Skip to content
  • Product
    • Business
    • Personal
  • Why Enpass
  • Pricing
  • Resources
    • Blog
    • Forums
    • Support
  • About
  • Contact
Download
Security

What exactly are ‘Data Breaches’?

February 19, 2019
Data Breaches

These are tough times for our digital lives. Hardly a week goes by without hearing about a data breach at an online service or a traditional business that uses IT infrastructure for customer relationship management, accounting, HR processes, inventory, so on and so forth.

With an unauthorized access, these breaches expose personal data, including names, email addresses, passwords, government identities, dates of birth, credit card information, medical records, et al to shadowy hackers with an aim to use the information for identity theft, financial scams, and other sinister cyber/real world crimes across the globe.

Unfortunately, most of these incidents stay undetected for months, thereby denying any opportunity for a counter measure.

What is a Data Breach?

All of us share our personal data with diverse organizations and government institutions – financial records with our insurance provider, medical records with the healthcare provider, personal communication with the email service, etc.

These organizations by a security failure or an intrusion, expose our data to an unauthorized actor. Often, there’s no immediate negative impact (mostly when no credit card information is leaked). Hackers who steal sell or publish the exposed data make it a ticking time bomb.

The repercussions of such a breach can be very delayed, sometimes not fully manifesting for years.What is a Data Breach

Data breaches aren’t a new phenomenon. One of the earliest widely reported data breaches happened at the credit-reporting company TRW Information Systems (now Experian). In 1984!

The numeric passcode to the database that stored credit histories of 90 million Americans was lifted from a Sears Roebuck store and put up on an electronic billboard system (yeah, those were the days!).

Anyone who knew how to view the bulletin board could combine the password with publicly available information from public agencies such as the motor vehicle department.

The TRW data breach was a warning to all organizations harboring massive amounts of user data —one that many clearly didn’t heed.

Why do these data breaches occur?

Unfortunately, there is no such thing as perfect security, and there’s no way to eliminate data breaches. But these massive data breach events too shouldn’t be as frequent as they are these days.

Many large organizations and government institutions have lax security protocols and resources. The IT departments sometimes commit avoidable mistakes, delay security patches or essential software updates, or fail to take counter measures against a known threat or zero-day exploits. Till very recently, and even now for a lot of non-IT/ITES organizations, digital security isn’t much of a spending priority – creating a sort of security deficit in the ecosystem.

Of course, it’s a continuous cat-and-mouse game (and an endless expense) for the organizations, and any miss here and there becomes a gateway for the hackers to access and exploit personal and confidential data.


The silver lining of the frequent data breaches in recent years, and the media attention around it, is that businesses and governments have started to work to substantially improve baseline cybersecurity and define data sovereignty and data protection better, and users have started to exert their control on their personal data and privacy and adopting better security practices online.


This article is authored by Abhishek Baxi, a leading technology columnist. An Editor at AndroidAuthority and a Contributing Writer at Forbes, Abhishek will now write a regular column for the Enpass community. He can be reached at ab@baxiabhishek.info or on Twitter (@baxiabhishek).

  • Data breach

Post navigation

Previous
Next

4 Comments

  1. Supercharge your password manager with periodic audits | Enpass

    June 2, 2020 / 6:51 pm

    […] services every day, we have a forever increasing number of passwords and other credentials. With data breaches a common occurrence these days, it is pertinent to keep a regular check on your […]

  2. Important steps to take after a data breach | Enpass

    August 19, 2020 / 5:46 pm

    […] Data breaches are an increasingly common occurrence these days. Our personal data, including names, email addresses, passwords, government identities, dates of birth, credit card information, medical records, et al makes its way to shadowy hackers who could use it for identity theft, financial scams, and other sinister real world crimes across the globe. […]

  3. Are your passwords at risk? | Enpass

    November 26, 2020 / 4:02 pm

    […] embarrassing their associates amidst global media coverage. Unsecured or weak passwords can lead to data breaches, ransomware attacks, as well as identity thefts that can be abused for other menacing cyber or […]

  4. Enpass introduces breach monitoring on iOS; coming to Android and desktop platforms soon | Enpass

    December 14, 2020 / 6:21 pm

    […] Data breaches are an increasingly common occurrence these days. Our personal data, including names, email addresses, passwords, government identities, dates of birth, credit card information, medical records, et al makes its way to shadowy hackers who could use it for identity theft, financial scams, and other sinister real-world crimes across the globe. […]

Comments are closed.

Search

Categories

  • Announcement (34)
  • Browser Extensions (12)
  • Enpass Portable (4)
  • Enpass-Android (15)
  • Enpass-BB (3)
  • Enpass-iOS (14)
  • Enpass-Linux (8)
  • Enpass-Mac (7)
  • Enpass-Windows (18)
  • General (42)
  • How-To (25)
  • Press Releases (1)
  • Security (39)

Recent posts

  • From Password Policy to Practice: Enpass Helps Businesses Get Passwords Strong
  • 16 billion login credentials leaked — including logins for Google, Apple, Facebook, and more. Here’s how Enpass helps you stay safe
  • SEIM Integration
    Enpass Introduces Event Logging and SIEM Integration

Tags

Access Recovery Browser Security Cybersecurity Data breach Data Sovereignty Enpass6 Enpass Business Enpass Enterprise Enpass hub Lastpass passkeys password manager password theft Phishing Security Security Audit Spear Phishing Vault Sharing

Related posts

Password-Manager-Breaches-Should-you-Worry-As-A-User
Security

Password Manager Breaches: Should You Worry as a User?

February 9, 2023

Disturbing reports of high-profile data breaches involving popular password managers have become more frequent. LastPass and Norton Password Manager were recently hacked, which has raised concerns about the security and reliability of using such tools to store sensitive information. These security breaches can naturally make anyone nervous about the safety of their data. But these […]

Top-Reasons-Why-You-Shouldnt-Use-Browser-Password-Manager
Security

Browser Password Managers: Are They Really Secure or Just Convenient?

January 2, 2023

Most of us primarily use web browsers for work and play throughout the day. So why not also entrust it with our passwords? Although it may seem like a safe and convenient place to store passwords, your browser is not entirely trustworthy. People often think they don’t need a password manager because using a free […]

Heres-How-Password-Managers-Tranquilize-the-Threat-of-Phishing
Security

Uncover the Truth About Phishing and How Password Managers Protect You From These Attacks

December 30, 2022

In today’s digital age, it’s no surprise that cyber threats and security risks are on the rise. One of the most widespread cyber attacks is phishing, a social engineering attack targeting unsuspecting users with malicious links or emails. How does Phishing Work? Phishing is a cyber attack that takes place by tricking people into giving […]

Want to receive news and updates?

By subscribing, you agree to our Terms of Use and Privacy Notice. We do not send more than one email a month about the latest news of Enpass, special promotions and sneak peek of future releases.

Connect with us on social media

Explore
  • Business
  • Personal
  • Microsoft 365 Integration
  • Google Workspace Integration
  • Affiliate Program
  • Partners Program
  • Beta Program
  • Students
Features
  • Offline
  • Sync
  • Autofill
  • Passkeys
  • Password Generator
  • Password Audit
  • Import from others
  • Compromised Passwords
Resources
  • Comparison
  • Downloads
  • Security
  • Security Whitepaper
  • Press: Resources
  • Passkeys Catalogue
Company
  • About
  • Privacy Notice
  • Cookie Policy
  • Terms of Use

Copyright © 2025 Enpass Technologies Inc.

  • Terms of Use
  • Privacy Notice