Professional Documents
Culture Documents
Data Breach Prevention Article
Data Breach Prevention Article
MFA requires the user to complete additional steps to verify their identity. For
instance, a user may be asked to enter a code sent via email or text message,
answer a secret question, or perform a biometric scan (e.g., fingerprint, facial,
retinal).
Penetration testing
Penetration testing, also referred to as pen testing or ethical hacking, helps prevent a
data breach by simulating cyberattacks to test systems and identify any exploitable
vulnerabilities. Penetration testers use the same tools, techniques, and processes as
cybercriminals to simulate real-world attacks that could result in a breach.
Strong passwords
Using strong passwords eliminates a common cyberattack vector. Knowing that
people often use weak passwords, cybercriminals frequently launch attacks (e.g.,
password spraying) that exploit them. Strong passwords, combined with policies that
require users to frequently change their passwords and use different passwords for
services and applications, support an effective defense against data breach
attempts.
Organizations with strong data breach defense systems and response plans have
repeatedly been shown to recover faster with more limited damage.
In addition to implementing the right tools and procedures, it is important to test all
systems. This proactive approach identifies vulnerabilities before a data breach
occurs. Taking steps to identify and remediate vulnerabilities along with developing
and practicing response plans go a long way to protecting sensitive information from
a data breach.