• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity  /  7 Major causes of data breaches
08 January 2018

7 Major causes of data breaches

Written by Seqrite
Seqrite
Cybersecurity
  • 4
    Shares
Estimated reading time: 3 minutes

The growing threat of data breaches globally has kept businesses on their toes. They occur when important proprietary, sensitive or confidential information is accessed or disclosed in an unauthorized faction. Data breaches can have a deep-lasting effect on a business – they affect the reputation and may hit customer trust. There is also a financial cost of tackling the entire crisis along with the negative press coverage received with the potential for lawsuits. However, companies can protect themselves from these kinds of threats with proper preparations and an understanding of the risks involved.

These are some of the common causes of data breaches:

1. Weak and Stolen Credentials

Weak and stolen credentials, especially passwords, are an important cause of data breaches. Based on the 2017 DBIR, 80 percent of data breaches involve hacking and use stolen passwords. Using strong and complex passwords is especially important and business must educate employees on the same. However, password reuse across sites also remains a problem and must be looked into as well. Businesses should try to implement two-factor authentication to make it harder for attackers to break in.

2. Phishing

Phishing remains an important cause of concern for businesses worldwide. Around 43 percent of global data breaches involve phishing and this tactic preys on unsuspecting users to click on malicious, disguised links. These lead to data being downloaded which may compromise the system. Apart from technical training, businesses must train their employees to remain ever vigilant and identify suspicious links, before clicking on them.

3. Pretexting and social engineering

Often, it’s the offers which just seem too good to be true which lead to the most disrupting security breaches. This tactics preys on an individual’s gullibility, offering them some reward or financial windfall for exchange of data. Unsuspecting individuals often provide the data, leaving themselves and businesses at risk. Like phishing, this is a problem which can often be tackled by proper training of employees by organizations.

4. Insider threats

Sometimes, the biggest threat to data security to an organization can come from within. According to the 2017 Verizon Data Breach investigation report, 25% of  data breaches involved insiders. These kind of breaches can involve espionage and are a form of human failure. However, the bright side is that these are preventable. Business need to be proactive in this regard and have strong policies and processes regarding important data to deal with these threats.

5. Application Vulnerabilities

Using software that is not updated or patched or applications that are poorly coded and may contain blackholes often leave businesses open to data breaches and vulnerabilities. This can be fixed by implementing basic security hygiene by the IT departments of businesses. System administrators must ensure that all software and applications receive regular updates. They must also keep track of when vulnerabilities in key software is discovered and work proactively to plug these gaps.

6. Ransomware

Ransomware isn’t a new tactic anymore – the year 2017 saw a spat of high-profile ransomware attacks where IT systems in many countries were affected. The Verizon DBIR pointed out that it was the fifth-most common malware variety, a jump from 22nd, three years back. Vigilance is the best defence against ransomware. Businesses must conduct ransomware awareness trainings to empower employees with the knowledge and information required to combat this threat.

7. Physical theft and loss

Data breaches do not always occur due to digital issues. Sometimes, they may also occur out of physical theft and loss. The cause for this may be unsecured ways in which physical storage devices (pen drives, compact-discs, etc.) may be used. If such devices are not securely used, then they may be at risk of theft or loss. Businesses should have strong policies and systems in place for physical data protection

To protect against these kind of threats, businesses can consider employing a reliable Unified Threat Management (UTM), coupled with Endpoint Security (EPS) and Encryption solutions which help in providing protection against the major causes of data breaches.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostWhat do we need to know about the CPU vulnerabilities Meltdown an...
Next Post  Multi-layered approach is the key towards cybersecurity
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Increased adoption of IoT creates a brand-new attack surface.

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Recognize Hybrid Cloud’s unique security challenges.

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021
  • How can the EdTech Sector deal with mounting security challenges

    How can EdTech companies deal with rising security challenges?

    December 24, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021
  • How can EdTech companies deal with rising security challenges?

    How can EdTech companies deal with rising security challenges?

    December 24, 2020

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (274) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (54) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.