RSA 2026Come see what your attackers already know→
GhostEye
PLATFORMCOMPANYRESOURCES
SCHEDULE DEMO

Find out who in your company is exposed.

PLATFORM

Overview

RESOURCES

BlogResearchEventsNewsProductGlossary

COMPANY

About
GhostEye
22 Vanderbilt Suite 7C
New York, NY 10017
founders@ghosteye.ai
Trust CenterHelp CenterSchedule DemoTerms of UsePrivacy Policy

© 2026 GhostEye, Inc. All rights reserved.

  1. ← Glossary
  2. /
  3. Data Breach

Data Breach

INFRASTRUCTURE
·3 min read·Updated Mar 2026

A data breach is a security incident in which sensitive, protected, or confidential information is accessed, disclosed, or exfiltrated by an unauthorized party. Breaches can result from external attacks, insider threats, or accidental exposure..

What is a Data Breach?

A data breach is a security incident in which sensitive, protected, or confidential information is accessed, disclosed, or exfiltrated by an unauthorized party. Breaches can result from external attacks, insider threats, or accidental exposure.

Types of Data Breaches

Data breaches fall into distinct categories based on how they occur: **Credential-based breaches** occur when attackers use stolen or compromised login credentials to gain access, as in 61% of breaches according to Verizon. **Malware-based breaches** use trojans, ransomware, or data stealers to extract information. **Social engineering breaches** exploit human manipulation rather than technical exploits. **Insider breaches** involve misuse by employees or contractors with legitimate access. **Accidental exposure** includes misconfigured cloud buckets, unencrypted backups, or data left unsecured. **Supply chain breaches** occur when attackers compromise a vendor or third-party provider.

The Human Element in Data Breaches

The 2024 Verizon Data Breach Investigations Report found that 74% of breaches involved the human element, including social engineering, credential theft, misuse, and error. Phishing and stolen credentials remain the two most common initial access vectors, both targeting people rather than technology. IBM's Cost of a Data Breach Report 2024 found that breaches caused by human error cost an average of $5.02 million, compared to $4.18 million for malicious breaches.

Business and Operational Impact

A data breach creates immediate and long-term consequences. Direct costs include incident response, forensics, remediation, and regulatory fines. The IBM report puts the average total cost of a breach at $4.88 million in 2024, up 10% from 2023. Indirect costs are often larger: operational disruption, loss of customer trust, damaged reputation, and reduced market value. Equifax, which exposed the personal data of 147 million people, has spent over $700 million on settlements, upgrades, and reputation repair since 2017.

Regulatory and Compliance Implications

Breaches trigger mandatory disclosure laws. GDPR fines can reach 20 million euros or 4% of global annual revenue, whichever is higher. HIPAA violations carry penalties up to $1.5 million per violation type per year. State privacy laws (CCPA, VCCPA, NYDFS) add additional notification and documentation requirements. California requires notification within 30 days, while other states allow 60 days. Notification costs average $6 per consumer according to IBM, meaning a breach affecting 100,000 people costs $600,000 in notification alone.

Detection and Response

Detecting breaches early is critical to limiting impact. IBM found the average time to identify a breach is 204 days, with detection by security teams (39 days on average) happening much faster than detection by third parties or law enforcement (229 days). Modern detection uses security information and event management (SIEM), user behavior analytics (UBA), and threat intelligence. Response requires isolating compromised systems, stopping the attacker's lateral movement, preserving forensic evidence, and notifying affected parties. Incident response should follow frameworks like NIST SP 800-61 and include preparation, detection, containment, eradication, recovery, and post-incident review.

On this pageWhat is a Data Breach?Types of Data BreachesThe Human Element in Data BreachesBusiness and Operational ImpactRegulatory and Compliance ImplicationsDetection and ResponseFAQ

Frequently Asked Questions

What is the most common cause of data breaches?

Credential compromise is the most common cause, involved in 61% of breaches according to Verizon. This includes phishing, credential stuffing, brute force attacks, and stolen credentials from third-party breaches.

How much does a data breach cost?

The average cost of a data breach is $4.88 million according to IBM's 2024 report, including investigation, remediation, notification, regulatory fines, and business disruption. Breaches caused by human error average $5.02 million.

How long does it take to detect a breach?

The average time to identify a breach is 204 days according to IBM. Detection by internal security teams averages 39 days, while detection by third parties or law enforcement averages 229 days, making early detection significantly more valuable.

What should happen after detecting a breach?

Isolation of compromised systems must happen first to stop lateral movement. Then preserve forensic evidence, investigate the attack scope, notify affected parties (typically within 30-60 days depending on jurisdiction), and conduct a post-incident review to identify how to prevent similar breaches.

Related Terms
PhishingSocial EngineeringInsider ThreatIncident ResponseCredential Stuffing