{"id":5809,"date":"2020-10-16T14:24:28","date_gmt":"2020-10-16T18:24:28","guid":{"rendered":"https:\/\/technology.wooster.edu\/?p=5809"},"modified":"2022-08-04T08:50:41","modified_gmt":"2022-08-04T12:50:41","slug":"data-breaches","status":"publish","type":"post","link":"https:\/\/inside.wooster.edu\/technology\/data-breaches\/","title":{"rendered":"Data Breaches"},"content":{"rendered":"<h2><span data-contrast=\"none\">Why should you care about data breaches<\/span><span data-contrast=\"none\">&nbsp;and why are they a potential threat?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<p><span data-contrast=\"auto\">A data breach is a security incident where information is accessed without authorization.<\/span><span data-contrast=\"auto\">&nbsp;Other terms for this are data&nbsp;<\/span><span data-contrast=\"auto\">spill<\/span><span data-contrast=\"auto\">, unintentional information disclosure, data&nbsp;<\/span><span data-contrast=\"auto\">leak,<\/span><span data-contrast=\"auto\">&nbsp;and information leakage.&nbsp;<\/span><span data-contrast=\"auto\">Data breaches can harm businesses and consumers in many ways. As technology progresses, <\/span><span data-contrast=\"auto\">more<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">informatio<\/span><span data-contrast=\"auto\">n<\/span><span data-contrast=\"auto\">&nbsp;is&nbsp;<\/span><span data-contrast=\"auto\">spread throughout the digital world, making cyberattacks&nbsp;<\/span><span data-contrast=\"auto\">increasingly common and costly<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">The&nbsp;<\/span><span data-contrast=\"auto\">average total cost to a&nbsp;<\/span><span data-contrast=\"auto\">c<\/span><span data-contrast=\"auto\">ompany<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">from a data brea<\/span><span data-contrast=\"auto\">ch<\/span><span data-contrast=\"auto\">&nbsp;globally<\/span><span data-contrast=\"auto\">&nbsp;is<\/span><span data-contrast=\"auto\">&nbsp;$3.86 million&nbsp;<\/span><span data-contrast=\"auto\">according to a study by the&nbsp;<\/span><span data-contrast=\"auto\">Ponemon<\/span><span data-contrast=\"auto\">&nbsp;Institute.<\/span><span data-contrast=\"auto\">&nbsp;This means that the average cost&nbsp;<\/span><span data-contrast=\"auto\">per<\/span><span data-contrast=\"auto\">&nbsp;stolen record is $148, which makes online crime&nbsp;<\/span><span data-contrast=\"auto\">a threat&nbsp;<\/span><span data-contrast=\"auto\">to anyone on the internet.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">P<\/span><span data-contrast=\"auto\">ersonally<\/span><span data-contrast=\"auto\">&nbsp;identifiable information<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> such as full names, credit card numbers, and Social Security numbers, was<\/span><span data-contrast=\"auto\">&nbsp;the most common form of data breaches in 2016<\/span><span data-contrast=\"auto\">&nbsp;according to Symantec<\/span><span data-contrast=\"auto\">.&nbsp;<\/span><span data-contrast=\"auto\">Corporations are&nbsp;<\/span><span data-contrast=\"auto\">likely to be targeted<\/span><span data-contrast=\"auto\">&nbsp;for cyberattacks<\/span><span data-contrast=\"auto\">&nbsp;due to the&nbsp;<\/span><span data-contrast=\"auto\">vast<\/span><span data-contrast=\"auto\">&nbsp;amount&nbsp;<\/span><span data-contrast=\"auto\">of data&nbsp;<\/span><span data-contrast=\"auto\">that can be collected.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h2><span data-contrast=\"none\">Why do data breaches happen?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<p><span data-contrast=\"auto\">Cybercrime is a profitable industry that <\/span><span data-contrast=\"auto\">continues<\/span><span data-contrast=\"auto\">&nbsp;to grow.<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">Hackers<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">look<\/span><span data-contrast=\"auto\">&nbsp;for<\/span><span data-contrast=\"auto\">&nbsp;personally identifiable information to steal money, compromise identities, or sell over the dark web.