{"id":1093,"date":"2023-10-11T08:34:09","date_gmt":"2023-10-11T08:34:09","guid":{"rendered":"https:\/\/pbscompany.smartwebsitedesign.com\/?p=1093"},"modified":"2023-10-23T13:34:46","modified_gmt":"2023-10-23T13:34:46","slug":"how-data-breaches-happen","status":"publish","type":"post","link":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/","title":{"rendered":"How Data Breaches Happen"},"content":{"rendered":"\n

It seems like every other day we hear about a data breach impact millions or even billions of user accounts. For instance, the Yahoo! data breach, which is the largest data breach of the 21st Century, impacted over 3 billion user accounts.<\/p>\n\n\n\n

Despite the fact that breaches have become daily news, many people don\u2019t know how they happen.<\/p>\n\n\n\n

4 Ways Data Breaches Happen<\/strong><\/h2>\n\n\n\n


1. Spear Phishing<\/strong>
Spear phishing is a targeted email to that appears to be from a trusted individual or source. Common forms of spear phishing include CEO fraud, malicious attachments, and some even include forms of ransomware.<\/p>\n\n\n\n

What Can You Do?<\/strong>
Always do your best to ensure an email comes from a trusted source, don\u2019t click on any links or download any file attachments that seem suspicious. If you have any concerns, don\u2019t click on anything and immediately report the email to your IT department or company.<\/p>\n\n\n\n

2. Stolen Credentials<\/strong>
Stolen credentials simply mean that someone\u2019s username and passwords got exposed, and many times it leads to additional accounts being exposed. Just one stolen passwords can lead to millions of more accounts being compromised.<\/p>\n\n\n\n

What Can You Do?<\/strong>
Always create the strongest passwords possible and create a required policy for all passwords in your organization. A strong password generally consists of at least 8 characters, upper and lower case letters, and special characters. Also, don\u2019t use personally identifiable information in your passwords like your name, birthdate, etc.<\/p>\n\n\n\n

3. Unpatched Vulnerabilities<\/strong>
Devices become more vulnerable to attacks when the proper updates and security patches aren\u2019t put through. This allows cybercriminals to identify backdoors that are wide open allowing for easy access.<\/p>\n\n\n\n

What Can You Do?<\/strong>
Follow the policy and procedures set by your IT department to ensure your devices are updated.<\/p>\n\n\n\n

*Did you know that Microsoft is ending support for Windows 7 on January 14, 2020*<\/p>\n\n\n\n

After this date, Windows will no longer be sending updates and security patches to Windows 7 devices.<\/p>\n\n\n\n

4. Human Error<\/strong>
Generally, human error is the cause of most data breaches. We can\u2019t stop hackers from sending phishing emails, but we can do a better job identifying spam emails and not clicking on bad links or attachments.<\/p>\n\n\n\n

What Can You Do?<\/strong>
At Cyber Riot, we offer Cyber Security training designed to help your employees identify different types of cyber threats.<\/p>\n","protected":false},"excerpt":{"rendered":"

