HIPAA Times news | Concise, reliable news and insights on HIPAA compliance and regulations

Common causes of data breaches

Written by Tshedimoso Makhene | Dec 25, 2024 4:02:55 PM

Data breaches can occur for various reasons, often stemming from vulnerabilities in systems, processes, or human error. We’ll go over some of the common causes of data breaches and vulnerabilities below.

 

Common causes of breaches

Most breaches are the result of cyberattacks, when threat actors target an organization either because the organization seems vulnerable, or because a criminal specifically wants to infiltrate an organization. 

Cyberattacks

Phishing

Phishing is one of the most common cyberattacks, where fraudsters trick users into providing sensitive information like passwords or financial details. In 2023 alone, more than 298, 000, individuals in the United States reported encountering phishing attacks. These attacks often come in the form of fake emails or messages that appear to be from trusted sources. For example, Apple users were targeted in a new phishing scam, with attackers sending fake emails claiming that the recipient's Apple ID had been suspended. 

 

Malware

Malicious software, including viruses, ransomware, and spyware, can compromise systems and extract data. A 2024 survey of global Chief Information Security Officers (CISOs) identified ransomware attacks as a top cybersecurity risk, with 41% citing it among the top three significant threats. In recent news, the American Associated Pharmacies (AAP) was targeted by Embargo in a ransomware attack. 

 

Hacking

Some organizations can be hacked, which is when threat actors exploit vulnerabilities in software, networks, or systems to gain unauthorized access. On November 22nd, Michigan-based East Paris Internal Medicine Associates reported a data breach in November 2024, affecting 5,239 individuals due to “email-related issues;” however, details were not disclosed.

 

Credential stuffing

Credential stuffing occurs when cybercriminals use stolen usernames and passwords, often obtained from previous data breaches, to try to access accounts on different websites or systems. This attack exploits the fact that many users reuse the same login credentials across multiple platforms, making it easier for attackers to break into a wide range of accounts once they have access to a set of valid credentials.

 

Insider threats

In some cases, employees can have an interest in infiltrating their own company, usually for financial gain. At times, these threats may not even be intentional; employees can expose sensitive data by simple negligence or ignorance. 

 

Malicious insiders

Employees or contractors who intentionally steal or expose data. According to America’s Cyber Defence Agency, “Intentional threats are actions taken to harm an organization for personal benefit or to act on a personal grievance. For example, many insiders are motivated to “get even” due to a perceived lack of recognition (e.g., promotion, bonuses, desirable travel) or termination.”

 

Negligent insiders

Unintentional actions, such as misplacing devices or mishandling sensitive information. “Negligent insiders are generally familiar with security and/or IT policies but choose to ignore them, creating risk for the organization,” writes America’s Cyber Defence Agency.

 

Third-party vendors

Partners or vendors with weak security practices can expose data. A recent example of this occurred in 2023 when Ariethis Health reported a data breach that traced back to the MOVEit Transfer hack.

 

Other causes 

Natural disasters

Events like floods, fires, or earthquakes can cause severe damage to physical infrastructure, including servers, data centers, and other critical systems. In addition to disrupting operations, these disasters can lead to data exposure if organizations do not have adequate disaster recovery plans in place.

 

IoT Device Vulnerabilities

Poorly secured Internet of Things (IoT) devices can be exploited to access broader networks. Many IoT devices are designed with minimal security features, and their default settings, such as weak passwords or outdated firmware, make them easy targets for attackers. Once compromised, these devices can be used to infiltrate other connected systems, steal sensitive data, or launch further attacks.

 

Supply chain attacks

Breaches originating from vulnerabilities in suppliers’ or partners’ systems occur when a vendor or business partner’s weak security measures are exploited, leading to the exposure of an organization’s sensitive data.

See also: HIPAA Compliant Email: The Definitive Guide

Related: Tips on proactive data breach prevention for small healthcare practices

 

FAQs

How do data breaches impact individuals?

Individuals may experience identity theft, financial fraud, or privacy violations due to stolen personal data.

 

Can insurance cover the cost of a data breach?

Yes, cyber liability insurance can cover costs such as legal fees, notification expenses, and financial losses caused by a breach.