive worker data

12,000+ workers’ IDs, banking details, and other personal data leaked by UK staffing agency

19 January 2021
Telegram app on mobile

Watch out: there’s a new Telegram scam about

15 January 2021
Email icon on laptop screen

How phishing attacks are evolving and why you should care

14 January 2021
Ransom message on laptop screen

Why ransomware attacks will explode in 2021

12 January 2021
Next Post
Daily Mail vs CyberNews

The Daily Mail asked us to hack their journalists. Here's what went wrong

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Popular News

  • 70TB of Parler users’ messages, videos, and posts leaked by security researchers

    70TB of Parler users’ messages, videos, and posts leaked by security researchers

    82912 shares
    Share 82901 Tweet 0
  • ProtonMail review: have we found the most secure email provider in 2021?

    61 shares
    Share 61 Tweet 0
  • Bitwarden Review

    0 shares
    Share 0 Tweet 0
  • The ultimate guide to safe and anonymous online payment methods in 2021

    13 shares
    Share 13 Tweet 0
  • Custom mechanical keyboards – 17 coolest ones we’ve ever seen

    442 shares
    Share 441 Tweet 0
Facebook says some users facing issues with Messenger, Instagram

Factbox: How Facebook, Twitter, and others are girding for inauguration threats

20 January 2021
Uploading on mobile screen and Data Protection on desktop screen

Privacy and data protection trends in 2021

20 January 2021
valve logo

EU hits game distributor Valve, five others with 7.8 million euro fine

20 January 2021
google logo

Trump pardons former Google self-driving car engineer Levandowski

20 January 2021
Malwarebytes hacked by state actors behind SolarWinds attack

Malwarebytes hacked by state actors behind SolarWinds attack

20 January 2021
Edvardas Šileris

Head of Europol’s European Cybercrime Centre: there are no systems that cannot be breached

20 January 2021
Newsletter

Subscribe for security tips and CyberNews updates.

Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!
Categories
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
  • VPNs
  • Password Managers
  • Secure Email Providers
  • Antivirus Software Reviews
Tools
  • Personal data leak checker
  • Strong password generator
About Us

We aim to provide you with the latest tech news, product reviews, and analysis that should guide you through the ever-expanding land of technology.

Careers

We are hiring.

  • About Us
  • Contact
  • Send Us a Tip
  • Privacy Policy
  • Terms & Conditions
  • Vulnerability Disclosure

© 2021 CyberNews

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.

Home

News

Editorial

Security

Privacy

Resources

  • In the News
  • Contact
  • Careers
  • Send Us a Tip

© 2020 CyberNews – Latest tech news, product reviews, and analyses.

Subscribe for Security Tips and CyberNews Updates
Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!