Security Breach

Any unauthorized access to a computer network, computer data, devices, or applications is considered a security breach. Typically, a security breach happens when an intruder is able to hack the system or bypass security mechanisms.

There are different types of security breaches depending on how the intruder was able to gain access. The intruder can use social engineering, in which they pose as an employee to contact the company’s IT staff and ask to have login credentials resent or reset. Hackers can also use drive-by downloads delivered to an employee through emails or website links. Malware attacks, ransomware attacks, exploitation of system vulnerabilities, and cracking weak passwords are some common ways for intruders to infiltrate the system.

Examples of a security breach

  • The 2018 Facebook security breach resulted in the loss of data from 29 million personal profiles including the profile of founder and CEO Mark Zuckerberg.
  • eBay had a major security breach in 2014 resulting in the credit card information leak of many customers.
  • Equifax suffered massive data loss in 2017 that gave hackers access to the Social Security numbers of 145 million Americans registered in the Equifax database.  

How much does a security breach cost? 

According to a report by IBM in 2021, the annual cost of a security breach is $4.24 million, rising 10% from last year. The analysis by IBM takes into account several cost factors including employee productivity, customer turnover, technical activities, regulation, legal, loss of brand equity, and other factors. The scope of the report by IBM included 537 security breaches in over 17 countries. The data was gathered by conducting 3500 interviews.

In the above-mentioned Equifax breach, reported in February 2020 that the data leak cost the company $1.13 billion in the previous year alone.

How can businesses minimize the risk of security breaches? 

As intruders keep finding new ways and tools for security breaches, businesses need to continuously improve their security measures to protect their systems from intruders. Some good habits that be used by businesses to minimize vulnerability to security breaches include using strong passwords, closing dormant accounts, backing up files, using reputable anti-virus software, implement solid micro-segmentation strategies based on zero trust, and regularly training employees on best practices to keep their devices protected from intrusion.  

Security incident vs. security breach

A security incident is different from a security breach. A security incident could be an employee losing his work laptop, a malware infection, a distributed denial of service (DDOS), or other incidents that do not result in loss of data or access to a secured network. In a security breach, there is confirmed disclosure (within the company’s infosec team at least) that the breach took place, not just potential exposure of data to an unauthorized party. 

Ali Azhar
Ali is a professional writer with diverse experience in content writing, technical writing, social media posts, SEO/SEM website optimization, and other types of projects. Ali has a background in engineering, allowing him to use his analytical skills and attention to detail for his writing projects.

Top Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

From A3 to ZZZ we list 1,559 SMS, online chat, and text abbreviations to help you translate and understand today's texting lingo. Includes Top...

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

Generations of Computers (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

Snail Mail

Snail mail, also called direct mail, is a slang term for...

CC vs BCC: What...

CC and BCC are two options to add third-party recipients to...


  Eventbrite is an online event posting, event management, and ticketing website. Eventbrite can...