Data Breach
Introduction
Data breach is a suspected breach of sensitive data by exposing the data to the risks of accidental loss, or unauthorised or accidental access, processing, erasure or use. Data breaches could result from cyber attacks to computer systems, networks or cloud storage during which cyber criminals gain unauthorised access to sensitive data such as personal data and financial data. Besides outsiders, data breaches could be caused by vicious insiders (e.g. privilege abuse), human errors (e.g. security misconfiguration) and negligence of users (e.g. loss of USB drive).
Typically, cyber criminals will target personal data such as name, identity card number, email address, username, password, credit card number or any data that can be used for criminal or dishonest purposes (e.g. deception). For businesses, valuable data such as financial record, intellectual property, trade secret and customer data can be targeted by cyber criminals for financial gain.
Causes and Impacts
Common causes of data breaches:
|
|
For organisations:
|
Preventive Measures
- Keep electronic devices in safe custody and encrypt any sensitive data stored.
- Use up-to-date firewall, anti-malware and anti-phishing software.
- Patch and update systems and applications regularly.
- Configure systems and devices to allow only authorised user(s) to access the sensitive data.
- Avoid transfer sensitive data to portable devices or any unknown third parties.
- Use strong password and multi-factor authentication if applicable.
- Be mindful of solicitations for sensitive data in suspicious emails and websites.
- Use secure cloud storage or services with proper security configurations and end-to-end encryption.
- Erase all sensitive data in storage devices thoroughly before repairing or disposing or the devices.
- Do not use untrusted communication channels (e.g. public Wi-Fi) or devices to conduct sensitive transactions (e.g. on-line banking) or access sensitive data.
- Use the Data Security Scanner provided by the Office of the Privacy Commissioner for Personal Data, Hong Kong to conduct a quick and easy self-assessment on the sufficiency of data security measures for information and communications technology systems.
Detection
|
|
|
|
|
|
|
Mitigation
|
|
|
|
|
|
|
|
|
Extended Readings
|
Disclaimer: Users are also recommended to observe the Important Notices of this website and read the user agreements and privacy policies of the security software and tools before download and use them.