• Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
Wooster

Technology@​Wooster

Collaborating with the campus community to explore questions of​ pedagogy, best practices, and technology integration.

  • For Students
    • What Technology do I need at Wooster
    • Computer Labs
    • Downloads
    • Wireless
    • Printing
    • E-Mail
    • Gaming Consoles
    • Poster Printing
  • I’d like to
  • Events
  • Staff
    • Applications Development
    • Educational Technology
      • About
    • Information and Planning
    • Research and Planning
    • Technology Services
      • Digital Infrastructure
      • Media and Event Support
      • Technology Services – Media Services
      • Technology Services – Service Desk
    • Student Digital Media Assistants
    • Student Research Assistants
    • Student Technology Assistants
  • Resources
    • ArcGIS Online
    • Hoonuit online training
    • Moodle
    • Professional Development
    • Projects in a Box
    • Qualtrics
    • Select Survey
    • WordPress(Voices)
    • Workshops
  • Technologies
    • Classroom Technology
      • Document Cameras
      • Epson Technologies
      • SMART Technologies
      • Student Response Systems
      • Video Conferencing
    • Digital Media
      • Audio
      • Images
      • Mobile Apps
      • Presentation
      • Video
    • Virtual Reality
      • VR Resources
      • Virtual Worlds
    • Web 2.0
      • Information Management
      • Mashups
      • Media Sharing
      • Social Communication
      • Social Knowledge Building
    • Web Authoring
      • Blogging
      • CMS
      • Wikis
  • Contact Us
    • Ed Tech Consultation
    • Tech Services Consultation
  • Change Your Password
  • Spam & Junk Email
  • IT Policies
  • IT Blog
You are here: Home → Cybersecurity → Data Breaches

Data Breaches

Why should you care about data breaches and why are they a potential threat? 

A data breach is a security incident where information is accessed without authorization. Other terms for this are data spill, unintentional information disclosure, data leak, and information leakage. Data breaches can harm businesses and consumers in many ways. As technology progresses, more information is spread throughout the digital world, making cyberattacks increasingly common and costly. The average total cost to a company from a data breach globally is $3.86 million according to a study by the Ponemon Institute. This means that the average cost per stolen record is $148, which makes online crime a threat to anyone on the internet. 

Personally identifiable information, such as full names, credit card numbers, and Social Security numbers, was the most common form of data breaches in 2016 according to Symantec. Corporations are likely to be targeted for cyberattacks due to the vast amount of data that can be collected. 

Why do data breaches happen? 

Cybercrime is a profitable industry that continues to grow. Hackers look for personally identifiable information to steal money, compromise identities, or sell over the dark web.  

Data breaches can occur in four ways. Firstly, out-of-date software can make it easier to exploit systems and sneak malware onto a computer and steal data. Weak passwords make it easier for hackers to guess, which is why experts recommend unique and complex passwords. Another way a data breach can happen is through drive-by downloads, which is when you unintentionally download a virus or malware by visiting a compromised web page. A drive-by download is more likely to occur with a browser, application, or operating system that is out of date or has a security flaw. Lastly, targeted malware attacks are another form of a data breach. Attackers use spam and phishing email tactics to try to trick the user into revealing user credentials, downloading malware attachments, or directing users to vulnerable websites. Email is a common way for malware to transfer to your computer. 

What are some ways you can protect yourself? 

  1. Have strong and secure passwords. 
  2. Monitor your credit report regularly to check if a thief has tried to open a new credit card or another account under your name. 
  3. Act at once if you see suspicious activity. 
  4. Secure your phone so that a criminal will not be able to access your device in a situation that it be lost or stolen. 
  5. Use only secure URLs. Reputable sites start with https://. 
  6. Install high-quality security software that includes malware and virus protection and always keep it updated.

Sources 

https://cyprus-mail.com/2020/08/19/data-breach-costs-3-86-million-on-average-ponemon-report/ 

https://us.norton.com/internetsecurity-privacy-data-breaches-what-you-need-to-know.html 

https://docs.broadcom.com/doc/istr-22-2017-en

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to print (Opens in new window)

Related

Filed Under: Cybersecurity

Primary Sidebar

Interesting Videos

Resources

  • We can help with…
  • Professional Development
  • Projects in a Box
  • Workshops
  • I.S. Support
  • Request an Appointment
  • ArcGIS Online
  • Hoonuit online training
  • Qualtrics
  • Poster Printing
  • Request a Wiki
  • Loaner Equipment

Copyright © 2021 · Technology Theme 3.0.0 on Genesis Framework · WordPress · Log in

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkNo
You can revoke your consent any time using the Revoke consent button.Revoke cookies