Data Breaches

Articles, news, and research on data breaches and how to prevent them.

Data Breaches

Data Breaches

Ransomware Attacks Vs. Data Breaches: What's the Difference?

Ransomware attacks are evolving into data breaches which could disrupt notification strategies. Learn the difference between the two cyberattacks.
Read more
Data Breaches

India’s 6-Hour Data Breach Reporting Rule (Clearly Explained)

Learn about India's 6-hour data breach reporting rule and how it impacts your business.
Read more
Data Breaches

13 Critical Data Breach Stats for Australian Businesses

Data breach incidents in Australia are on the rise. We've aggregated some insightful cyberattack stats to help you secure your data intelligently.
Read more
Data Breaches

16 Biggest Data Breaches in Australia [Updated 2025]

Learn about some of the biggest data breaches that have impacted Australian businesses, including recent cyberattacks in 2025.
Read more
Data Breaches

15 Signs Your Vendor Has Been Breached

Here are some signs to look out for that may indicate that your vendor has suffered a data breach.
Read more
Data Breaches

Was My Facebook Data Leaked? Find Out in 2 Steps

Find out in two steps whether your Facebook data was included in the 500+ million account details that were published on the dark web.
Read more
Attack Surface Management
Data Breaches
Third-Party Risk Management

11 Ways to Prevent Supply Chain Attacks in 2025 (Highly Effective)

Supply chain attacks are on the rise. Follow these prevention tips to avoid falling victim to these devastating breaches.
Read more
Attack Surface Management
Data Breaches
Cybersecurity
Third-Party Risk Management

Honeytokens as a Defense Against Supply Chain Attacks

Supply chain attacks are on the rise but their attempts could be detected with Honeytokens. Learn how to implement them into your cybersecurity.
Read more
Data Breaches
Cybersecurity

Assume Breach Mentality vs. Supply Chain Attacks in 2025

Supply chain attacks could be prevented if all network activity is assumed to be malicious. Learn how to implement an Assume Breach framework.
Read more
Data Breaches

Privileged Access Management vs. Supply Chain Attacks

Supply chain attacks occur when privileged access accounts are abused. By protecting these accounts the risk of such attacks can be mitigated.
Read more
Attack Surface Management
Cybersecurity
Data Breaches

Zero Trust as a Defence Against Supply Chain Attacks

A Zero Trust Architecture is one of the most effective defenses against Supply Chain attacks. Learn how to implement this framework in 7 steps.
Read more
Data Breaches

What is a Supply Chain Attack? Examples & Prevention Strategies

Your business could be at risk of a data breach from a compromised vendor. Learn about supply chain attacks and how to best protect yourself.
Read more
Cybersecurity
Data Breaches
Attack Surface Management

What Are Cloud Leaks?

Cloud leaks are a unique risk facing businesses that store data in the cloud or use vendors who do. And they're caused by misconfigurations, not hackers.
Read more
Cybersecurity
Attack Surface Management
Third-Party Risk Management
Data Breaches

What is Defense in Depth?

Defense in depth is a cyber security strategy that uses a series of layered, redundant defensive measures to protect sensitive data, PII and other assets.
Read more
Compliance and Regulations
Data Breaches
Third-Party Risk Management
Attack Surface Management

What is Protected Health Information (PHI)?

Protected health information (PHI) is any information about health status, provision of health care or payment for health care that is created or collected
Read more
Data Breaches
Compliance and Regulations

What is the Cost of a Data Breach in 2023?

Learn about the global costs of a data breach and how to implement the right defenses to protect your business.
Read more
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating