In 2023, India ranked fifth globally in terms of the highest number of account breaches, with 5.3 million accounts exposed. Worldwide, a staggering Rs 30 crore was crossed, with the U.S. topped the list with data breach of 34%, followed by Russia, France, and Spain in second, third, and fourth. It has moved up to fifth in time. 

The study highlights the serious risk that data breaches provide to the safety of net clients. This information was gathered from Surfshark’s report of 29,000 publicly available databases. More often than not, hackers breach data by sending spam emails and can distribute viruses to computers. In this blog, we will discuss data breach issues and how organizations can prevent such breaches.

Data Breach Incidents in 2023

To understand how the data breach affected India, we have to go through some recent data breach analyses, Here are some of the data breach incidents in 2023: 

How Hathway was Hacked by Hackers?

Hathaway experienced a fact breach in December 2023 that revealed 41.Data on five million customers, including names, email addresses, phone numbers, and physical addresses. Establishing the significance of robust safeguards and systems required to stop such intrusions is crucial. Because the breach led to the use, disclosure, or destruction of private information without authorization in addition to a breach of the record’s confidentiality. When it was discovered that the stolen records had been bought for $10,000, concerns regarding the improper handling of sensitive personal data increased.

What Happened at Air India?

Hackers attacked Air India’s database, gaining unauthorized access to the personal details of 4.5 million of its customers. This breach occurred shortly after a similar incident at Akasa Air. Following the breach, Air India notified affected passengers via email, acknowledging that their data security had been compromised. The stolen information included user IDs and passwords.

The hackers managed to acquire sensitive data, enabling them to access passengers’ GST invoices and subsequently disclose them publicly. However, Air India refuted allegations that credit card details such as CVC and CVV numbers were compromised, asserting that they remained secure.

Data Breach Incident at Upstox

Hackers gained access to the KYC and other personal data of 2.5 million clients by breaking into the security systems of Upstox, the second-largest stockbroking company in India based on purchaser numbers. A report aided by the Times of India found that the pilfered data was linked to a third-party storage facility before being posted to the shadowy internet.

The breach has been attributed to a group known as ‘Shiny Hunters’, according to investigators. It was found that the hackers managed to obtain access to account information by acquiring the Amazon Web Service Key.

How These Incidents Can Be Prevented?

Businesses need to be proactive in reducing the risk of cyberattacks. Credit card facts are protected by making sure the charge card enterprise (PCI) is licensed and complies with its safety requirements. Particularly for mobile devices, encrypting WiFi networks and using strong passwords can help prevent unwanted access.

Book a Free Consultation with our Cyber Security Experts

Name
Email
Company Name
Phone Number


Best Practices for Cybersecurity

Below are the best cybersecurity practices for 2024: 

Establish a Robust Cybersecurity Policy

A cybersecurity policy acts as a formal framework outlining the cybersecurity measures employed by your company to enhance security effectiveness. It ensures alignment between security specialists and employees by detailing essential information security practices that apply company-wide. Adopting a hierarchical approach to cybersecurity policy implementation involves having a centralized policy supplemented by department-specific policies tailored to address the unique needs of each department. This approach enhances overall cybersecurity policy effectiveness while minimizing disruptions to departmental workflows. 

Secure Organization’s Perimeter and IoT Connections

Because of the widespread use of remote work, cloud environments, and IoT devices, organizational access goes far beyond traditional firewalls and DMZs, significantly broadening the attack surface. The Internet of Things market is expected to reach $567 billion by 2027 if it continues to expand. With connected security cameras, doorbells, smart locks, and other types of IoT devices, potential attacks are established. For instance, a compromised printer could grant access to sensitive documents. To bolster perimeter security, safeguard border routers, and establish screened subnets. Additionally, it enhances database security by isolating sensitive data from the corporate network and enforcing access restrictions. Enhance traditional security measures such as firewalls and VPNs with a zero trust model, which mandates continuous trust of users and devices to prevent unauthorized access as opposed to “do not accept.” never have, always prove” principle fits.

Implementation of People-Centric Policy

In this approach, employees themselves form a critical perimeter. Educating and monitoring staff are key aspects of establishing a secure people-centric environment. To transition your organization’s cybersecurity to a people-centric model, contemplate the following steps:

Control Access to Sensitive Data

Providing employees with excessive privileges by default poses a risk by granting access to sensitive data unnecessarily. This approach heightens the threat of insider attacks and enables hackers to compromise data when an employee’s account is breached. 

Implementing the least privilege model, also known as the principle of least privilege, offers a more effective solution. This entails assigning each user the minimum access rights required and elevating privileges only when necessary. If access to sensitive data is not required, corresponding privileges should be removed.

Additionally, adopting a just-in-time access management approach adds further granularity to controlling user privileges. This involves granting access to employees upon request for a specific duration and with a valid reason. Organizations can enhance their access management practices by combining these techniques.

Conclusion

The number of information breaches worldwide has increased significantly in 2023, with India coming in fifth place. These hacks brought to light how urgently stronger cybersecurity laws across all sectors are needed. The events at Hathaway, Air India, and Upstox provide a reminder that businesses need to give cybersecurity top priority in order to safeguard sensitive data and preserve customer trust. Organizations can improve their cybersecurity posture by using quality practices along with strong cybersecurity policies, securing IoT networks and organizational reach. This can be done by managing access rights to critical data, handling supply chain risks through C-SCRM, and managing information breach risks.

Kratikal, a CERT-In empanelled auditor provides comprehensive cybersecurity solutions aimed at protecting businesses from a wide range of cyber threats. With a special focus on securing web applications, Kratikal helps businesses identify potential risks and effectively mitigate them. By partnering with Kratikal, companies are proactively able to address security vulnerabilities, thwarting the efforts of malicious hackers to exploit these vulnerabilities.

FAQs

How can companies prevent data breaches?

Ans: To prevent data breaches, organizations should implement security measures such as continuous software and security patch updates, strong password policies, firewall fraud prevention mouth, intrusion prevention systems, and the implementation of encryption technology.

What is the Impact of a Data Breach?

Ans: Data breaches can have far-reaching and diverse consequences, such as lost sales, damage to one’s reputation, and low buyer confidence. Moreover, it might result in fraud, identity theft, and other illicit activities. 

About The Author

Leave a comment

Your email address will not be published. Required fields are marked *