Data breaches. The term itself can ring alarm bells in most organizations, and for good reason. A data breach usually means thousands spent on remedial measures, millions in regulatory fines and the invaluable loss of customers' trust and confidence. (Also read: Massive Data Breaches: The Truth You Might Not Know About.)
There have been numerous data breaches in modern times, forcing other organizations to undertake adequate data privacy and protection measures.
Here are the top 10 such breaches, and how to keep your organization from landing on a list like this:
There's really no other way to start a list of the biggest data breaches ever than with the 2013 Yahoo breach, which affected almost three billion users.
The breach's impact was a rapid $350 million reduction in Yahoo's market value -- while they were in the middle of a Verizon acquisition. The cyberattack's perpetrators were never identified, but Yahoo issued a statement asserting it believed "state-sponsored actors" may have been responsible.
Almost all Yahoo users' real names, email addresses, dates of birth, telephone numbers, authentication questions and other sensitive information was leaked in what is still considered the biggest data breach of all time.
Nearly a billion records were compromised when the First American Financial Corporation faced a data breach that led to bank account numbers, mortgage and tax records, social security numbers, wire transfer receipts and bond transaction receipts being compromised.
What sets this breach apart from the rest on this list is that it wasn't a breach in the traditional sense of the word. Rather than hackers breaking into the databases, the First American Financial Corporation failed to implement a secure authentication protocol which meant no one had to prove their identity to view the aforementioned documents. Once they accessed the documents, hackers used Advanced Persistent Bots (APBs) to collect, catalog and copy all data they had access to.
This glaring error went unnoticed for years. The New York State Department Financial Services (NYDFS) claimed the First American Financial Corporation did very little to ensure it had appropriate security measures to protect its critical data.
Marriott is not a typical digital service provider, which sets it apart from some of the other names on this list. However, the international hotel chain suffered a breach in 2018 that affected more than 500 million users.
The affected users' contact information, passport numbers, travel history, credit card information, social security details and Starwood Preferred Guest numbers were among the sensitive data that was breached.
Marriott faced a PR catastrophe, as it was slapped with a $24 million fine in the UK, hundreds of class action lawsuits and calls for its senior management to resign.
Following an internal audit, Marriott's use of outdated encryption protocols to store and secure its databases was the primary cause of the breach. The audit concluded the breach was carried out using a Remote Access Trojan (RAT) and Mimikatz. (Also read: Encryption Just Isn't Enough: Critical Truths About Data Security.)
MySpace may not have been as popular as some of the other social networking sites in 2016, but it wasn't any less shocking when the company announced to its users that their old information may be available for sale online -- or, more accurately, that it had been up for sale online for at least three months.
Time Inc., which acquired MySpace, reported a data breach had left 360 million accounts compromised, with their usernames and passwords available to be used to access users' information on other sites. The hackers behind the data breach were thought to be responsible for similar data breaches at Tumblr and LinkedIn.
When Adult FriendFinder suffered a data breach, there was absolute pandemonium all around. This was owed to the nature of the data breach, with information about users' casual hookups and other adult content being made public.
More than 400 users' the names, email addresses, passwords, pictures and other personal details were leaked online and freely available on leaksource.com. The databases compromised had 20 years' worth of information, with the users' credentials also available online. The site's use of SHA-1 hashing algorithm -- a fragile protocol by modern standards -- was the primary reason the database was so easily breached.
How a company the size of Twitter managed to commit such a gaffe will forever remain a mystery. In May 2018, the company sent an email to its 330 million users urging them to change their passwords, since some of them passwords had been stored on its internal computer system in readable text format.
Twitter reassured its users that the glitch had been identified before any data breach, so none of their information had been compromised. However, a 2010 Federal Trade Commission inquiry revealed that there had been at least two data breaches at Twitter where users' private data had been compromised due to lapses in Twitter's security protocols. (Also read: Uncovering Security Breaches.)
Compared to some others on this list, the Equifax data breach is fairly mild. However, the fact that the organization had to spend upwards of $700 million in remedial measures to help affected users made it a cautionary tale for other organizations.
Approximately 150 million users had their social security numbers, dates of birth, home addresses, driver's license numbers and credit card information stolen. The people responsible for the breach were never identified, even after lengthy congressional inquiries.
The inquiries did discover, however, that a vulnerability within the Equifax website had been exploited for months by those responsible for the breach. Other inadequate measures, such as the lack of database system segmentation, made the attacks even easier to carry out.
