{"id":4582,"date":"2023-03-20T14:28:18","date_gmt":"2023-03-20T14:28:18","guid":{"rendered":"https:\/\/www.nebrcentre.co.uk\/?p=4582"},"modified":"2023-03-20T14:28:18","modified_gmt":"2023-03-20T14:28:18","slug":"how-to-protect-yourself-and-your-business-from-data-breaches","status":"publish","type":"post","link":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/how-to-protect-yourself-and-your-business-from-data-breaches\/","title":{"rendered":"How to Protect Yourself and Your Business From Data Breaches"},"content":{"rendered":"\n<p>In February&nbsp;this year,&nbsp;<a href=\"https:\/\/www.itgovernance.co.uk\/blog\/list-of-data-breaches-and-cyber-attacks-in-february-2023-29-5-million-records-breached\">106 disclosed cyber incidents<\/a>&nbsp;accounted for more than 29 million data breaches, equating to&nbsp;over 300 million compromised records.<\/p>\n\n\n\n<p>Data breach attacks involve unauthorised access to sensitive or confidential information, which can have devastating consequences&nbsp;to include&nbsp;financial loss, reputational damage, and even identity theft.&nbsp;<\/p>\n\n\n\n<p>Such attacks come in many forms, including phishing attacks, malware, social engineering, and insider threats via rogue employees or third-party contractors with access to confidential data.<\/p>\n\n\n\n<p>Cyber criminals conduct data breaches by taking advantage of weak passwords, a lack of security awareness from employees, and security software that may be outdated.&nbsp;<\/p>\n\n\n\n<p><strong>To keep yourself and your business safe from compromising data breaches, use strong passwords and change them regularly,&nbsp;<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/security-awareness-training\/\"><strong>educate employees<\/strong><\/a><strong>&nbsp;on the risks of cyber threats, and limit access to sensitive data to those who need it and ensure it\u2019s monitored.<\/strong><\/p>\n\n\n\n<p>For further guidance on preventing data breaches, please contact&nbsp;<a href=\"mailto:enquiries@nebrcentre.co.uk\">enquiries@nebrcentre.co.uk<\/a>.<\/p>\n\n\n\n<p><strong>Sign up for our&nbsp;<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/core-membership-sign-up\/\"><strong>free core membership<\/strong><\/a><strong>&nbsp;to stay informed with the latest cyber security&nbsp;<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/news\/\"><strong>news<\/strong><\/a><strong>&nbsp;and access a wealth of handy online&nbsp;<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/resources\/\"><strong>resources<\/strong><\/a><strong>.&nbsp;<\/strong><\/p>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/\">NEBRC<\/a>&nbsp;is a non-profit organisation that seeks to educate,&nbsp;<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/news\/\">inform<\/a>, and&nbsp;<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/services\/\">support<\/a>&nbsp;businesses across the UK on how to stay safe online through robust cyber security practices.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In February&nbsp;this year,&nbsp;106 disclosed cyber incidents&nbsp;accounted for more than 29 million data breaches, equating to&nbsp;over 300 million compromised records. Data breach attacks involve unauthorised access&#8230;<\/p>\n","protected":false},"author":1,"featured_media":4583,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-4582","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"_links":{"self":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/4582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/comments?post=4582"}],"version-history":[{"count":0,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/4582\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/media?parent=4582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/categories?post=4582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/tags?post=4582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}