It seems like every other day we hear about a data breach impact millions or even billions of user accounts. For instance, the Yahoo! data breach, which is the largest data breach of the 21st Century, impacted over 3 billion user accounts. Despite the fact that breaches have become daily news, many people don\u2019t knowContinue reading “How Data Breaches Happen”<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1094,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"\nHow Data Breaches Happen - Preferred Business Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Data Breaches Happen - Preferred Business Systems\" \/>\n<meta property=\"og:description\" content=\"It seems like every other day we hear about a data breach impact millions or even billions of user accounts. For instance, the Yahoo! data breach, which is the largest data breach of the 21st Century, impacted over 3 billion user accounts. Despite the fact that breaches have become daily news, many people don\u2019t knowContinue reading "How Data Breaches Happen"\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/\" \/>\n<meta property=\"og:site_name\" content=\"Preferred Business Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PBSMakingITSimple\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-11T08:34:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-23T13:34:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/how-data-breaches-happen.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"reachuniversal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pbscompany\" \/>\n<meta name=\"twitter:site\" content=\"@pbscompany\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"reachuniversal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/\"},\"author\":{\"name\":\"reachuniversal\",\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/person\/5327d131a2748d133ef15efb43a65e2c\"},\"headline\":\"How Data Breaches Happen\",\"datePublished\":\"2023-10-11T08:34:09+00:00\",\"dateModified\":\"2023-10-23T13:34:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/\"},\"wordCount\":387,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/wp.pbscompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/how-data-breaches-happen.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/\",\"url\":\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/\",\"name\":\"How Data Breaches Happen - Preferred Business Systems\",\"isPartOf\":{\"@id\":\"https:\/\/wp.pbscompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/how-data-breaches-happen.png\",\"datePublished\":\"2023-10-11T08:34:09+00:00\",\"dateModified\":\"2023-10-23T13:34:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#primaryimage\",\"url\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/how-data-breaches-happen.png\",\"contentUrl\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/how-data-breaches-happen.png\",\"width\":1200,\"height\":630,\"caption\":\"how-data-breaches-happen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wp.pbscompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Data Breaches Happen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wp.pbscompany.com\/#website\",\"url\":\"https:\/\/wp.pbscompany.com\/\",\"name\":\"Preferred Business Systems\",\"description\":\"Making IT Simple Since 1997!\",\"publisher\":{\"@id\":\"https:\/\/wp.pbscompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wp.pbscompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/wp.pbscompany.com\/#organization\",\"name\":\"Preferred Business Systems\",\"url\":\"https:\/\/wp.pbscompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/pbs-logo3.svg\",\"contentUrl\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/pbs-logo3.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"Preferred Business Systems\"},\"image\":{\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PBSMakingITSimple\",\"https:\/\/x.com\/pbscompany\",\"https:\/\/www.linkedin.com\/company\/pbscompany\",\"https:\/\/www.youtube.com\/channel\/UC-VcP48uj6Z3pvDbA-K6dWw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/person\/5327d131a2748d133ef15efb43a65e2c\",\"name\":\"reachuniversal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f2b4a7f24629c25bbddf9871124f5925?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f2b4a7f24629c25bbddf9871124f5925?s=96&d=mm&r=g\",\"caption\":\"reachuniversal\"},\"sameAs\":[\"https:\/\/reachuniversal.com\"],\"url\":\"https:\/\/wp.pbscompany.com\/blog\/author\/reachuniversal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Data Breaches Happen - Preferred Business Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/","og_locale":"en_US","og_type":"article","og_title":"How Data Breaches Happen - Preferred Business Systems","og_description":"It seems like every other day we hear about a data breach impact millions or even billions of user accounts. For instance, the Yahoo! data breach, which is the largest data breach of the 21st Century, impacted over 3 billion user accounts. Despite the fact that breaches have become daily news, many people don\u2019t knowContinue reading \"How Data Breaches Happen\"","og_url":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/","og_site_name":"Preferred Business Systems","article_publisher":"https:\/\/www.facebook.com\/PBSMakingITSimple","article_published_time":"2023-10-11T08:34:09+00:00","article_modified_time":"2023-10-23T13:34:46+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/how-data-breaches-happen.png","type":"image\/png"}],"author":"reachuniversal","twitter_card":"summary_large_image","twitter_creator":"@pbscompany","twitter_site":"@pbscompany","twitter_misc":{"Written by":"reachuniversal","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#article","isPartOf":{"@id":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/"},"author":{"name":"reachuniversal","@id":"https:\/\/wp.pbscompany.com\/#\/schema\/person\/5327d131a2748d133ef15efb43a65e2c"},"headline":"How Data Breaches Happen","datePublished":"2023-10-11T08:34:09+00:00","dateModified":"2023-10-23T13:34:46+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/"},"wordCount":387,"commentCount":0,"publisher":{"@id":"https:\/\/wp.pbscompany.com\/#organization"},"image":{"@id":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#primaryimage"},"thumbnailUrl":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/how-data-breaches-happen.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/","url":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/","name":"How Data Breaches Happen - Preferred Business Systems","isPartOf":{"@id":"https:\/\/wp.pbscompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#primaryimage"},"image":{"@id":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#primaryimage"},"thumbnailUrl":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/how-data-breaches-happen.png","datePublished":"2023-10-11T08:34:09+00:00","dateModified":"2023-10-23T13:34:46+00:00","breadcrumb":{"@id":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#primaryimage","url":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/how-data-breaches-happen.png","contentUrl":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/how-data-breaches-happen.png","width":1200,"height":630,"caption":"how-data-breaches-happen"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.pbscompany.com\/"},{"@type":"ListItem","position":2,"name":"How Data Breaches Happen"}]},{"@type":"WebSite","@id":"https:\/\/wp.pbscompany.com\/#website","url":"https:\/\/wp.pbscompany.com\/","name":"Preferred Business Systems","description":"Making IT Simple Since 1997!","publisher":{"@id":"https:\/\/wp.pbscompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.pbscompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wp.pbscompany.com\/#organization","name":"Preferred Business Systems","url":"https:\/\/wp.pbscompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wp.pbscompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/pbs-logo3.svg","contentUrl":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/pbs-logo3.svg","width":"1024","height":"1024","caption":"Preferred Business Systems"},"image":{"@id":"https:\/\/wp.pbscompany.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PBSMakingITSimple","https:\/\/x.com\/pbscompany","https:\/\/www.linkedin.com\/company\/pbscompany","https:\/\/www.youtube.com\/channel\/UC-VcP48uj6Z3pvDbA-K6dWw"]},{"@type":"Person","@id":"https:\/\/wp.pbscompany.com\/#\/schema\/person\/5327d131a2748d133ef15efb43a65e2c","name":"reachuniversal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wp.pbscompany.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f2b4a7f24629c25bbddf9871124f5925?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2b4a7f24629c25bbddf9871124f5925?s=96&d=mm&r=g","caption":"reachuniversal"},"sameAs":["https:\/\/reachuniversal.com"],"url":"https:\/\/wp.pbscompany.com\/blog\/author\/reachuniversal\/"}]}},"jetpack_featured_media_url":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/how-data-breaches-happen.png","_links":{"self":[{"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/posts\/1093"}],"collection":[{"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/comments?post=1093"}],"version-history":[{"count":2,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/posts\/1093\/revisions"}],"predecessor-version":[{"id":1170,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/posts\/1093\/revisions\/1170"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/media\/1094"}],"wp:attachment":[{"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/media?parent=1093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/categories?post=1093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/tags?post=1093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}