{"id":3274,"date":"2020-03-16T13:43:00","date_gmt":"2020-03-16T13:43:00","guid":{"rendered":"https:\/\/www.digitalogy.co\/blog\/?p=3274"},"modified":"2025-09-30T17:43:08","modified_gmt":"2025-09-30T12:13:08","slug":"data-breaches-what-you-need-to-know-about-this-threat-now","status":"publish","type":"post","link":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/","title":{"rendered":"Data Breaches &#8211; What You Need to Know About this Threat"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Cybercrime is the greatest threat to every company in the world.<br>&#8211; <strong>Ginni Rommety<br><\/strong><\/p>\n\n\n\n<p>Cybersecurity is one of those areas in our digital world where overconfidence does not bode well for users, developers, and website owners. No matter how \u201cimpregnable\u201d your security protocols are, you need to be at the edge of your seat and up on your toes all at the same time for any vulnerability that may be exploited by cyberthieves.<\/p>\n\n\n\n<p>Being ignorant of such attacks is even worse. Financial loss and identity theft result in these types of cyberattacks. In the figure below, we will see the top online banking vulnerabilities, most of which come from <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.ptsecurity.com\/ww-en\/analytics\/vulnerabilities-rbo-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/www.ptsecurity.com\/ww-en\/analytics\/vulnerabilities-rbo-2019\/\">in-house applications making up 59% of the vulnerabilities<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"842\" height=\"857\" src=\"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/top-online-banking-vulnerabilities.webp\" alt=\"DATA BREACH\" class=\"wp-image-3823\" srcset=\"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/top-online-banking-vulnerabilities.webp 842w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/top-online-banking-vulnerabilities-295x300.webp 295w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/top-online-banking-vulnerabilities-768x782.webp 768w\" sizes=\"(max-width: 842px) 100vw, 842px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><em class=\"markup--em markup--p-em\">Image Source: <\/em><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.ptsecurity.com\/ww-en\/analytics\/vulnerabilities-rbo-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/www.ptsecurity.com\/ww-en\/analytics\/vulnerabilities-rbo-2019\/\"><em class=\"markup--em markup--p-em\">Positive Technologies<\/em><\/a><\/p>\n\n\n\n<p>Cybercriminals are relentless in exploiting the weaknesses in any system. Security experts have been on the defense to fend off these cybercriminals. Some of the most severe cyberattacks involved unbelievably massive data breaches in companies like Yahoo, Facebook, and even Google.<\/p>\n\n\n\n<p><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/eng.umd.edu\/news\/story\/study-hackers-attack-every-39-seconds\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/eng.umd.edu\/news\/story\/study-hackers-attack-every-39-seconds\">Hackers attack every 39 seconds, and on average of 2,244 times a day<\/a>. Since 2018, <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.accenture.com\/us-en\/insights\/security\/cost-cybercrime-study\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/www.accenture.com\/us-en\/insights\/security\/cost-cybercrime-study\">security breaches have increased by 78%<\/a>. In 2019, the <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/www.ibm.com\/security\/data-breach\">average time to identify a data breach was 206 days<\/a> out of the <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/www.ibm.com\/security\/data-breach\">314 days average lifespan of a data breach<\/a>. <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\">94% of these malware infections were delivered by email<\/a>.<\/p>\n\n\n\n<p><strong>Did you know that 81% of confirmed data breaches are according to password weaknesses?<\/strong><\/p>\n\n\n\n<p>A data breach is the release of confidential information into an unsecured environment. It is also identified as information leakage, data spill, data leak, or unintentional data or information disclosure.<strong><br><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Dangers of a Data Breach &#8211;&nbsp;<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"The Dangers of a Data Breach\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/0kK902-ZvNM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Ways How Hackers Can Breach System &#8211;&nbsp;<\/strong><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"> <strong class=\"markup--strong markup--p-strong\" style=\"color: var(--contrast); font-family: inherit; font-size: 24px; font-style: inherit;\">A Compromised Network<\/strong> <\/h3>\n\n\n\n<p>As was mentioned above, a hacker, with his exploit tools, only needs an open the door to gain entry to a secured network. Selling critical information on the dark web does not command a high price. But when the data is used, that is when the hacker\u2019s profit. One way to open the door for a data breach is when an employee willingly discloses information into an unsecured network, thereby opening the door for the breach. Another way is an employee compromised the secured network by opening a document modified with malware. It leads us to the next way in which hackers gain entry to a secured network.