In conversations about digital compromises, the terms “breach” and “hack” are often used interchangeably—but the two are actually quite different. In short, a hack involves a malicious actor or actors gaining unauthorized access to a protected computer, whereas a breach is a broader category indicating any spill of confidential data, including those that happen by accident. Here's some more detail on what makes them different, and how prevention strategies differ between the two.
What is a Hack?
The question of what exactly constitutes a hack prompts different answers depending on the perspective of the individual answering.
For instance, among criminals who pride themselves on their unique skill in cracking into systems, someone deploying a popular program that automates the process of effecting a digital intrusion might be derisively referred to as a “script kiddie”: a person who is childishly running others' scripts (programs) rather than doing the true hacking of using his or her own intelligence to invent a custom technique for breaking in.
But at the opposite extreme, from the perspective of some jurists in the criminal justice system, users simply sharing passwords can run afoul of the Computer Fraud and Abuse Act, typically thought of as the chief anti-hacking law on the books.
From the perspective of a business, however, hacks are compromises caused by people with malicious intent who—whether by simple or complex means—are cracking into the organization's systems in ways that cause problems.
There is a definite “bad guy” component to a hack—someone is seeking to do damage. In contrast, a breach can be as simple as an accidentally misconfigured web server causing internal company data to be indexed by Google.
How to Prevent a Hack
Since hackers have malicious intent, it can help IT teams to adopt the mindset that they are battling foes. For that, they need resources such as the Security Operations Center of a managed security service.
Using tools like vulnerability management to patch security flaws before hackers exploit them is a good way to maintain strong defences and stay one step of ahead of the opponents.
What is a Breach?
The word “breach” is a broad term used for many types of cybersecurity compromises. When speaking loosely, one could identify a hack as a type of breach. But if precision is called for, then it is best to use “breach” only for those compromises where there is no malicious intent, and the data has been released due to mistake, negligence, or some other unintentional cause.
The Internet of Things is already providing many examples of what may be considered breaches. For instance, hundreds of webcams and other devices worldwide are leaking footage or other data from the inside of businesses and homes onto the Internet, where they are indexed by the popular search engine Shodan.io.
In this situation, there are no hackers involved. The leaks of information are simply due to the equipment's default settings. However, that does not mean they are not dangerous. These breaches may be revealing information that the devices' owners do not wish to have exposed.
How to Prevent a Breach
To prevent the mistakes that lead to breaches, organizations can instill a security culture among their employees. Safety—both physical and digital—should be a daily topic, something staff members are encouraged to talk about and find solutions to. With greater awareness, employees become invested in and proactive about preventing mistakes. Under that paradigm, breaches are less likely to happen.
The Role of Cybersecurity
Regardless of whether a failure is better described as a hack or a breach, the fact is that no organization wants to be compromised due to weak cybersecurity.
Quality cybersecurity solutions such as network security monitoring can help keep digital assets safe from both malicious intrusions and accidental leaks. They give IT teams visibility into their systems by monitoring around the clock for the red flags of unusual network activity. Data hacks and breaches are on the rise in 2016. In the light of this threat, it is time to pay closer attention to cybersecurity.
How to Assess IT Vulnerabilities for Free
If you have ever wondered what software flaws and vulnerabilities are hiding in your network, now is the time to find out. For a limited time only, EiQ Networks will offer a FREE scan of up to 10 external IP addresses to identify vulnerabilities. You’ll receive an in-depth report that identifies:
- The number of vulnerabilities detected and their severity level
- The number of assets affected and which ones they are
- A detailed description of the threat, its impact, and remediation guidance