{"id":698,"date":"2022-07-08T14:09:59","date_gmt":"2022-07-08T12:09:59","guid":{"rendered":"https:\/\/www.securedenterprise.com\/us\/?p=698"},"modified":"2022-07-08T14:10:01","modified_gmt":"2022-07-08T12:10:01","slug":"digital-data-breach-in-it","status":"publish","type":"post","link":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/","title":{"rendered":"Digital Data Breach in IT"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\"><strong><em>Data Breach in IT with Digital Security<\/em><\/strong><\/h5>\n\n\n\n<p>Data breach is an incident that involves the unauthorized or illegal viewing, access or retrieval of data by an individual, application or service. It is a type of security breach specifically designed to steal and\/or publish data to an unsecured or illegal location.<\/p>\n\n\n\n<p>Data breach also known as data leak has become a common phenomenon in the IT sector. A data breach occurs when sensitive personal data of a business or individual is stolen or retrieved unauthorised by an external entity often referred to as cybercriminals. Data breaches occurs when these cybercriminals by one of the various means gain access to sensitive data and use them for criminal purposes.<\/p>\n\n\n\n<p>Some of the stolen data are used to steal the victim\u2019s identity or extort money from the owners of the information, which can be an individual or a business, while some hackers or cybercriminals sell the stolen information in the dark web marketplace.<\/p>\n\n\n\n<p>More often than not, victims of data breach are not always aware when it happens; they realise this only after the damage has been done.<\/p>\n\n\n\n<p><strong>The following methods are adopted by cybercriminals in data breach:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Malware<\/li><li>Hacking<\/li><li>Attack from inside; this can result from using unapproved software or hardware and privilege misuse.<\/li><li>Physical attacks such as hardware skimming on ATMs<\/li><li>User error; such as leaving a computer unlocked and misplacing of media that contain sensitive data<\/li><li>Social Engineering.<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>11<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Data Breaches<\/strong><\/h5>\n\n\n\n<p><\/p>\n\n\n\n<p>Data breach can occur in two ways, either intentionally or unintentionally. Intentional data breach happens when a hacker gain access into a company\u2019s or an individual system in order to access sensitive information; hackers gain access to systems by tricking the victim to install a malware tool which are often sent through email attachments or in websites.<\/p>\n\n\n\n<p>Unintentional data breach occurs in a number of ways which may include the loss of a smartphone or laptop, accessing an unsecured website by an employee of an organisation, connecting to a Wi-Fi network that is not secured, losing or misusing corporate tools by an organisation\u2019s employee, downloading compromised software on a work system among so many other ways.<\/p>\n\n\n\n<p>The internet offers us flexibility and quick access to getting things done. The world has gone online and more of human life and business are being digitalised and automated. The danger associated with such development is the increased exposure of sensitive data, the more businesses automate and digitise, and they tend to give up more rights on their data, which increases the chance of a data breach. The whole scenario is becoming more of a nightmare than it ought to be, it is obvious that without proper and adequate digital security, the benefits of going digital may be overridden by the inherent danger of data leakage.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data Breach in IT with Digital Security Data breach is an incident that involves the unauthorized or illegal viewing, access or retrieval of data by an individual, application or service. It is a type of security breach specifically designed to steal and\/or publish data to an unsecured or illegal location. Data breach also known as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":699,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorised"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Data Breach in IT -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Data Breach in IT -\" \/>\n<meta property=\"og:description\" content=\"Data Breach in IT with Digital Security Data breach is an incident that involves the unauthorized or illegal viewing, access or retrieval of data by an individual, application or service. It is a type of security breach specifically designed to steal and\/or publish data to an unsecured or illegal location. Data breach also known as [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-08T12:09:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-08T12:10:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securedenterprise.com\/us\/wp-content\/uploads\/2022\/07\/Data-Breach-in-IT-with-Digital-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"870\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"service.enterprise\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"service.enterprise\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/\"},\"author\":{\"name\":\"service.enterprise\",\"@id\":\"https:\/\/www.securedenterprise.com\/us\/#\/schema\/person\/b16be62063d0c5adc8799f71085286a7\"},\"headline\":\"Digital Data Breach in IT\",\"datePublished\":\"2022-07-08T12:09:59+00:00\",\"dateModified\":\"2022-07-08T12:10:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/\"},\"wordCount\":470,\"image\":{\"@id\":\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.securedenterprise.com\/us\/wp-content\/uploads\/2022\/07\/Data-Breach-in-IT-with-Digital-Security.jpg\",\"inLanguage\":\"en-ZA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/\",\"url\":\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/\",\"name\":\"Digital Data Breach in IT -\",\"isPartOf\":{\"@id\":\"https:\/\/www.securedenterprise.com\/us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.securedenterprise.com\/us\/wp-content\/uploads\/2022\/07\/Data-Breach-in-IT-with-Digital-Security.jpg\",\"datePublished\":\"2022-07-08T12:09:59+00:00\",\"dateModified\":\"2022-07-08T12:10:01+00:00\",\"author\":{\"@id\":\"https:\/\/www.securedenterprise.com\/us\/#\/schema\/person\/b16be62063d0c5adc8799f71085286a7\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#primaryimage\",\"url\":\"https:\/\/www.securedenterprise.com\/us\/wp-content\/uploads\/2022\/07\/Data-Breach-in-IT-with-Digital-Security.jpg\",\"contentUrl\":\"https:\/\/www.securedenterprise.com\/us\/wp-content\/uploads\/2022\/07\/Data-Breach-in-IT-with-Digital-Security.jpg\",\"width\":870,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.securedenterprise.