<\/p>\n\n\n<div class=\"wp-block-image wp-image-972 size-full\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Defend-against-an-Attack-1024x683.webp\" alt=\"Ways How Hackers Can Breach System\" class=\"wp-image-3824\" srcset=\"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Defend-against-an-Attack-1024x683.webp 1024w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Defend-against-an-Attack-300x200.webp 300w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Defend-against-an-Attack-768x512.webp 768w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Defend-against-an-Attack-1536x1024.webp 1536w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Defend-against-an-Attack.webp 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Image by Vitabello from Pixabay<\/figcaption><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"> <strong class=\"markup--strong markup--p-strong\" style=\"color: var(--contrast); font-family: inherit; font-size: 24px; font-style: inherit; background-color: var(--base-3);\">A Different Type of Human Error<\/strong> <\/h3>\n\n\n\n<p>With the ease of storing our data in different ways, people sometimes forget that they have critical data and information stored in a container that is only protected by a password and maybe a few security questions. Those with malicious intent can exploit a forgotten critical file in seldom-used storage. Most of us have experienced opening two windows wherein we are managing our personal social media site or even the company\u2019s official site and also trying to send that critical file to a boss that needs it as soon as possible. With a simple click and drop on the wrong window or platform, an employee has compromised the network once data is copied and harvested.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cPasswords are like underwear: you don\u2019t let people see it, you should change it very often, and you shouldn\u2019t share it with strangers.\u201d<br><strong>\u2013 Chris Pirillo<\/strong><\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\"> <strong class=\"markup--strong markup--p-strong\" style=\"color: var(--contrast); font-family: inherit; font-size: 24px; font-style: inherit; background-color: var(--base-3);\">Malware and Phishing Attacks<\/strong> <\/h3>\n\n\n\n<p>Through information campaigns, people have become more aware not to install EXE files from unknown sources. But phishing attacks have become clever and sophisticated over time. With the aid of <a href=\"https:\/\/www.digitalogy.co\/blog\/artificial-intelligence-in-banking-opportunities-and-risks\/\" target=\"_blank\" rel=\"noopener noreferrer\">Artificial Intelligence<\/a>, hackers are developing phishing scams, schemes, and attacks that are almost indistinguishable from the real thing. The phishing attack\u2019s objective is to trick and deceive a person. Most phishing attacks are made through email. Having a message that looks legit can make us complacent and trusting to \u201cdo as we are told.\u201d That means we may click the link, open that document, or even install a file when told to do so. This <a href=\"https:\/\/www.digitalogy.co\/blog\/the-importance-of-information-security-for-your-business\/\" target=\"_blank\" rel=\"noopener noreferrer\">compromises the security<\/a> of your device, which then compromises your network opening it to further hidden, malicious visits to explore the servers and harvest critical data.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em class=\"markup--em markup--p-em\">Cyber criminals can use personal details, such as your favorite color, the last four digits of your credit card and your email addresses, to make educated guesses about your sign-in credentials.<br>&#8211; <\/em><strong>Larry Alton<\/strong><\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image wp-image-970 size-full\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Malware-and-Phishing-attacks-1024x683.webp\" alt=\" Malware and Phishing Attacks \" class=\"wp-image-3825\" srcset=\"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Malware-and-Phishing-attacks-1024x683.webp 1024w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Malware-and-Phishing-attacks-300x200.webp 300w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Malware-and-Phishing-attacks-768x512.webp 768w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Malware-and-Phishing-attacks-1536x1024.webp 1536w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Malware-and-Phishing-attacks.webp 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Image by Robinraj Premchand from Pixabay<\/figcaption><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"> <strong class=\"markup--strong markup--li-strong\" style=\"color: var(--contrast); font-family: inherit; font-size: 24px; font-style: inherit;\">Insufficient Knowledge and Training to Defend against an Attack<\/strong> <\/h3>\n\n\n\n<p>All that is needed to compromise a network, whether it is an extensive one or simply small business network, is just an open door. That open door can be an employee that does not know how a phishing attack or scam looks like. That open door can also be the IT personnel that has little to no experience in cybersecurity or may have been lazy in updating and checking the network for unusual traffic. That open door can also be that overconfident owner that bought a costly cybersecurity software but did not train the staff to update their software to patch up any vulnerability in their system.