SlideShare a Scribd company logo
1 of 12
Download to read offline
5 Examples of how easily data

breaches can happen
Sending information
to the wrong recipient
It is the biggest cause of data leaks:

sending sensitive data to the wrong

person.
01.
Example
It happened to the Dutch municipality

Assen, when an employee sent a file

containing the personal data of 530

persons to the wrong email address.
This is a major problem, because with

standard email, you as a sender don’t

receive a notification or a warning if

sensitive data is processed.
Prevention tip:
If the user had known before sending that the wrong email

address had been entered, this error could have been

avoided.
A check on recipients is therefore a functionality that

can limit this risk of human error.
Email addresses of

all recipients in CC,
Whoever puts all addresses in the CC,

makes all recipients in that group

public.
02.
Example
This happened recently to another Dutch

municipality: an email was sent with all

123 recipients in the cc.
While some aren’t aware that an email

address is sensitive data too, it is. In this

case, the email addresses should have

been kept private from everyone.
This also went wrong earlier, when the

Dutch Data Protection Authority

accidentally used the cc button, instead

of the bcc.
Prevention tip:
A check on recipients can prevent data from being shared

with everyone in the recipient group.
Better yet: a check for recipients in the "to", cc or bcc

field could help the sender to send the message

correctly.
Unsecured servers for

storing data
It is not only important to send data

securely, it should also be stored

securely.
03. Example
Recently, copies of ID documents of 800

people were accessible by third

parties, because they were stored on an

unsecured publicly accessible server.
And it is precisely this type of information

that is interesting for cyber criminals:

identity fraud is popular, which leaves

high financial consequences for the

victims.
Prevention tip:
By using secure servers you can prevent data from being

easily accessed and viewed.
It is important that these servers are not only secured

themselves, but that they also store the data encrypted.
Weak passwords
What gives access to secure data?
The credentials needed to get through security.

Creating a strong password, which is difficult

for hackers to guess, ensures that access can’t

simply be obtained.
04.
Example
In 2014, such an example hit Ebay:

hackers gained access to databases

full of sensitive data via credentials

of 3 employees.
Prevention tip:
We make it difficult for malicious parties by creating strong

passwords.
But that's not all: changing that password regularly is

even more effective. Therefore, make it a habit to renew

your passwords every now and then.
Lack of the right

encryption
The lack of proper encryption ensures that

there is direct access to the data when

intercepted.
05. Example
An audit in early 2022 found that NASA

employees sent unencrypted emails

containing sensitive data, personally

identifiable information, and International

Traffic in Arms Regulations data, exposing

NASA to a risk that could endanger national

security.
Prevention tip:
Encryption is one thing, but applying it properly is the

second.
Zero-knowledge end-to-end encryption is one way to
ensure that data remains protected. This applies to

malicious parties as well as to data processors.
What options do you have if

data has been shared with the

wrong person?
Take a look at this from within your organization

More Related Content

Similar to 5 Examples of how easily data breaches can happen

Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Cristina Collado
 
Enhancing Email Security: A Comprehensive Examination of Email Verification...
Enhancing Email Security: A  Comprehensive Examination of Email  Verification...Enhancing Email Security: A  Comprehensive Examination of Email  Verification...
Enhancing Email Security: A Comprehensive Examination of Email Verification...madhumadhu542020
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecuritySymantec
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refinedWan Solo
 
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfData leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfnaresh2004s
 
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxdataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxnaresh2004s
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxAsmajaved42
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectiongaurav kumar
 
TM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptxTM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptxMohammedYusuf609377
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Eloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and PrivacyEloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and PrivacyJoe Chernov
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...MZERMA Amine
 
Processing obtained email data by using naïve bayes learning algorithm
Processing obtained email data by using naïve bayes learning algorithmProcessing obtained email data by using naïve bayes learning algorithm
Processing obtained email data by using naïve bayes learning algorithmijcsit
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
 

Similar to 5 Examples of how easily data breaches can happen (20)

Common Email Security Mistakes
Common Email Security MistakesCommon Email Security Mistakes
Common Email Security Mistakes
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?
 
