What Is a Data Breach?

A data breach is any incident in which unauthorized parties gain access to a system, a network or data. This exposure can occur for nefarious reasons, such as a cybercriminal using to gain access, but it can also happen inadvertently as a result of employee error. For example, a victim may click a seemingly innocent link in an email which prompts them to enter their credentials, providing a bad actor a way “in” to the network.

Explore our cybersecurity solutions to enhance your organization’s defense against cyberthreats.

Security Breach vs. Data Breach

During a security breach, a cybercriminal gains unauthorized access to an organization’s data, applications or networks. This kind of unauthorized access is a major concern, even if the criminal doesn’t manage to steal any sensitive data. A data breach, on the other hand, refers to incidents in which a cybercriminal accesses an organization’s data, applications and networks to successfully steal data.

How Data Breaches Happen

Data breaches tend to follow four primary stages:

  1. Initial access: Cybercriminals gain access to the target through a phishing attack, stolen credentials, malware or another method.
  2. Lateral movement: Once cybercriminals have penetrated the target, they move laterally, gathering intelligence about the target’s data and defenses while locating privileged credentials. Cyberattackers may lurk undetected for weeks, months or even longer.
  3. Data exfiltration: Cybercriminals remove data by copying, moving or stealing it, sometimes using backdoor connections to servers they control.
  4. Covering tracks: Advanced cybersecurity solutions can often detect unauthorized activities — but cybercriminals use advanced techniques to subvert them. Hackers may delete logs to avoid detection and mask their location using VPNs or proxy servers. Criminals may also time their data theft around holidays or periods when fewer security staffers are monitoring systems.

Common Data Breach Methods

Cybercriminals may use one or more tactics to infiltrate an organization and steal data.

Phishing Attacks

Phishing attacks are one of the most common causes of data breaches. Cybercriminals use deceptive emails and text messages to trick targets into revealing sensitive information. By convincing targets that messages are legitimate, attackers can compel them to take action that could lead to a breach, such as providing access credentials or clicking a link that downloads malware.

Social Engineering

Cybercriminals are adept at social engineering, using human psychology to exploit a victim’s vulnerability. For instance, a phishing email that appears to be an urgent request from a boss could lead the recipient to act quickly, potentially sharing sensitive information instead of taking time to confirm the email is legitimate. Cybercriminals use social media accounts and other publicly available information to craft personalized, convincing messages, especially when targeting high-ranking individuals with privileged access to sensitive information.

Malware Attacks

In a malware attack, cybercriminals install malware (malicious software) onto a target’s endpoint environment to compromise its security. Different types of malware perform different functions and provide hackers with varying capabilities. For example, ransomware lets cybercriminals lock down an organization’s data, making it inaccessible until the victim pays a ransom.

Distributed Denial of Service (DDoS)

In a distributed denial-of-service (DDoS) attack, a cybercriminal sends massive amounts of traffic to a website, server, or network, causing it to crash or otherwise disrupt service to legitimate users. While DDoS tactics vary, the basic objective is to overwhelm the victim’s defenses and bring their web-based operations to a halt. The attackers’ goal may be to cause a disruption, probe for security vulnerabilities or stage a distraction for a simultaneous attack.

Insider Threats

Employees with access to sensitive information may intentionally or unintentionally expose that information to unauthorized users. In some sectors, insider threats are a leading cause of data breaches, often through misuse of access privileges or inadvertently sending sensitive information to an unintended recipient.

Weak Passwords

Weak passwords are problematic because they could allow unauthorized access to sensitive information. Passwords may be too easy to guess or may be reused across several accounts. Weak passwords are also vulnerable to brute-force attacks, in which hackers try multiple password combinations until they hit the right one. Artificial intelligence (AI) and automation have made brute-force attacks easier and faster, making strong passwords essential.

Real-World Examples of Data Breaches

Large-scale data breaches affecting millions of individuals have become all too common. These breaches can also come with a hefty price tag, especially when regulatory agencies believe companies have not taken sufficient measures to protect consumers’ data.

