pwshub.com

A data leak and a data breach

Partner Content For people who haven't personally experienced them, terms like data leak or data breach may seem unfamiliar and foreign - much like visiting a new destination abroad.

Having some prior knowledge is great, but it's just scratching the surface! The truth is that people don't always understand the significance of leaks and breaches, or their potential impact on a person or company.

So, buckle up: this article explains (in simple terms) what data leaks and data breaches are, their differences, how to prevent them, and more.

In only the first quarter of 2023, 6.41 million data records were leaked 300 million accounts were leaked globally. So far, Europe remains the most breached region with 116.6 million breaches, North America comes second with 101.7 million breaches, and Asia ranks third with 26.3 million accounts affected.

If these numbers say nothing, it's worth putting them into practice and introducing - or giving a reminder of - the most significant data leaks/breaches globally. Remember the LinkedIn (11.4 million emails breached) and Duolingo (2.6 million emails breached) breaches? These numbers are considered small compared to some of the world's biggest breaches, such as:

- The Aadhaar data breach in 2018. It exposed over 1.1 billion records.

- The Yahoo data breach in 2013. It was revealed that 3 billion accounts were affected.

- The Cam4 data breach in 2020. It exposed more than 10 billion data records.

- And let's not forget one of the most recent ones - the USDoD (United States Department of Defense) hacking group attack, which affected 2.9 billion people's records.

The impact of a data breach can cause financial and privacy loss, identity theft, damage to credit scores, and more. Meanwhile, the average cost of a data breach worldwide for companies is around 4.45 million US dollars.

Data leaks vs. data breaches: what's the difference?

Understanding and staying aware of global trends helps with grasping the significance of data leaks and breaches. That said, it's essential to know the difference between the two.

A data leak exposes sensitive and confidential data to unauthorized third parties. In short, they usually happen because of poor operational and cybersecurity practices or individual accidents. A data breach, on the other hand, usually occurs because of a cyberattack, when unauthorized individuals gain access to confidential or sensitive data.

Data leaks are often unintentional and usually caused by human error. These can include sending emails with sensitive information to the wrong recipient; using weak passwords or sharing them carelessly; clicking on links in phishing emails; downloading malware; using unprotected Wi-Fi networks; lsing outdated operating systems; or not encrypting data in transit and at rest.

Data breaches are often deliberate and can be caused by cyberattacks when unauthorized people access sensitive information without permission. These can include using phishing attacks to trick people into revealing information; infiltrating people's devices with malicious software; exploiting security weaknesses in software; weak security practices by third-party vendors; issues in the supply chain; or aintentionally stealing and sharing the stolen data.

The collected data usually depends on the target. Some of the most common types of data exposed include:

- Personally Identifiable Information (PII): first and last names, home and email addresses, social security numbers (SSNs), and passport and driver's license numbers;

- Financial information: credit card numbers, expiration dates, security codes, bank account numbers, transaction histories, and tax information;

- Personal health information: medical histories, treatments, diagnoses, prescriptions, and health insurance details;

- Accounts' information: login credentials, authentication tokens, session IDs, and info used for accounts' recovery processes;

- Intellectual property information: company patents, trade secrets, financial reports, customers' data, and information about employees;

- Other sensitive information: GPS and location data, messaging records, personal media, and other information.

How to prevent data leaks/breaches

An individual can rarely prevent a data breach, as that typically depends on how companies handle people's data. However, individuals can prevent data leaks by following basic security measures, such as creating strong and unique passwords; using two-factor authentication (2FA) including physical security keys; utilizing reputable password managers; keeping all devices up to date; installing and using antivirus software; backing up important data; cautiously sharing sensitive information; using a VPN, especially while connected to untrusted networks or connecting segments of sensitive IT infrastructure; or being aware of online scams and not falling for them.

Additionally, people can consider using online security tools. Everyone probably has heard the name Surfshark by now. But what about their specific products, Alternative ID, Alternative Number, and Surfshark Alert?

Surfshark's Alternative ID is a tool that generates a brand new online identity, including a name, email, and home address - keeping the individual's real email address and name private, minimizing the possibility of getting spam emails, and preventing personal info from falling into the hands of data brokers or other malicious actors. Similarly, Surfshark's Alternative Number generates a virtual phone number, masking the real one and minimizing data sharing, robocalls, smishing, and identity theft risk.

Surfshark Alert on the other hand, is a tool that notifies people if their email address appears in breached online databases, informs them about the security status of their personal identification number, checks their password's vulnerability, and monitors their credit cards. These alerts allow people to take immediate action if their data is compromised.

With data breaches and leaks affecting millions worldwide, the importance of online security measures cannot be overstated. Always remember to stick to basic online security practices and consider the extra layer of protection by using services like Surfshark's Alternative ID, Alternative Number, and Surfshark Alert to reduce online risks.

You can maximize online security now with an exclusive Surfshark offer: 83 percent off and 3 extra months.

Contributed by Surfshark.

Source: theregister.com

Related stories
1 month ago - More than 2.7 billion U.S. personal records, including Social Security numbers, were leaked on a hacking forum. Kurt “CyberGuy" Knutsson tells you what you need to know.
1 month ago - HealthEquity, a health savings account provider, fell victim to a data breach that put over 4.3 million Americans' information at risk.
1 month ago - Background check company National Public Data admitted it exposed information like phone numbers, addresses and Social Security numbers to hackers.
2 weeks ago - Cybersecurity researchers found new Iranian hacker networks targeting U.S. political campaigns. Kurt “CyberGuy" Knutsson reveals what you need to know and how to protect yourself.
2 weeks ago - CNET recommends the best VPN service after testing top VPNs like ExpressVPN, NordVPN, Surfshark, CyberGhost, IPVanish, Hotspot Shield and Private Internet Access.
Other stories
25 minutes ago - Logitech's mainstream take on the Loupedeck is only as useful as the work you put into customizing it -- and if your needs match what it offers.
25 minutes ago - Americans with a US mailing address can now fill out a passport renewal application via its website, rather than needing to print a physical copy of...
25 minutes ago - Why You Can Trust CNET Our expert, award-winning staff selects the products we cover and rigorously researches and tests our top picks. If you buy...
25 minutes ago - More and more spy cams are being hidden in Airbnbs and other rentals. These tricks will help you find them fast so you can act without ruining a vacation.
25 minutes ago - Yes, there is a right way to machine-wash your sheets, pillowcases and other bedding.