A breach or security breach is a computer security term that describes a situation where an attacker gains access to a restricted area on a computer or network. Once the intruder gains access to a system, they may steal confidential data or install malware. While many security breaches are detected by software, many go undetected.

A data breach describes an intentional or unintentional release of private information. In the case of an intentional data breach, an attacker infiltrates a network, finds private information, and releases that data or holds it hostage for a ransom. With an unintentional data breach, a company may incorrectly set access rights and allow everyone to see information they should not.

How can a breach happen?

A breach may occur for any of the following reasons:

  • How can a breach happen?

  • What should I do if my account is part of a breach?

  • Examples of data breaches.

  • A hacker gained access through a vulnerability.

  • Malware is sent to an employee and unintentionally installed on a computer or server, thus granting access to a hacker by stealing login credentials or creating a backdoor.

  • A laptop, smartphone, or other hardware with system access is lost or stolen.

  • An employee or other company insider with access to a system.

  • Human error.

What should I do if my account is part of a breach?

If you have an account with a company whose had a data breach, you’ll receive an e-mail from them. In the e-mail, the company may disclose the information that was compromised, the actions they have taken, and steps to help protect yourself. If usernames and passwords were compromised, the company may reset your account and require you to log in with a new password. If you use the same password with multiple accounts, we recommend you change the other account passwords. The following link can provide you with further information and suggestions on what to do with a compromised account.

In some situations, it may not be possible to determine exactly where the breach occurred.

  • What should I do if I’ve been hacked?

Examples of data breaches

As more businesses have made their databases accessible to the Internet, data breaches are becoming increasingly common. Below are a few examples of some large data breaches that have happened.

After a breach has occurred, you may encounter phishing attempts to steal additional information. If you get any suspicious e-mails, be cautious about clicking any links in them and do not open any attachments.

  • The Clearview AI data breach in 2020 that had 3 billion images of people it copied from the Internet stolen.
  • Yahoo announced in 2016 a data breach that had been happening for years, affecting more than 3 billion user accounts.
  • In May 2019, it was discovered that 885 million First American users’ account details were posted online.
  • In April 2019, Facebook had more than 540 million user records exposed.
  • The Equifax data breach in 2017 that affected more than 145 million Americans.

Business terms, Computer crime, Computer security, Hacker, PII, Security terms

See each of the years in our computer history section to see some breaches that happened that year.

  • How to protect yourself while on the Internet.
  • How to prevent unauthorized computer access.
  • How to know if a computer was hacked.
  • Computer security help and support.