Are data breaches the new normal? Should we just assume our data isn’t safe?
- Written by Sigi Goode, Professor of Information Systems, Australian National University
In recent days, both Ticketek Australia[1] and Ticketmaster[2] have experienced breaches which have exposed customer details to hackers. They join a growing list of high-profile data breaches that have put the privacy of millions at risk.
For example, in 2022, Optus disclosed a breach[3] of 9.8 million records. In 2023, Latitude, the Australian financial services firm, experienced a data breach of more than 14 million records[4].
My own university, the Australian National University, experienced a data breach[5] of 200,000 records in 2018. Dan Murphy’s[6], Football Australia[7], Microsoft[8], Nissan[9], Dell[10], Roku[11], Suncorp[12] and Shell[13] have all experienced breaches so far in 2024.
Despite advancements in technology and increased awareness of cybersecurity threats, companies continue to fall victim to breach attacks.
It may feel like these breaches are becoming more frequent, and that seemingly any firm is a data breach target waiting to happen. But the situation is not quite so clear-cut.
What happens in a data breach?
A data breach is an unauthorised access or disclosure of sensitive, confidential or private information: customer identities, payment methods, account details, purchase histories and so on.
Breaches can happen when cyber criminals exploit vulnerabilities in computer systems, networks, applications or physical security to gain unauthorised access to protected data. They can also access data when it’s accidentally made available outside the organisation, perhaps by an incorrectly addressed email or a lost USB memory stick.
Australia has actually seen a fairly steady rate of notifiable data breaches since 2020 – around 450 every six months, according to the Office of the Australian Information Commissioner[14].
While these figures are higher than when the notifiable data breach program began in 2018, it’s important to understand this is partly a consequence of requiring organisations to disclose breaches: the more you look for something, the more you’re going to find it.
Even if the number of data breaches is not increasing significantly, the average cost and severity of these breaches has risen substantially. According to IBM[15], the average cost of a data breach was US$4.45 million (A$6.69 million), an increase of 15% over three years. So what’s driving these increases?
The value of your personal data is going up
Increased demand for targeted advertising and the growing importance of data-driven decision making have fuelled the need for richer customer data.
Many organisations – not just legitimate ones – want to know more about you, and at a much more granular level than before. The more comprehensive and accurate the data, the more valuable it becomes.
Increasingly stringent privacy regulations, such as the European Union’s General Data Protection Regulation[16] (GDPR) and Australia’s Privacy Act have driven organisations to improve their data management practices and security measures to protect user information and avoid costly fines.
This has made it harder, not easier, for cyber criminals to acquire user data in bulk.
Meanwhile, markets for illicit customer data are becoming more popular as anonymising networks and tools become more user friendly. Tools for selling on the dark web have also become more advanced, allowing cyber criminals to collaborate and share information about in-demand data, potential targets and new attack modes.
Once a cyber criminal has obtained some data, finding a buyer is much easier than it was even a few years ago.
However, large firms are investing more in protecting and storing data. According to consulting firm Gartner[17], 87% of chief information officers in Australia and New Zealand will be increasing their cybersecurity budgets this year.
As a result, data and cybersecurity practices are becoming more complex, increasing the skill needed for a bad actor to make a successful attack.
How do I protect my data with so many breaches happening?
While our personal data continues to have value, there will be a market for it. Make sure you practice good cybersecurity habits.
Regularly review and delete inactive accounts, and monitor your accounts for strange activity.
Enable two-factor authentication (2FA) on your accounts and devices, so that you’ll receive a prompt on your phone when someone logs into your account, or transfers money out of it. Don’t believe cold callers who want you to deactivate or give them your two-factor responses.
Read more: What is multi-factor authentication, and how should I be using it?[18]
Be very selective about the personal info you share online, particularly information such as birthdays, when and where you were born, and the names of pets and family members. This information can be used to defuse account recovery questions.
Don’t click on suspicious email links, regardless of how innocuous they might appear.
Never provide sensitive information to unknown or unverifiable sources, especially cold callers who claim you have a virus, or are due for a refund. Authentic callers will be happy for you to call them back on an official number.
The best way to think about the data breach problem is not to think about how our data can be breached, but to think about how organisations get your data in the first place. The best way to protect yourself online – whether it’s data breaches or an account compromise – is to guard your data jealously.
You only have one identity: don’t give it away easily.
References
- ^ Ticketek Australia (www.abc.net.au)
- ^ Ticketmaster (www.cnet.com)
- ^ Optus disclosed a breach (www.optus.com.au)
- ^ of more than 14 million records (ia.acs.org.au)
- ^ experienced a data breach (www.abc.net.au)
- ^ Dan Murphy’s (www.cyberdaily.au)
- ^ Football Australia (www.cyberdaily.au)
- ^ Microsoft (www.cyberdaily.au)
- ^ Nissan (www.itnews.com.au)
- ^ Dell (www.cyberdaily.au)
- ^ Roku (au.finance.yahoo.com)
- ^ Suncorp (www.afr.com)
- ^ Shell (www.cyberdaily.au)
- ^ Office of the Australian Information Commissioner (www.oaic.gov.au)
- ^ IBM (www.ibm.com)
- ^ European Union’s General Data Protection Regulation (theconversation.com)
- ^ Gartner (www.gartner.com)
- ^ What is multi-factor authentication, and how should I be using it? (theconversation.com)