Facebook was already facing a public relations nightmare in 2019 over its less-than-adequate data protection practices when news of the 2019 breach broke. It was, and remains, the most significant breach in the company's history, affecting up to 540 million users globally. The perpetrators were never identified or caught, but it did reveal just how vulnerable Facebook's databases were.
How did it happen? Facebook had failed to adequately protect its global databases with the appropriate levels of encryption, and these databases were easily searchable online as a result. Users' phone numbers, genders and geolocation in the United Kingdom, United States and Vietnam databases were particularly vulnerable. This is precisely why it proved impossible to identify the perpetrators, since the databases were literally available via a simple Google search with no appropriate security measures to protect them.
The eBay breach came a few months after the Yahoo breach, with similar cases of compromised user data. While the 145 affected users (by some estimates) comes nowhere near Yahoo's numbers, the impact was not any less severe. Internal investigations revealed three of eBay's employees had been socially engineered, and their compromised credentials were used to gain access to the main eBay database. (Also read: Insider Threat Awareness: Avoiding Internal Security Breaches.)
The company informed all affected users and advised them to change their passwords, since attackers had accessed encrypted passwords as well. This led to New York's Attorney General calling on eBay to provide free credit monitoring services to users, which the company refused, citing a lack of financial fraud.
One of the most recent major data breaches, what makes the SolarWinds data breach so notorious is that there still isn't a reliable number of how many records may have been compromised. However, more than 18,000 organizations and government agencies globally are said to have been affected. The United States Attorney General at the time stated that the attack may have been Russian-backed.
The attackers got insider access to SolarWinds update packages and placed malware into the next scheduled update. These updates contained the necessary e-signatures, so whichever networks accepted the updates were compromised. The hidden malware spread throughout the entire SolarWinds supply chain, with at least 50 United States government agencies facing a "grave impact" since the attackers gained a foothold within their networks.
The aforementioned list should be reason enough for most organizations to consider a robust data protection and governance framework that can minimize the chance of a data breach occurring.
Here are five some steps most organizations can undertake to do so:
By far, the most fundamental measure an organization can take to minimize the risk of a data breach is to limit the number of people who have access to the data in the first place -- which is known as access governance. Theres no shortage of effective solutions that can help organizations address this issue.
For example, Securitis access intelligence via its Unified Data Controls allows organizations to identify which employees need access to what data and grant it to them on a strictly "needs-based" basis while also keeping detailed records to help with future assessments if necessary.
This may seem rather obvious, but many organizations make the mistake of not appropriately training their employees about just how easily hackers may gain access to the company's databases by exploiting careless employee behavior online.
Regular workshops and training can educate your team on best practices to ensure they follow adequate security protocols online. This could also include anti-phishing training on adequately securing their footprint online via cybersecurity tools such as anti-virus software, VPNs or proxies like IPRoyal and Avast. (Also read: VPNs vs Proxies: What's Best for Business.)
Yet another example of a relatively minor mistake that can lead to significant damage: Far too often, hackers exploit glitches in the software.
If an organization does not update its software regularly, the glitch will likely be present for that entire duration and can be exploited more easily.
Often, organizations are too rattled and disorganized if they do find themselves victims of a data breach. It's worth mentioning that, if proper measures are taken in the immediate aftermath of a data breach, the impact of the breach can be drastically reduced.
You should have protocols in place that can give real-time insights into exactly what data was compromised, how the damage can be limited and the remedial measures most necessary.
Last, but probably the most important, is to know precisely how to leverage encryption to your benefit. Organizations that have an old-fashioned approach to encryption fail to maximize the security encryption has to offer.
With lattice-based encryption and quantum computing now gathering steam, organizations can afford to ensure the best possible protection for all their data. Doing so guarantees that, if all else fails, your data is so well-protected that hackers gain nothing by breaking into the company's internal database.
Data breaches can happen to anyone -- even the largest, most well-established organizations. And often, they're the result of simple, easily solvable data management mistakes. By implementing proper data breach prevention practices beforehand, you can drastically reduce the likelihood of your organization suffering a data breach and recover more efficiently in the worst-case scenario. (Also read: What Is an Air Gap Backup and Why Do You Need One?)
Read the original:
10 Biggest Data Breaches Ever - And How to Prevent Them - Techopedia
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]