Back to glossary

Data Breach

A data breach involves the unauthorized access of confidential, protected, or sensitive data. Data breaches may target personal health information (PHI), personally identifiable information (PII), payment cardholder data, trade secrets, intellectual property, or similar data. An attacker will often exfiltrate this data and hold it for ransom or attempt to sell it on the dark web.

A breach can happen through various tactics, techniques, and procedures (TTPs), including social engineering, spear-phishing, SQL injections, DDoS attacks, exploiting zero-day vulnerabilities (vulnerabilities that have been disclosed but not yet patched), malware attacks, malicious insiders, or simple human error. 

The costs of data breaches can be severe, with IBM reporting the global average cost clocking in at $4.45 million USD. “Cost” can also include significant reputational damage that can lead to organizations losing customers and even shuttering their business.

Due to the frequency and high cost of data breaches, many organizations are investing in preventive measures such as encryption, multi-factor authentication (MFA), and cybersecurity training for employees to mitigate the risks of data breaches. Threat detection paired with a robust incident response plan is key to managing and mitigating breach damage.

Stay in the Know

Get VikingCloud Resources, News & Views delivered straight to your inbox.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Blogs

Stay up-to-date on the latest happenings in Cybersecurity and PCI Compliance.

Mar 18, 2026
Blog
Cybersecurity
Small Business
Data Security
Data Privacy
Web Risk Monitoring
Blog
Mar 18, 2026

The 5 Essentials for Your Spring Security Reset

Learn More
Mar 16, 2026
Blog
Cybersecurity
Data Security
Data Privacy
Risk Management
Threat Intelligence
Blog
Mar 16, 2026

Quantum Computing and the Future of Information Security

Learn More
Mar 13, 2026
Blog
Threat Detection and Response
Cybersecurity
Blog
Mar 13, 2026

MDR vs EDR: What’s the Difference and Which Do You Need?

Learn More