A data breach can have devastating consequences. For individuals, the possible effects include theft/fraud and emotional stress and worry. In fact, the aftermath of a data breach can be devastating for victims. The sheer scale of the information we share on and offline should make us all scared about what could happen should it get into the wrong hands.
For example, following the recent Guntrader data breach, animal rights activists created a CSV file linked to a Google Earth map that showed the exact locations of the data breach victims’ homes. The map was then posted on a blog which encouraged people to “contact as many [gun owners] as you can in your area and ask them if they are involved in shooting animals”.
Smaller, individual mistakes can also cause misery when bank statements, medical records and other personal data is shared with people it should not be – for example, ex-partners, neighbours, or employers
For organisations, the impact of a data breach can also be devastating. As well as the reputational damage, and the potential loss of future business and customers, organisations risk huge regulatory fines and compensation pay outs if they do not adequately uphold their data protection responsibilities.
Despite this, the SecureAge report found that cybersecurity training is still lacking with fewer than 50% of employers providing formal training on how to detect and handle suspicious emails. Employees also lack understanding on how to set up a strong password or protect sensitive information when working remotely.
At Keller Postman UK, we have seen the damage that can be caused by simple human error in the workplace. For example, the Ministry of Defence (MoD) experienced two shocking data breaches that have put Afghans and their families at risk.
The Afghan Relocations Assistance Policy (an MoD team) mistakenly exposed email addresses, names and some photographs by not using the bcc function when contacting people asking for an update on their situation. This potentially catastrophic data protection breach exposed those who worked against the Taliban and could put lives at risk.
Not using the bcc functionality when sending an email to multiple recipients is a common data privacy mistake and one that an organisation like the MoD should easily be able to prevent with the proper training and processes.