Yahoo

In 2016, Yahoo announced that a 2013 data breach had compromised the data of more than 1 billion user accounts. Yahoo’s investigation found that hackers may have stolen users’ names, birth dates, email addresses, phone numbers and hashed passwords (a secure version of passwords), along with security questions and answers. A subsequent analysis by Yahoo’s new owner, Verizon, found that the breach had likely involved 3 billion user accounts.

Equifax

In 2017, the credit reporting agency Equifax reported that a data breach had exposed the data of 148 million Americans. This breach was notable because of its scale and because Equifax maintains extremely sensitive information, including Social Security and driver’s license numbers. The federal government charged members of a Chinese military group with the attack, and Equifax agreed to pay victims a settlement of up to $425 million.

Marriott Hotels

Marriott Hotels announced in 2018 that hackers had infiltrated its guest registration system and stolen the information of 500 million people, potentially including credit card and passport numbers. The Federal Trade Commission found that Marriott had actually experienced three data breaches between 2014 and 2020, leading to a $52 million settlement reflecting Marriott’s alleged cybersecurity failures.

How To Prevent Data Breaches

Data breach prevention requires a proactive, well-orchestrated approach to cybersecurity. Here are a few of the most critical steps organizations should take to detect, prevent and recover from data breaches.

Employee Training

Human error is a persistent cause of data breaches. On the other hand, alert and educated employees can be the best defense against advanced attack technique, particularly those that employ phishing to gain access. Depending on employees’ roles, they may need to be educated on limiting access to sensitive information. Every employee should know how to recognize and respond to phishing attacks and other tactics.

Strong Password Policies

Passwords that are easy to guess or are reused across multiple accounts increase the likelihood that cybercriminals will be able to infiltrate an organization. In fact, weak passwords are one of the most common vulnerabilities that most organizations struggle to manage. Using effective password filtering — like prohibiting the use of your company name in passwords and setting high character counts — as well as training users on best practices for setting strong, unique passwords is more important than ever. Organizations often use single sign-on solutions or password managers to streamline login processes and prevent policies from becoming overly burdensome to employees, who may then be less likely to adhere to them.

Regular Software Updates

Keeping software up to date and patching vulnerabilities can prevent hackers from exploiting security flaws. Updated software typically provides better performance and more effective protection against malware, viruses, ransomware and other threats. Regular updates are also important for compliance because if a data breach does occur, an organization must prove to regulatory authorities that it was diligent in keeping security systems updated.

Data Encryption

Encryption protects sensitive data from unauthorized access and should be used whenever employees share, transfer or store these assets. Encryption makes it more difficult for criminals to access the data and provides an additional layer of protection if an employee’s device is lost or stolen.

Incident Response Planning

Organizations must be prepared to respond quickly and efficiently if a data breach occurs, because making a plan when the crisis is already unfolding will inevitably lead to poorer outcomes. Incident response planning is critical, yet it is easy to overlook. Advance planning improves organizations’ ability to contain an attack and ensures that staffers follow appropriate legal requirements and best practices after an attack. In addition to knowing what to do, organizations should clearly identify who is responsible for taking which actions.

At minimum, leaders should establish clear answers to these five key questions:

  1. When will we launch the incident response plan?
  2. Who will we call first?
  3. Which systems should we prioritize?
  4. What will a data breach cost?
  5. How will our staff be affected?

Legal Implications of Data Breaches

Organizations must take specific steps when a data breach occurs, such as promptly notifying affected individuals. In some cases, they must also report the incident to law enforcement, such as a state attorney general, and any applicable regulatory agency, such as the Federal Trade Commission. Investigators and regulators determine whether an organization has complied with data protection laws and regulations and taken appropriate steps to protect customers’ data. If regulators find that an organization failed to protect data properly, they could impose higher fines or penalties.