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">IOT without security = Internet of threats<br><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.goodreads.com\/quotes\/tag\/cyber-security\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/www.goodreads.com\/quotes\/tag\/cyber-security\">&#8211; Stephane Nappo<\/a><\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\"><strong class=\"markup--strong markup--p-strong\">Some Biggest Data Breaches Attack Examples<\/strong><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"> <strong class=\"markup--strong markup--li-strong\" style=\"color: var(--contrast); font-family: inherit; font-size: 24px; font-style: inherit; background-color: var(--base-3);\">Yahoo<\/strong> <\/h3>\n\n\n\n<p>Yahoo\u2019s data security team discovered an intrusion on their systems and access sensitive data. At this point, Yahoo thought that hackers have accessed and stolen information of around 500 million users. This number continued to rise throughout the following years. In 2016, Yahoo had announced that breach compromised all 3 billion user accounts of the company.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Yahoo-scaled-1-1024x768.webp\" alt=\"YAHOO\" class=\"wp-image-3826\" srcset=\"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Yahoo-scaled-1-1024x768.webp 1024w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Yahoo-scaled-1-300x225.webp 300w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Yahoo-scaled-1-768x576.webp 768w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Yahoo-scaled-1-1536x1152.webp 1536w, https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/Yahoo-scaled-1-2048x1536.webp 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"> <strong class=\"markup--strong markup--li-strong\" style=\"color: var(--contrast); font-family: inherit; font-size: 24px; font-style: inherit; background-color: var(--base-3);\">Facebook<\/strong> <\/h3>\n\n\n\n<p>Facebook, experienced severe data breach when a collection of databases was found online containing around 419 million users\u2019 information. According to TechCrunch, another set of databases was found to contain information of 133 million US-based Facebook users, 18 million UK-Based Facebook users and 50 million Vietnam-based Facebook users.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cIt takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.\u201d<br>\u2014\u200a<a class=\"markup--anchor markup--h3-anchor\" href=\"https:\/\/www.goodreads.com\/quotes\/tag\/cyber-security\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/www.goodreads.com\/quotes\/tag\/cyber-security\">Stephane&nbsp;Nappo<\/a><\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Facebook Data Breach Affects 50 Million: What You Need To Know | TODAY\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/ihQhBpgVdyE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"> <strong class=\"markup--strong markup--p-strong\" style=\"color: var(--contrast); font-family: inherit; font-size: 24px; font-style: inherit; background-color: var(--base-3);\">Marriott International and Starwood Hotels<\/strong> <\/h3>\n\n\n\n<p>Marriot International announced last November 2018 that hackers were able to infiltrate and steal sensitive information of their customers that amounted to <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2019\/03\/11\/marriott-ceo-reveals-new-details-about-mega-breach\/#86f537f155c0\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2019\/03\/11\/marriott-ceo-reveals-new-details-about-mega-breach\/#86f537f155c0\">around 500 million<\/a>.<\/p>\n\n\n\n<p>Marriot International acquired a hotel brand known as Starwood in 2016. The infiltration already happened way back in 2014, but the breach was only detected around September 2018. They found out that the breach affected only those guests that made a reservation through a Starwood hotel property.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"> <strong class=\"markup--strong markup--p-strong\" style=\"color: var(--contrast); font-family: inherit; font-size: 24px; font-style: inherit; background-color: var(--base-3);\">Equifax<\/strong> <\/h3>\n\n\n\n<p>Equifax got infiltrated around May 2017 through an application vulnerability that compromised the data of <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/epic.org\/privacy\/data-breach\/equifax\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/epic.org\/privacy\/data-breach\/equifax\/\">around 148 million consumers<\/a>. Equifax data breach was found in the last week of July 2017. The files that were compromised included birth dates, driver\u2019s license numbers, and social security numbers. The credit card data of 209,000 account holders were also exposed.