Let’s get started
In another case, an accountant could leave a folder with their customer’s 2018 tax return in a coffee shop after grabbing their pumpkin spice latte. Another person walks in grabs their Americano and sits down in the same spot. They see the folder and get curious. This time the person isn’t bad, they just happen to come across the information. But none the less still a breach.
To go all the way to the “disaster girl” end of the spectrum, an intruder could have access to every computer and device a business owns for years without being discovered (… and then burns it to the ground?)
After looking at all those examples … when a breach occurs, does this mean every customer at the organization has now had their information stolen? No, not necessarily.
A breach in its most basic form, is when a person gets around a layer of security. In terms of a castle, this could be just crossing the mote. The intruder doesn’t have to get all the way in to be considered a breach, just one layer.
In other words, a breach can be boiled down to a person getting somewhere or something they were not intended to.
For more of my blogs at Tandem check out [here].
Co-founder + Ethical Hacker
Micheal has over 13 years combined experience in Information Security, Information Technology, and Physical Security. He has tackled some of the most daunting certifications in the industry and his passion for the cyber world is unparalleled with exposure to virtually every industry. He continues to hone his skills in Incident Response, Penetration Testing, and Consulting. Recognizing the need for change in cyber security, he volunteers to help entrepreneurs, veterans, and recent graduates.