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Data breaches can occur in<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">four<\/span><span data-contrast=\"auto\">&nbsp;ways. Firstly,&nbsp;<\/span><span data-contrast=\"auto\">out-of-date software can make it easier to exploit systems<\/span><span data-contrast=\"auto\">&nbsp;and sneak malware onto a computer and steal data. Weak passwords make it easier for hackers to guess<\/span><span data-contrast=\"auto\">, which is why experts&nbsp;<\/span><span data-contrast=\"auto\">recommend<\/span><span data-contrast=\"auto\">&nbsp;unique and complex passwords. Another&nbsp;<\/span><span data-contrast=\"auto\">way a data breach can happen is through drive-by downloads, which&nbsp;<\/span><span data-contrast=\"auto\">is&nbsp;<\/span><span data-contrast=\"auto\">when you unintentionally download a virus or malware by visiting a compromised web page.&nbsp;<\/span><span data-contrast=\"auto\">A drive-by download is more likely to occur&nbsp;<\/span><span data-contrast=\"auto\">with a browser, application, or operating system that is out of date or has a security flaw.<\/span><span data-contrast=\"auto\">&nbsp;Lastly, targeted malware attacks are another&nbsp;<\/span><span data-contrast=\"auto\">form of a data <\/span><span data-contrast=\"auto\">breach<\/span><span data-contrast=\"auto\">. Attackers use spam and phishing email tactics to try to trick the user into revealing use<\/span><span data-contrast=\"auto\">r credentials, downloading malware attachments, or directing users to vulnerable websites.<\/span><span data-contrast=\"auto\">&nbsp;Email is a common way for malware to transfer to your computer.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h2><span data-contrast=\"auto\">What are some&nbsp;<\/span><span data-contrast=\"auto\">ways you<\/span><span data-contrast=\"auto\"> can protect yourself?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h2>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Have strong and secure passwords.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Monitor your credit report&nbsp;<\/span><span data-contrast=\"auto\">regularly<\/span><span data-contrast=\"auto\">&nbsp;to check if a thief has&nbsp;<\/span><span data-contrast=\"auto\">tried<\/span><span data-contrast=\"auto\">&nbsp;to open a new credit card or another account under your name.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Ac<\/span><span data-contrast=\"auto\">t&nbsp;<\/span><span data-contrast=\"auto\">at once<\/span><span data-contrast=\"auto\">&nbsp;if you see suspicious&nbsp;<\/span><span data-contrast=\"auto\">activity<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Secure your phone&nbsp;<\/span><span data-contrast=\"auto\">so that a criminal will not be able to access your device in a <\/span><span data-contrast=\"auto\">situation<\/span><span data-contrast=\"auto\">&nbsp;that it be lost or stolen.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Use only secure URLs. Reputable sites start with&nbsp;<\/span><span data-contrast=\"none\">https:\/\/<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Install high-quality security software that includes malware and virus protection and <\/span><span data-contrast=\"auto\">always keep it updated<\/span><span data-contrast=\"auto\">.<\/span><\/li>\n<\/ol>\n<h2><span data-contrast=\"auto\">Sources<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h2>\n<p><span data-contrast=\"auto\">https:\/\/cyprus-mail.com\/2020\/08\/19\/data-breach-costs-3-86-million-on-average-ponemon-report\/<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">https:\/\/us.norton.com\/internetsecurity-privacy-data-breaches-what-you-need-to-know.html<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><a href=\"https:\/\/docs.broadcom.com\/doc\/istr-22-2017-en\"><span data-contrast=\"none\">https:\/\/docs.broadcom.com\/doc\/istr-22-2017-en<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why should you care about data breaches&nbsp;and why are they a potential threat?&nbsp; A data breach is a security incident where information is accessed without authorization.&nbsp;Other terms for this are data&nbsp;spill, unintentional information disclosure, data&nbsp;leak,&nbsp;and information leakage.