Personal and employee data is a goldmine for hackers

A representational concept of a social media network
(Image credit: Shutterstock / metamorworks)

Personal and employee data is a goldmine for hackers, who are now apparently more focused on obtaining these types of data than any other, new research has claimed. 

A report from Imperva analyzing 100 data breach reports published in the last 12 months says personal employee and customer data accounted for almost half (45%) of all data stolen last year.

Cybercriminals are focused on personally identifiable information, Imperva claims, because that data can be used in identity theft and similar stage-two attacks. These, says Imperva SVP, Terry Ray, can be “hugely profitable and very difficult to prevent”. 

Social engineering and unsecured databases

“Credit cards and passwords can be changed the second there is a breach, but when PII is stolen, it can be years before it is weaponized by hackers,” Ray added.

While often filling headlines, source code and proprietary data theft aren’t that popular, accounting for just 6.7% and 5.6%, respectively. The good news is that businesses had gotten a lot better at protecting payment information and password details, as leaks of this type of data dropped by 64% year-on-year. 

Most of the time, data breaches are a result of social engineering (17%) attacks or attacks against unsecured databases (15%). Misconfigured applications accounted for roughly 2% of all data breaches, but businesses expect this format to play a bigger role in the future, mostly due to the rise in cloud-managed infrastructure, whose security configuration requires significant expertise. 

For Ray, these results are somewhat surprising as unsecured databases and social engineering attacks are “straightforward to mitigate”.

“A publicly open database dramatically increases the risk of a breach and, all too often, they are left like this not out of a failure of security practices but rather the total absence of any security posture at all.”

Imperva says there are six most common oversights that result in data breaches, including the lack of multi-factor authentication (MFA), limited visibility into all data repositories, poor password policies, misconfigured data infrastructures, limited vulnerability protection, and not learning from past mistakes. 

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Someone holding a passport with two boarding passes inside it
Top digital loan firm security slip-up puts data of 36 million users at risk
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
Concept art representing cybersecurity principles
How to combat exfiltration-based extortion attacks
ransomware avast
Billions of credentials were stolen from businesses around the world in 2024
healthcare
Over a million clinical records exposed in data breach
Security padlock in circuit board, digital encryption concept
Rising cost of breaches forces organizations to rethink cybersecurity
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)