Skip to main content
Founding FuelFounding Fuel

A primer on data breaches

Data breaches are inevitable. Here’s what you can do to minimise damage

14 November 2020· 3 min read

TL;DR

Data breaches are an unavoidable reality for modern enterprises, frequently stemming from human error across complex digital environments. This article highlights that Personally Identifiable Information (PII) is the prime target, making companies with extensive user bases highly vulnerable. Key risks span misconfigured cloud infrastructures, developer oversights, weak credentials, and sophisticated social engineering. For business leaders, the imperative is clear: implement rigorous cloud security governance, invest in comprehensive developer training, mandate multi-factor authentication, and foster continuous cyber hygiene. Proactive measures are crucial to safeguard critical data, minimize impact, and uphold stakeholder trust in an increasingly volatile digital landscape.
A primer on data breaches
Image by Jan Alexander from Pixabay

Most data breaches are due to human errors or the predictability of our behaviour. That’s what makes them hard to prevent. In any data breach, the most important question is how much Personally Identifiable Information (PII) is lost. The PII could be name, address, email address, date of birth, telephone number, clear text / weakly hashed password, passport/Pan/Aadhar details, credit / debit cards numbers, CVV.

This data is usually sold on the blackmarket and the market value of each record is dictated by the type of PII available. This makes startups like BigBasket, Zomato, Paytm etc—which have millions of active users—a prime target for data breach attacks. In BigBasket’s case, the PII of 20 million users was breached.

Some of the common causes of data breaches are 

  1. Physical loss of data/credentials stored on a laptop or a pen drive or a mobile device that is stolen or misplaced. Or improperly disposed/recycled documents 
  2. Data shared with partners who might not have the same standards of security.
  3. Improperly configured security policies. As more companies move their infrastructure to the cloud, the risk of a large data breach also increases. The flexibility and ease provided by the cloud comes at the price of setting up correct policies and access permissions. An oversight, however temporary, can open up the data to public access. One of the most common reasons for a data breach is an improperly configured S3 bucket in AWS (which is a low-cost object store used for storing large volumes of data).  
  4. Developer oversights. Some of the common mistakes developers make are leaving credentials in the code (open to reverse engineering), leaving APIs open to unauthorised access, saving PII in debug logs.
  5. Weak/stolen credentials. Most of us tend to use the same password across multiple sites with possibly minor variations. Hackers use this to their advantage by attempting to login to various sites using the user names, passwords from a data breach. This is called credential stuffing. There have been cases where a corporate email ID and password obtained from a data breach was used to sign in to a code repository where database credentials were stored. 
  6. Phishing/social engineering. Getting unsuspecting users to share their credentials by masquerading as a legitimate party. Again, hackers use PII from data breaches to make the attempt seem legitimate. Experienced developers have fallen for this. 
  7. Malware. Getting users to download malware that detects key presses or provides remote access to hackers.  
  8. Disgruntled/malicious insiders 

What can you do in case your PII is part of a data breach? 

  1. Change your password on the site. If you have used the same password on any other sites, change the password there too.
  2. Avoid using the same password on multiple sites. 
  3. Use longer passwords (at least 12 characters) and change them every few months. Consider using passphrases which are easier to remember. 
  4. Use a password manager to store passwords for different sites if it is hard to remember so many. 
  5. Enable two-factor authentication on every site that supports it.
  6. Beware of phishing attempts.
  7. Avoid clicking on untrusted links and attachments. 

Founding Fuel is sustained by readers who value depth, context, and independent thinking.

If this essay helped you think more clearly, you may choose to support our work.

Illustration of supportersIllustration of supporters

Achyut Nayak

Software specialist

Achyut is a software geek from Mumbai. He spent the first decade-and-half of his career designing and implementing banking solutions all over the world. He then worked with a startup building products in the Fraud and Data Analytics space. He currently works with data and machine learning at a Singapore startup. He has also contributed to the tech stack at Founding Fuel.

Beyond the noise is the signal.

FF Insights: Sharpen your edge, Monday–Friday.
FF Life: Culture, ideas and perspectives you won't find elsewhere — Saturday.

Readers also liked

A Merger Is Not an Idea
·Business & Strategy

A Merger Is Not an Idea

Why the Omnicom - Interpublic deal reveals a deeper failure of imagination in advertising

SS
Shekar Swamy

Shekar Swamy

MD & Group CEO, R K SWAMY Ltd

A Journey Back to Myself
·FF Life

A Journey Back to Myself

Armed with a diary and pen, I set out on a solo two-and-a-half-month ‘journalling adventure’ through Malaysia and Indonesia. Every little self-musing helped me remember my old self and awaken a new one

PB
Piya Bose

Piya Bose

Founder, Girls On The Go & Cave of Plato

A World Without Endgames
·Economy, Policy & Society

A World Without Endgames

What prolonged global conflicts mean for Europe, China—and India’s narrowing strategic space.

VK
Vivek Y. Kelkar

Vivek Y. Kelkar

Researcher, Analyst & Columnist on Geo-economics, Geopolitics and Sustainability