Legal action by affected parties is another potential outcome of a breach. Shareholders, business partners, customers and others may file suit against an organization that has been breached if they believe it did not take proper precautions.

How CDW Can Help You Prevent and Recover From a Data Breach

Organizations need the proper combination of security solutions and services to prevent unauthorized access, detect an intrusion if one occurs, minimize the damage and recover essential data and operations quickly. Because every environment is different, it is important to tailor cybersecurity strategies to each organization’s specific business needs and security objectives. CDW’s security experts have helped thousands of customers establish stronger defenses, increase their resilience and reduce their risk, all without hindering flexibility or innovation.

Learn about CDW’s approach to data breach prevention and risk management.

Data Breach FAQs

arrow How Much Does a Data Breach Cost?

According to IBM, the average cost of a data breach has continued to soar, reaching nearly $4.9 million in 2024. IBM found that breaches tend to be more costly at organizations with insufficient security staff, a problem across industries. Some of the most expensive breaches occurred in organizations that store data in multiple environments; such breaches can be harder to detect and contain, resulting in higher costs.

An organization hit by a breach will likely have multiple expenses, including forensic investigations, legal fees, regulatory fines, lost business and security upgrades. It may also include costs related to users whose data was stolen, such as paying for credit monitoring services to ensure victims are not compromised further. Data recovery can also be a significant expense, especially if organizations choose to pay ransoms. Some experts discourage ransom payments because they may encourage further attacks, and there is no guarantee that organizations will recover their data.

arrow How Do Criminals Use Stolen Data?

Cybercriminals have several ways of making money from stolen data. They may use victims’ credit card numbers or banking account information to make unauthorized purchases. They could also use victims’ Social Security numbers and other data to steal their identities and then open loans, credit cards or other accounts in their names. If criminals have obtained information that lets them hack into victims’ financial accounts, they could steal money directly from those accounts.

Criminals may also use stolen data to perpetrate phishing attacks and other types of scams. Access to victims’ personal data could enable them to create convincing phishing emails that facilitate additional data breaches. Finally, hackers may sell stolen data on the dark web.

arrow What Is the Best Way to Safeguard Customer Data Privacy?

A layered, holistic cybersecurity strategy is the best way to protect sensitive data. Organizations can minimize their risk by implementing best practices such as:

  • Proper classification and storage of customer data
  • Zero trust strategies and least-privilege access, which ensures that employees only handle customer data to the extent necessary to perform their work
  • Multifactor authentication, which makes it harder for a cybercriminal to gain access to data even if they manage to obtain some login credentials
  • Data encryption to protect sensitive data while in transit and storage
  • Regular software updates and patching to manage and remediate vulnerabilities
  • Ongoing technology training to help employees recognize phishing, social engineering and other attack types
arrow What Should I Do If My Company Experiences a Data Breach?

The organization should activate its incident response plan quickly and efficiently. A comprehensive incident response plan will cover all of the attack phases and address all of the potential stakeholders, including customers and regulatory officials. At minimum, the steps that organizations should take immediately are:

  • Notify the appropriate people — law enforcement authorities, affected businesses and customers — as soon as possible.
  • Promptly secure systems and address vulnerabilities that may have led to the breach, such as weak passwords or subpar security infrastructures.
  • Conduct a comprehensive incident response with the appropriate team, which may include members from IT, human resources, legal, communications, investor relations and forensics.
arrow What Does Cyber Insurance Cover?

Cyber Insurance can help organizations offset the costs of a data breach. Policies vary but typically cover incident response, legal and regulatory fines, compensation for revenue lost because of downtime, data recovery, and notification and credit monitoring for affected individuals. Cyber insurance may also help organizations pay ransoms.

  • As with other types of insurance, the fine print matters. Procuring cyber insurance can be a challenge, and it’s important to understand that it is not intended to compensate for lax cybersecurity. Data breaches that stem from human error, insider attacks or inadequate security defenses may not be covered.

Explore our cybersecurity solutions to enhance your organization’s defense against cyberthreats.