Enhancing Email Security: A Comprehensive Examination of Email Verification...
Enhancing Email Security: A  Comprehensive Examination of Email  Verification...Enhancing Email Security: A  Comprehensive Examination of Email  Verification...
Enhancing Email Security: A Comprehensive Examination of Email Verification...
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfData leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
 
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxdataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptx
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptx
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
7 Best Cyber Security Practices for Small Businesses.pdf
7 Best Cyber Security Practices for Small Businesses.pdf7 Best Cyber Security Practices for Small Businesses.pdf
7 Best Cyber Security Practices for Small Businesses.pdf
 
TM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptxTM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptx
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Eloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and PrivacyEloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and Privacy
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 
Processing obtained email data by using naïve bayes learning algorithm
Processing obtained email data by using naïve bayes learning algorithmProcessing obtained email data by using naïve bayes learning algorithm
Processing obtained email data by using naïve bayes learning algorithm
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 

Recently uploaded

8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 

Recently uploaded (20)

8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 

5 Examples of how easily data breaches can happen

  • 1. 5 Examples of how easily data breaches can happen
  • 2. Sending information to the wrong recipient It is the biggest cause of data leaks: sending sensitive data to the wrong person. 01. Example It happened to the Dutch municipality Assen, when an employee sent a file containing the personal data of 530 persons to the wrong email address. This is a major problem, because with standard email, you as a sender don’t receive a notification or a warning if sensitive data is processed.
  • 3. Prevention tip: If the user had known before sending that the wrong email address had been entered, this error could have been avoided. A check on recipients is therefore a functionality that can limit this risk of human error.
  • 4. Email addresses of all recipients in CC, Whoever puts all addresses in the CC, makes all recipients in that group public. 02. Example This happened recently to another Dutch municipality: an email was sent with all 123 recipients in the cc. While some aren’t aware that an email address is sensitive data too, it is. In this case, the email addresses should have been kept private from everyone. This also went wrong earlier, when the Dutch Data Protection Authority accidentally used the cc button, instead of the bcc.
  • 5. Prevention tip: A check on recipients can prevent data from being shared with everyone in the recipient group. Better yet: a check for recipients in the "to", cc or bcc field could help the sender to send the message correctly.
  • 6. Unsecured servers for storing data It is not only important to send data securely, it should also be stored securely. 03. Example Recently, copies of ID documents of 800 people were accessible by third parties, because they were stored on an unsecured publicly accessible server. And it is precisely this type of information that is interesting for cyber criminals: identity fraud is popular, which leaves high financial consequences for the victims.
  • 7. Prevention tip: By using secure servers you can prevent data from being easily accessed and viewed. It is important that these servers are not only secured themselves, but that they also store the data encrypted.
  • 8. Weak passwords What gives access to secure data? The credentials needed to get through security. Creating a strong password, which is difficult for hackers to guess, ensures that access can’t simply be obtained. 04. Example In 2014, such an example hit Ebay: hackers gained access to databases full of sensitive data via credentials of 3 employees.
  • 9. Prevention tip: We make it difficult for malicious parties by creating strong passwords. But that's not all: changing that password regularly is even more effective. Therefore, make it a habit to renew your passwords every now and then.
  • 10. Lack of the right encryption The lack of proper encryption ensures that there is direct access to the data when intercepted. 05. Example An audit in early 2022 found that NASA employees sent unencrypted emails containing sensitive data, personally identifiable information, and International Traffic in Arms Regulations data, exposing NASA to a risk that could endanger national security.
  • 11. Prevention tip: Encryption is one thing, but applying it properly is the second. Zero-knowledge end-to-end encryption is one way to ensure that data remains protected. This applies to malicious parties as well as to data processors.
  • 12. What options do you have if data has been shared with the wrong person? Take a look at this from within your organization