&nbsp;Data breaches can harm businesses and consumers in many ways. As technology progresses, more&nbsp;information&nbsp;is&nbsp;spread throughout the digital world, making [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":5870,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[12,47],"tags":[],"coauthors":[412],"class_list":["post-5809","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-sta-article"],"acf":[],"gutentor_comment":0,"featured_image_urls":{"full":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1.jpg",2560,1853,false],"thumbnail":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1-150x150.jpg",150,150,true],"medium":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1-300x217.jpg",300,217,true],"medium_large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1-768x556.jpg",768,556,true],"large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1-1024x741.jpg",1024,741,true],"1536x1536":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1-1536x1112.jpg",1536,1112,true],"2048x2048":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1-2048x1482.jpg",2048,1482,true]},"post_excerpt_stackable":"<p>Why should you care about data breaches&nbsp;and why are they a potential threat?&nbsp; A data breach is a security incident where information is accessed without authorization.&nbsp;Other terms for this are data&nbsp;spill, unintentional information disclosure, data&nbsp;leak,&nbsp;and information leakage.&nbsp;Data breaches can harm businesses and consumers in many ways. As technology progresses, more&nbsp;information&nbsp;is&nbsp;spread throughout the digital world, making cyberattacks&nbsp;increasingly common and costly.&nbsp;The&nbsp;average total cost to a&nbsp;company&nbsp;from a data breach&nbsp;globally&nbsp;is&nbsp;$3.86 million&nbsp;according to a study by the&nbsp;Ponemon&nbsp;Institute.&nbsp;This means that the average cost&nbsp;per&nbsp;stolen record is $148, which makes online crime&nbsp;a threat&nbsp;to anyone on the internet.&nbsp; Personally&nbsp;identifiable information, such as full names, credit card numbers, and Social&hellip;<\/p>\n","category_list":"<a href=\"https:\/\/inside.wooster.edu\/technology\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/inside.wooster.edu\/technology\/category\/sta-article\/\" rel=\"category tag\">STA Article<\/a>","author_info":{"name":"Aubry Miller","url":"https:\/\/inside.wooster.edu\/technology\/author\/amiller22wooster-edu\/"},"comments_num":"0 comments","uagb_featured_image_src":{"full":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1.jpg",2560,1853,false],"thumbnail":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1-150x150.jpg",150,150,true],"medium":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1-300x217.jpg",300,217,true],"medium_large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1-768x556.jpg",768,556,true],"large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1-1024x741.jpg",1024,741,true],"1536x1536":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1-1536x1112.jpg",1536,1112,true],"2048x2048":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/campaign-creators-pypeCEaJeZY-unsplash-scaled-1-2048x1482.jpg",2048,1482,true]},"uagb_author_info":{"display_name":"Aubry Miller","author_link":"https:\/\/inside.wooster.edu\/technology\/author\/amiller22wooster-edu\/"},"uagb_comment_info":0,"uagb_excerpt":"Why should you care about data breaches&nbsp;and why are they a potential threat?&nbsp; A data breach is a security incident where information is accessed without authorization.&nbsp;Other terms for this are data&nbsp;spill, unintentional information disclosure, data&nbsp;leak,&nbsp;and information leakage.&nbsp;Data breaches can harm businesses and consumers in many ways. As technology progresses, more&nbsp;information&nbsp;is&nbsp;spread throughout the digital world, making&hellip;","_links":{"self":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/5809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/comments?post=5809"}],"version-history":[{"count":1,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/5809\/revisions"}],"predecessor-version":[{"id":23637,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/5809\/revisions\/23637"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/media\/5870"}],"wp:attachment":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/media?parent=5809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/categories?post=5809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/tags?post=5809"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/coauthors?post=5809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}