What Is a Data Breach and Does It Happen?

cybersecurity data breach

The Identity Theft Resource Center (ITRC) is a non-profit organization established more than two decades ago to help businesses and consumers minimize the risk and impact of identity crimes.

Part of its mission is to educate businesses and consumers about identity crimes, including how the perpetrators use data breaches to get the personal information they need. To accomplish the latter, the ITRC publishes an annual data breach report that discusses the number of data compromise attacks, their attack vectors, and more.

Data Breaches Are At an All-Time High

Data compromises include data breaches, data exposures, and data leaks. The vast majority (96.0%) of the 1,862 data compromises were data breaches. Far less common were data exposures (3.0%) and data leaks (0.4%). The type of data compromise was not indicated in 0.6% of the cases.

The 3 Types of Data Breaches

  1. Data breaches are events in which unauthorized individuals access and/or remove personal information from the place where is it stored.
  2. Data exposures are incidents in which personal data is available for access and/or removal from the place where it is stored, but there is no evidence that unauthorized individuals have done so. This typically involves cloud-based data storage in which cybersecurity protections are misconfigured or have not been applied.
  3. Data leaks involve personal information that represents no or low risk when viewed as individual records. However, when aggregated, the sheer volume of personal information available creates risk to the data subjects and value for identity criminals who specialize in social engineering and phishing. Data leaks occur when this information is left unprotected (e.g., willingly shared on social media, made publicly available). This category is new to the 2021 report.

Businesses Became the Primary Target for Identity Crimes

In the past, cybercriminals typically compromised personal data about consumers to carry out identity crimes against them. That’s no longer the case. When the ITRC researchers were analyzing information from the publicly reported data compromises in 2021, they found that a shift had occurred.

“The personal information of consumers remained valuable to cybercriminals, but individuals were not the primary target for most identity crimes committed in 2021,” said Eva C. Velasquez, president and CEO of ITRC. “Instead, consumer information was often the means to the end of attacking businesses through stolen credentials — logins and passwords — or social engineering where savvy cybercriminals tricked people into revealing information needed to launch an attack.”

In addition, the researchers found that most identity crimes were fueled by consumer information stolen from businesses in data breaches. In other words, cybercriminals stole consumer data from companies so they could get the information and credentials needed to perform more attacks against companies.

Ransomware Became a Common Attack

For the past two years, security experts have been warning companies about a troubling trend: Ransomware gangs are increasingly stealing data before encrypting it. The ITRC researchers’ findings confirm that this trend is indeed occurring.

When the researchers analyzed the 1,862 data compromises that occurred in 2021, they found that:

  • 87% were caused by cyberattacks
  • 10% were due to human and system errors (e.g., lost devices, misconfigurations,)
  • 3% were the result of physical attacks (e.g., stolen devices, document theft)

The researchers discovered that the top two types of cyberattacks used were phishing (33%) and ransomware (22%). This doesn’t seem too noteworthy until you put it into perspective. Just two years ago, phishing was used a lot more (53%) and ransomware a lot less (9%). “At the current growth rate, ransomware attacks will pass phishing as the number one root cause of data compromises in 2022,” according to the “2021 in Review – Annual Data Breach Report.”

We hope you were able to learn more about data breaches. If you ever feel you need more cybersecurity installed for your firm or business, feel free to contact our team of experts by emailing info@wamsinc.com or calling us at (800) 421-7151.

Avatar

WAMS, Inc.

The experts at WAMS, Inc. all have a background in the legal industry and understand the software and the demands that come along with it. That’s why all our clients receive a dedicated account manager and engineer with specific planning that works for your business needs. We didn’t break into the tech world to pinch pennies from clients. We go into every partnership to help their business scale gracefully. Your company growth is our company growth, always.