Data Breaches: Protection & Prevention

Data Breaches: Protection & Prevention
Coming up next: Data Breach Response Plans

You're on a roll. Keep up the good work!

Take Quiz Watch Next Lesson
Your next lesson will play in 10 seconds
  • 0:03 Why Protect Yourself?
  • 0:58 Preventing Data Breaches
  • 2:00 Protecting Your Data
  • 2:40 Lesson Summary
Save Save Save

Want to watch this again later?

Log in or sign up to add this lesson to a Custom Course.

Log in or Sign up

Lesson Transcript
Instructor: Kaitlin Oglesby
Data breaches may be a fact of life for society at large, but that doesn't mean that your company has to deal with this. In this lesson, we'll see how to prevent data breaches and protect your information.

Why Protect Yourself?

Thousands of data breaches happen every year, with millions of records and billions of dollars put at risk. In short, for many companies, it is not a matter of if there will be a data breach but when.

Given the necessities of modern business, those data breaches place a great deal at risk. Customer billing information, business secrets, and much more are held by companies for several reasons from making return orders easier to performing big data or data mining analysis. However, that data is also a liability. Not protecting it could spell the end of business as you know it.

Therefore, companies are wise to protect the data that they have been entrusted with. To that end, companies work hard to prevent data breaches as well as protect information. In this lesson, we will see how both are done, focusing first on hardware-side data breaches and then software-side protection of information.

Preventing Data Breaches

Preventing data breaches is typically considered a hardware-side concern although, in reality, the separation is much more blurred than that. However, it is a useful paradigm because much of what you can do to prevent a data breach deals with the hardware that stores information.

For example, the most effective way to protect your data from being breached is to insist on every user having his or her own sign-in credentials, including a strong password. By doing this one act, you can greatly limit the likelihood of malicious activity from a brute-force attack against your passwords.

To unlock this lesson you must be a Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use

Become a member and start learning now.
Become a Member  Back
What teachers are saying about
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create an account