Nowadays we hear the words “data breach” or “data leak” all the time and this turned out to be one of the most common safety breaches lately. Just to clarify, here is the definition of a “data breach”: A personal data breach occurs when there’s a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data processed. If this happens, the organisation holding the personal data must notify the supervisory authority without undue delay. If the personal data breach is likely to result in a high risk to your rights and freedoms and the risk hasn’t been mitigated, then you, as an individual, must also be informed.
Why is this so dangerous? What happens when your data gets leaked?
When a data breach occurs, usually the malefactors collect the leaked information, creating databases with logins and passwords. Some of them try to add information from every leak to these databases, and that effort results in the creation of gigantic databases.
- Collection #1 Data Leak – What is it and Who’s Affected?
- The Breach Gets Bigger. Collections 2-5 Compromise 2.2 Billion Accounts
One of the best things to do to protect your personal data in this regard is to create and apply unique passwords for each of your online accounts to minimise the chances of being affected by data breaches. However, despite the growing awareness of the danger, users usually use the same passwords and even re-use them on multiple websites.
What are the consequences of account access?
The consequences vary and it is hard to predict the purpose for which the stolen information will be used. The most common cases are the very productive phishing, as criminals can automatically send malicious emails to a victim’s list of contacts, or attacks designed to steal victims’ entire digital identity or money or to compromise their social media network data.
Read More: The Cost of a Data Breach [Infographic]
The cybersecurity experts believe that unfortunately at the current moment the ways to be attacked greatly outnumber the defense methods that users can use. The number of data breaches is expected to get higher and higher.
Here are some steps that could be undertaken in order to protect yourself from data leaks as much as possible.
In conclusion, informational security is no longer just a companies’ policy. It is in fact a necessity in everyday life in order to protect ourselves from unauthorised access and data abuse. Protect your devices now!