What Is A Data Breach?

You've probably heard the term "data breach," but do you really understand what it is? Make time now to learn more details about a data breach, including what you can do to protect yourself.

Data Breach Defined

A data breach, data leak or data spill is defined as an incident when protected, sensitive or confidential data is viewed, used or stolen by someone who does not have authority to access that data.

The term typically describes a breach that occurs online over the internet. However, it also includes laptop thefts or reading physical files.

During a breach, affected data can include:

  • Non-sensitive or sensitive personally identifiable information (PII) - address, age, or Social Security number
  • Personal health information (PHI) - medical history, lab test results and insurance information
  • Intellectual property
  • Trade secrets
How Does a Data Breach Occur?

Anyone can be affected by a data breach, and it can happen in several ways.

  1. Thieves intercept unencrypted data.

  2. Hackers gain access to files over weak or unsecured computer networks.

  3. Someone with access to personal information sells it to thieves.

  4. Your laptop, smartphone or other electronic device is misplaced or stolen.

  5. A hacker gathers the personal data you share over unsecured websites.

  6. Phishing schemes entice you to share your data with criminals.

  7. You send sensitive information through social media.

  8. Physical files or hard copies of information are stolen.

  9. Someone videotapes an employee who enters data into the computer.
What Happens After a Data Breach?

When your data is used, viewed or stolen, it can affect you in several ways.

  • The criminal could access your financial accounts.
  • Someone could impersonate you and open credit accounts or apply for car, house or personal loans in your name.
  • The thief could log into your work account and gather secret information about your company.
Protection from a Data Breach

Numerous regulations dictate how employers, medical providers and others can use your data. For example, the Health Insurance Portability and Accountability Act (HIPAA) regulates access to your PHI, and the Payment Card Industry Data Security Standard defines who can access and use your sensitive PII.

These protections aren't always enough, though. You should also take several steps to protect your data.

  • Secure your devices with passwords.
  • Use a different and challenging password for each log-in.
  • Encrypt sensitive personal and work data.
  • Share personal information, including your credit card number, on secure sites.
  • Do not open links from untrusted sources.
  • Update software often.
  • Subscribe to a data breach monitoring service.
  • Purchase cyber liability insurance
A data breach can affect your life now and well into the future. Take steps today to protect yourself.
Need insurance for You, Your Family or Your Business?
We can match you to a qualified, local insurance expert!
Further Reading
Data breaches are reported daily and are an increasing concern for businesses that collect and store personal information from clients. However, it isn't just large retailers and credit card companies that are at risk, so are small to medium size ...
In its 2013 Data Breach Investigations Report, Verizon Enterprise found that nearly three in four cybersecurity breaches (74%) to small businesses are “crimes of opportunity” that occur because a hacker notices and exploits a weakness in the system: ...
The widespread use of smartphones and tablets in the workplace is exposing more and more businesses to liability for sensitive data being compromised if these devices are lost, stolen, or hacked. How can your company protect itself against this threa...
Boiler and Machinery policies provide two major services. Insurance in the form of property coverage for damage to buildings, boilers, machinery and additional liability coverage in the event of an explosion. Second, a valuable inspection service for...
Although the term ergonomics was first used in the late eighteenth century, it wasn't until after World War II that the field known today as ergonomics really began to shape product design and human interaction with surrounding elements. What Is Er...