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Data Breach in IT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.securedenterprise.com\/us\/#website\",\"url\":\"https:\/\/www.securedenterprise.com\/us\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.securedenterprise.com\/us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.securedenterprise.com\/us\/#\/schema\/person\/b16be62063d0c5adc8799f71085286a7\",\"name\":\"service.enterprise\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/7ebcf860d92f894519d53322c6d1ff2c2d5687b4ce65b32fc4b024c26d03f37e?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ebcf860d92f894519d53322c6d1ff2c2d5687b4ce65b32fc4b024c26d03f37e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ebcf860d92f894519d53322c6d1ff2c2d5687b4ce65b32fc4b024c26d03f37e?s=96&d=mm&r=g\",\"caption\":\"service.enterprise\"},\"sameAs\":[\"http:\/\/www.securedenterprise.com\/us\"],\"url\":\"https:\/\/www.securedenterprise.com\/us\/author\/service-enterprise\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Data Breach in IT -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/","og_locale":"en_US","og_type":"article","og_title":"Digital Data Breach in IT -","og_description":"Data Breach in IT with Digital Security Data breach is an incident that involves the unauthorized or illegal viewing, access or retrieval of data by an individual, application or service. It is a type of security breach specifically designed to steal and\/or publish data to an unsecured or illegal location. Data breach also known as [&hellip;]","og_url":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/","article_published_time":"2022-07-08T12:09:59+00:00","article_modified_time":"2022-07-08T12:10:01+00:00","og_image":[{"width":870,"height":350,"url":"https:\/\/www.securedenterprise.com\/us\/wp-content\/uploads\/2022\/07\/Data-Breach-in-IT-with-Digital-Security.jpg","type":"image\/jpeg"}],"author":"service.enterprise","twitter_card":"summary_large_image","twitter_misc":{"Written by":"service.enterprise","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#article","isPartOf":{"@id":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/"},"author":{"name":"service.enterprise","@id":"https:\/\/www.securedenterprise.com\/us\/#\/schema\/person\/b16be62063d0c5adc8799f71085286a7"},"headline":"Digital Data Breach in IT","datePublished":"2022-07-08T12:09:59+00:00","dateModified":"2022-07-08T12:10:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/"},"wordCount":470,"image":{"@id":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.securedenterprise.com\/us\/wp-content\/uploads\/2022\/07\/Data-Breach-in-IT-with-Digital-Security.jpg","inLanguage":"en-ZA"},{"@type":"WebPage","@id":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/","url":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/","name":"Digital Data Breach in IT -","isPartOf":{"@id":"https:\/\/www.securedenterprise.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#primaryimage"},"image":{"@id":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.securedenterprise.com\/us\/wp-content\/uploads\/2022\/07\/Data-Breach-in-IT-with-Digital-Security.jpg","datePublished":"2022-07-08T12:09:59+00:00","dateModified":"2022-07-08T12:10:01+00:00","author":{"@id":"https:\/\/www.securedenterprise.com\/us\/#\/schema\/person\/b16be62063d0c5adc8799f71085286a7"},"breadcrumb":{"@id":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#primaryimage","url":"https:\/\/www.securedenterprise.com\/us\/wp-content\/uploads\/2022\/07\/Data-Breach-in-IT-with-Digital-Security.jpg","contentUrl":"https:\/\/www.securedenterprise.com\/us\/wp-content\/uploads\/2022\/07\/Data-Breach-in-IT-with-Digital-Security.jpg","width":870,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.securedenterprise.com\/us\/digital-data-breach-in-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.securedenterprise.com\/us\/"},{"@type":"ListItem","position":2,"name":"Digital Data Breach in IT"}]},{"@type":"WebSite","@id":"https:\/\/www.securedenterprise.com\/us\/#website","url":"https:\/\/www.securedenterprise.com\/us\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.securedenterprise.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.securedenterprise.com\/us\/#\/schema\/person\/b16be62063d0c5adc8799f71085286a7","name":"service.enterprise","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/7ebcf860d92f894519d53322c6d1ff2c2d5687b4ce65b32fc4b024c26d03f37e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7ebcf860d92f894519d53322c6d1ff2c2d5687b4ce65b32fc4b024c26d03f37e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ebcf860d92f894519d53322c6d1ff2c2d5687b4ce65b32fc4b024c26d03f37e?s=96&d=mm&r=g","caption":"service.enterprise"},"sameAs":["http:\/\/www.securedenterprise.com\/us"],"url":"https:\/\/www.securedenterprise.com\/us\/author\/service-enterprise\/"}]}},"_links":{"self":[{"href":"https:\/\/www.securedenterprise.com\/us\/wp-json\/wp\/v2\/posts\/698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securedenterprise.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securedenterprise.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securedenterprise.com\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securedenterprise.com\/us\/wp-json\/wp\/v2\/comments?post=698"}],"version-history":[{"count":1,"href":"https:\/\/www.securedenterprise.com\/us\/wp-json\/wp\/v2\/posts\/698\/revisions"}],"predecessor-version":[{"id":700,"href":"https:\/\/www.securedenterprise.com\/us\/wp-json\/wp\/v2\/posts\/698\/revisions\/700"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securedenterprise.com\/us\/wp-json\/wp\/v2\/media\/699"}],"wp:attachment":[{"href":"https:\/\/www.securedenterprise.com\/us\/wp-json\/wp\/v2\/media?parent=698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securedenterprise.com\/us\/wp-json\/wp\/v2\/categories?post=698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securedenterprise.com\/us\/wp-json\/wp\/v2\/tags?post=698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}