Skip to main content


 What is a data breach?


First of all, I think we need to understand that a data security breach could happen to anyone person or a big company or a small company. Really a data security breach could happen to anyone.

 

A breach of security data is where critical data and sensitive information Is obtained without the knowledge and authorization off the owner’s system. Data is so valuable nowadays and if the attacker pulls off a data security breach that means the attacker could have innocent people’s private information, account details, Finances. The attacker could even modify or alter or even destroy any sensitive data once the data security breach has been successful. The attacker could also steal private information and account details for fraudulent use, make an account on the information the attacker has obtained.

 

 

Top three biggest data security breaches


  1.         The biggest data security breach was Yahoo. This involved 3 billion Yahoo users accounts were Compromise to reveal names, email addresses and telephone numbers in 2014.
  2.          Marriott international had a data security breach which involved 500 million of the Marriott international customers had their encrypted payment cards information, contact information and other details stolen in 2014.
  3.            147.9 million Equifax customers' Social Security numbers were stolen along with other personal data in 2017.

 

What can cause data security breaches?

 

Data security breaches are becoming more frequent, and it is important to know how these threats occur. There are a few things to look out for to be less exposed for data security breach :

  1.            Make sure you have a secure network; network security breaches are carried out through malware attacks.
  2.         Phishing and social engineering techniques launched through emails can make unsuspecting employees reveal sensitive information.
  3.         Data that is shared between employees can be sent by accident to another employee who opens up on unsecured network, so just be careful when you open up your files.

Comments

Popular posts from this blog

VADDAL RILEY HOME WORKOUT IN LOCKDOWN!!!

Viddal Riley is a up and coming boxer, he has had 4 professional fight and has won all 4 fights, he also fought in the under card of  Manny Pacquiao in Las Vagas on the 28/02/2020 leading the only KO of that night. Viddal also has a Youtube  channel where he posts quite frequently. He post about Boxing, Coaching, Music and challenges if you want to check it out here it is  https://www.youtube.com/channel/UC9BaJIXnYSyYalbCVfZTZ4A . He has put out a video on a home work out that you can do in the lock down here it is -- Warm up -- 5 mins Skipping at your own level Double jump skipping High knees skipping Ground work -- Sit ups -- x12 Dorsal Raise -- x12 Pike Sit Ups -- x12 Bur-pee Stand Ups -- x12 Thumb Touching Push Ups -- x12 Pike Sit Ups Alternative Legs -- x12  Squat Thrust -- x12 Abdominal Hold -- 25 secs Bur-pee Jumps -- x12 Finger Tip Push Ups -- x12 Elbow To Knee Sit Ups -- x12  Rest Warn Down Done! Here is the link if you need a demonstration :--   h
  Data security week 6 blog Configuration of firewall and I had to keep your device safe using firewall There are many firewalls out there some that may cost money and some that are free today we're going to focus on zone alarm firewall. In this example I'll be using the free trial package for zone alarm usually zone alarm does have   annual costs fee for £54.95. Zone Alarm protect home users and small businesses from emerging cyber threats with the same next-generation technology trusted by the world’s largest companies, tailored to your needs. The ZoneAlarm Firewall protects your computer from most of those threats. It defines three security zones Trusted, Public, and Blocked. By default, the Public Zone works in High security mode, and the Trusted Zone works in Medium security mode: High security mode for Public Zone lets you connect to network resources but prevents other unauthorized network users and computers from accessing the resources on your computer and co
  Data security week 7 blog   Why is Backups important   The purpose of the backup is to create a copy of data that can be recovered in the event of a system failure. System failures can be the result of hardware or software failure, data corruption, a malicious attack (virus or malware), or accidental deletion of data. Backup copies allow data to be restored  would provide the means of restoring to a previous point after the incident has been dealt with. Backups is a vital method of storing data and keeping it safe, when you take your time and set up a good backup strategy you can ensure that data can easily be recovered. Storing copies of data on a separate device for example USB stick, an external hard drive, A disk ah storage system, cloud storage or tape drive   can protect you against data loss or corruption. most of these devices need to be at the location of your PC or laptop When trying to restore but you can store the devices in a safe place until you need it of you