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"How the Massive Equifax Data Breach Happened\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/_6Qbslgpw8U?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"> <strong class=\"markup--strong markup--p-strong\" style=\"color: var(--contrast); font-family: inherit; font-size: 24px; font-style: inherit; background-color: var(--base-3);\">eBay<\/strong> <\/h3>\n\n\n\n<p>eBay\u2019s user database was breached and was reported in May 2014, when corporate employees\u2019 accounts were breached by attackers who used these accounts to have access to eBay\u2019s system for 229 days. The number of affected users was around 145 million. The corporation sent a notice for users to change their passwords immediately to abet the attack.<\/p>\n\n\n\n<p><strong>Here is a <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/youtu.be\/fulPBjNfYeg\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/youtu.be\/fulPBjNfYeg\">video<\/a> of 25 of the most significant and most severe data breaches of all time.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong class=\"markup--strong markup--p-strong\">Conclusion: Learn from the Past and Get Smarter Protection<\/strong><\/h3>\n\n\n\n<p>Learning from the past behaviors of data breach attackers can help us better protect ourselves, our data, and our online transactions. It is also a great reminder that we cannot be casual with our cybersecurity. We all should be aware of all data breaches and exactly what information we are sharing with the world without even us realizing it.<\/p>\n\n\n\n<p>As we have seen from the examples above, sometimes hackers exploit every vulnerability they can find in a system to carry out data breach upon the entire network. Know how malware and antiviruses work and study other strategies that attackers use to breach into systems. Keeping all vulnerabilities secured is the first step to defense. In cybersecurity, prevention is always the best kind of protection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime is the greatest threat to every company in the world.&#8211; Ginni Rommety Cybersecurity is one of those areas in our digital world where overconfidence does not bode well for users, developers, and website owners. No matter how \u201cimpregnable\u201d your security protocols are, you need to be at the edge of your seat and up &#8230; <a title=\"Data Breaches &#8211; What You Need to Know About this Threat\" class=\"read-more\" href=\"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/\" aria-label=\"Read more about Data Breaches &#8211; What You Need to Know About this Threat\">Read more<\/a><\/p>\n","protected":false},"author":5,"featured_media":3822,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6,9],"tags":[62,63],"class_list":["post-3274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-data","category-tech","tag-cybersecurity","tag-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Data Breaches &amp; How to Protect<\/title>\n<meta name=\"description\" content=\"A data breach is unauthorized access to sensitive data. Learn how it happens, the risks it causes, and simple ways to protect your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Data Breaches &amp; How to Protect\" \/>\n<meta property=\"og:description\" content=\"A data breach is unauthorized access to sensitive data. Learn how it happens, the risks it causes, and simple ways to protect your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/\" \/>\n<meta property=\"og:site_name\" content=\"Digitalogy Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/digitalogycorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-16T13:43:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-30T12:13:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2020\/03\/Data-breaches-What-you-need-to-know-about-data-breaches.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1510\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"John Ocampos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DigitalogyCorp\" \/>\n<meta name=\"twitter:site\" content=\"@DigitalogyCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Ocampos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Data Breaches & How to Protect","description":"A data breach is unauthorized access to sensitive data. Learn how it happens, the risks it causes, and simple ways to protect your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Data Breaches & How to Protect","og_description":"A data breach is unauthorized access to sensitive data. Learn how it happens, the risks it causes, and simple ways to protect your business.","og_url":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/","og_site_name":"Digitalogy