Glossary Term

Data Breach

Unauthorized exposure or theft of sensitive information because systems, services, or accounts were compromised.

1 min read

Share this definition

Post it to your feed or send it to teammates.

What it is

A data breach occurs when information that should remain private—customer records, credentials, financial data, source code, or regulated personal information—is accessed or exfiltrated without authorization. Breaches typically start with an exposed entry point such as an unpatched service, misconfigured cloud storage, compromised password, or leaked API key. Once inside, attackers copy, modify, or publish sensitive information and may escalate privileges to reach backups or shadow IT systems. Modern incidents blend phishing, credential stuffing, supply chain exposure, and exploitation of zero-day vulnerabilities, so a single oversight can cascade into broad disclosure.

Why it matters

Breaches trigger financial loss, regulatory fines, legal action, and long-term erosion of customer trust. Disclosure obligations under regimes such as GDPR or PCI DSS require precise knowledge of what data was exposed and how. For SMBs, even a modest breach can outpace insurance coverage, disrupt operations, and damage partnerships—making prevention, rapid detection, and transparent response essential parts of resilience planning.

How to reduce risk

  • Enforce strong authentication, including Multi-Factor Authentication (MFA) for every account touching sensitive data.
  • Continuously monitor internet-facing assets with Vulnerability Scanning to catch misconfigurations, exposed services, and outdated software.
  • Use Encryption at Rest and strong TLS/SSL to ensure stolen files cannot be read even if copied.
  • Apply timely security patches across infrastructure, SaaS tooling, and integrations to shrink exploitable windows.
  • Minimize data collection, restrict access by role, and routinely audit who can view or modify crown-jewel records.
  • Train employees on phishing awareness, incident reporting, and secure handling of credentials or portable media.