What is a cybersecurity breach? Also, how can you defeat it?
Read on to learn more.
Define cybersecurity breach
A cybersecurity breach happens when someone bypasses security controls. So, it means unwanted access to your data, apps, or networks.
But, do not think of it as a data breach. In fact, cybersecurity breaches and data breaches are different. How so?
Let’s consider a real-life example. The moment a robber climbs through your window.
That thing there is called a cybersecurity breach. The robber bypasses your gates or your walls. But, it becomes a data breach when he steals your laptop and sees your room.
So, a cybersecurity breach is breaking in controls. And a data breach is stealing information.
Examples of a cybersecurity breach
There is news about cybersecurity every day. In fact, it’s even more increasing now in the COVID-19 pandemic.
Since 2016, 95% of breached records came from only three industries. Government, retail, and technology.
Still, it’s not because they are less diligent in cybersecurity. Rather, they are just the most popular target.
While we are in a global pandemic, cybersecurity is a global concern, too. We are in the era of cybercrimes.
To name a few, here are some of the most popular cybersecurity and data breaches that happened in 2020:
- Nintendo – compromised 160,000 accounts
- Twitter Spear Phishing Attack – attack targeted 130,000 public figures and profiles, the attackers made $121,000 bitcoin donations
- Easy Jet – 2,200 credit card information of their customers were stolen
- CAM4- nearly 11 billion records were exposed
- Marriott – exposed more than 5.2 million hotel guests
- Zoom Credentials Hack – more than 500.000 stolen Zoom passwords available for sale on the dark web
Protecting yourself after a breach
Cybersecurity and data breach involves unwanted people seeing your information. And it can be personal, like credit or bank details.
So, you’d want to protect yourself. Especially when you find out that your data is compromised.
Now, what can you do? Well, just because you receive a notice does not mean that you’re the victim of identity theft.
Still, here are the four main steps you can take. So, you can make sure that identity and finances are intact.
1. Breathe and read.
First, do not panic. The best thing you can do is to take a deep breath. Then, read the notice thoroughly.
After doing so, keep the notice in a safe place. You will need it in case you need evidence that your data was exposed.
2. Contact financial institutions.
If you connected your bank or credit account to the leaked information, this step is a must.
Let your bank and credit issuer know. So, they can track suspicious activity.
3. Monitor billing and financial statements.
You should also look out for fraudulent activities. For example, you can ask your bank to alert you whenever there is an activity.
Also, don’t just look for big withdrawals. Check for small purchases, too.
4. Change your passwords.
Change your passwords immediately. And this is imperative, especially if you’re using one password for all your accounts.
You can also practice updating your passwords every 90 days. And make sure to include numbers and symbols to it.