Blog","article_publisher":"https:\/\/www.facebook.com\/digitalogycorp\/","article_published_time":"2020-03-16T13:43:00+00:00","article_modified_time":"2025-09-30T12:13:08+00:00","og_image":[{"width":1510,"height":853,"url":"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2020\/03\/Data-breaches-What-you-need-to-know-about-data-breaches.webp","type":"image\/webp"}],"author":"John Ocampos","twitter_card":"summary_large_image","twitter_creator":"@DigitalogyCorp","twitter_site":"@DigitalogyCorp","twitter_misc":{"Written by":"John Ocampos","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/#article","isPartOf":{"@id":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/"},"author":{"name":"John Ocampos","@id":"https:\/\/www.digitalogy.co\/blog\/#\/schema\/person\/84d088b169848832ecebdcac09cb80a8"},"headline":"Data Breaches &#8211; What You Need to Know About this Threat","datePublished":"2020-03-16T13:43:00+00:00","dateModified":"2025-09-30T12:13:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/"},"wordCount":1325,"commentCount":0,"publisher":{"@id":"https:\/\/www.digitalogy.co\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2020\/03\/Data-breaches-What-you-need-to-know-about-data-breaches.webp","keywords":["cybersecurity","Data"],"articleSection":["Blogs","Data","Tech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/","url":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/","name":"Understanding Data Breaches & How to Protect","isPartOf":{"@id":"https:\/\/www.digitalogy.co\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2020\/03\/Data-breaches-What-you-need-to-know-about-data-breaches.webp","datePublished":"2020-03-16T13:43:00+00:00","dateModified":"2025-09-30T12:13:08+00:00","description":"A data breach is unauthorized access to sensitive data. Learn how it happens, the risks it causes, and simple ways to protect your business.","breadcrumb":{"@id":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/#primaryimage","url":"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2020\/03\/Data-breaches-What-you-need-to-know-about-data-breaches.webp","contentUrl":"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2020\/03\/Data-breaches-What-you-need-to-know-about-data-breaches.webp","width":1510,"height":853,"caption":"Data breaches - What you need to know about data breaches"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalogy.co\/blog\/data-breaches-what-you-need-to-know-about-this-threat-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.digitalogy.co\/blog\/"},{"@type":"ListItem","position":2,"name":"Tech","item":"https:\/\/www.digitalogy.co\/blog\/category\/tech\/"},{"@type":"ListItem","position":3,"name":"Data Breaches &#8211; What You Need to Know About this Threat"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalogy.co\/blog\/#website","url":"https:\/\/www.digitalogy.co\/blog\/","name":"Digitalogy Blog","description":"Insights on Business, Technology and Startups","publisher":{"@id":"https:\/\/www.digitalogy.co\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalogy.co\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalogy.co\/blog\/#organization","name":"Digitalogy","url":"https:\/\/www.digitalogy.co\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalogy.co\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/digitalogy-logo.png","contentUrl":"https:\/\/www.digitalogy.co\/blog\/wp-content\/uploads\/2023\/11\/digitalogy-logo.png","width":480,"height":480,"caption":"Digitalogy"},"image":{"@id":"https:\/\/www.digitalogy.co\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/digitalogycorp\/","https:\/\/x.com\/DigitalogyCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalogy.co\/blog\/#\/schema\/person\/84d088b169848832ecebdcac09cb80a8","name":"John Ocampos","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalogy.co\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.digitalogy.co\/blog\/wp-content\/litespeed\/avatar\/1be2134d6e9e36ae8470ad0d6f16ac62.jpg?ver=1776220799","contentUrl":"https:\/\/www.digitalogy.co\/blog\/wp-content\/litespeed\/avatar\/1be2134d6e9e36ae8470ad0d6f16ac62.jpg?ver=1776220799","caption":"John Ocampos"},"url":"https:\/\/www.digitalogy.co\/blog\/author\/john-ocampos\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalogy.co\/blog\/wp-json\/wp\/v2\/posts\/3274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalogy.co\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalogy.co\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalogy.co\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalogy.co\/blog\/wp-json\/wp\/v2\/comments?post=3274"}],"version-history":[{"count":1,"href":"https:\/\/www.digitalogy.co\/blog\/wp-json\/wp\/v2\/posts\/3274\/revisions"}],"predecessor-version":[{"id":9134,"href":"https:\/\/www.digitalogy.co\/blog\/wp-json\/wp\/v2\/posts\/3274\/revisions\/9134"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalogy.co\/blog\/wp-json\/wp\/v2\/media\/3822"}],"wp:attachment":[{"href":"https:\/\/www.digitalogy.co\/blog\/wp-json\/wp\/v2\/media?parent=3274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalogy.co\/blog\/wp-json\/wp\/v2\/categories?post=3274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalogy.co\/blog\/wp-json\/wp\/v2\/tags?post=3274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}