{"id":43838,"date":"2022-02-09T09:43:09","date_gmt":"2022-02-09T01:43:09","guid":{"rendered":"https:\/\/version-2.com\/?p=43838"},"modified":"2022-03-08T14:35:25","modified_gmt":"2022-03-08T06:35:25","slug":"the-top-5-biggest-data-leaks-in-2021","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/","title":{"rendered":"The Top 5 Biggest Data Leaks in 2021"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"43838\" class=\"elementor elementor-43838\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"perex\">Data breaches are a common phenomenon in the world of data and can pose serious threat to organizations. When a data breach occurs, a company\u2019s reputation is at risk, and fines from legal authorities may be imposed. The costs of such breaches can be enormous. According to IBM\u2019s Cost of a Data Breach Report, issued in conjunction with the Ponemon Institute, in 2021 the average cost of a data breach reached $4.24 million per incident, in healthcare it was $7.13 million. Let us walk you through the biggest data breaches of 2021.<\/p><h2><strong>#1 Twitch<\/strong><\/h2><p><strong>Number of records leaked:&nbsp;<\/strong>5 billion<\/p><p>The Amazon-owned streaming service experienced a data breach in October. There was an error in a Twitch server configuration change that resulted in access to 100GB of data by a malicious third party and data leak.<\/p><p>An investigation was launched immediately, the company fixed the configuration and secured the systems. This leak was caused by a human error, hence an insider threat.<\/p><div class=\"row tiny-component\" data-info=\"start\" data-component=\"2 responzivn\u00ed sloupce\"><div class=\"col-12 col-lg-6\"><p><strong>Types of data exposed:&nbsp;<\/strong><\/p><ul><li>User data<\/li><li>Client list<\/li><li>Twitch\u2019s source code<\/li><li>Security tools<\/li><li>Three years of payment information<\/li><\/ul><\/div><div class=\"col-12 col-lg-6\">&nbsp;<\/div><\/div><hr><h2><strong>#2 Astoria Company<\/strong><\/h2><p><strong>Number of records leaked:<\/strong>&nbsp;30 million<\/p><p>Astoria Company LLC focuses on lead generation from various websites and collects data for its clients.<\/p><p>In January, the team at Night Lion Security discovered several new breached databases of Astoria Company for sale on the dark web. Night Lion notified Astoria Company, the company was not aware of the breach.<\/p><div class=\"row tiny-component\" data-info=\"start\" data-component=\"2 responzivn\u00ed sloupce\"><div class=\"col-12 col-lg-6\"><p><strong>Types of data exposed:&nbsp;<\/strong><\/p><ul><li>Social security numbers<\/li><li>Bank accounts<\/li><li>Driver\u2019s license numbers<\/li><li>Names<\/li><li>Email addresses<\/li><li>Dates of birth<\/li><li>Mobile phone numbers<\/li><li>Physical addresses<\/li><li>IP addresses<\/li><li>Credit history<\/li><li>Medical data<\/li><li>Home and vehicle information<\/li><\/ul><\/div><div class=\"col-12 col-lg-6\">&nbsp;<\/div><\/div><hr><h2><strong>#3 Park Mobile<\/strong><\/h2><p><strong>Number of records leaked:&nbsp;<\/strong>21 million<\/p><p>Park Mobile provides the largest cashless parking app in the U.S. In March, the company experienced a data breach in which the personal data of 21 million customers was sold online by Russian hackers.<\/p><p>The breach occurred due to vulnerability in a third-party software that is being used by the company. Park Mobile immediately launched an investigation, notified legal authorities, and recommended that customers change their passwords.<\/p><div class=\"row tiny-component\" data-info=\"start\" data-component=\"2 responzivn\u00ed sloupce\"><div class=\"col-12 col-lg-6\"><p><strong>Types of data exposed:&nbsp;<\/strong><\/p><ul><li>License plate numbers<\/li><li>Email addresses<\/li><li>Phone numbers<\/li><li>Vehicle nicknames<\/li><\/ul><\/div><div class=\"col-12 col-lg-6\"><h2>&nbsp;<\/h2><\/div><\/div><hr><h2><strong>#4 ClearVoiceResearch.com<\/strong><\/h2><p><strong>Number of records leaked:<\/strong>&nbsp;15.7 million<\/p><p>ClearVoice Research focuses on market research surveys. In April, the company discovered that a backup file of one of their survey databases from 2015 was exposed and sold online.<\/p><p>The company launched an investigation, located the backup file, secured it and eliminated any further exposure. Other files were checked to see whether they were secured properly against other breaches.<\/p><p>ClearVoice Research reset the passwords of people whose data might have been compromised and implemented security measures to prevent the recurrence of such an event.<\/p><div class=\"row tiny-component\" data-info=\"start\" data-component=\"2 responzivn\u00ed sloupce\"><div class=\"col-12 col-lg-6\"><p><strong>Types of data exposed:&nbsp;<\/strong><\/p><ul><li>Names<\/li><li>Email addresses<\/li><li>Addresses<\/li><li>Home addresses<\/li><li>Phone numbers<\/li><li>Dates of birth<\/li><li>Passwords from 2015<\/li><li>Responses to various questions (such as health conditions, political affiliation and ethnicity)<\/li><\/ul><\/div><div class=\"col-12 col-lg-6\"><h2>&nbsp;<\/h2><\/div><\/div><hr><h2><strong>#5 Jefit<\/strong><\/h2><p><strong>Number of records leaked:<\/strong>&nbsp;9.05 million<\/p><p>Jefit is a workout tracking app. In March, the company experienced a data breach due to a security bug. The breach impacted clients\u2019 accounts that were registered before 20<sup>th<\/sup>&nbsp;September 2020.<\/p><p>The company secured the servers and impacted accounts immediately and launched an investigation and contacted the authorities. Jefit also adopted new security measures to avoid another breach in the future.<\/p><div class=\"row tiny-component\" data-info=\"start\" data-component=\"2 responzivn\u00ed sloupce\"><div class=\"col-12 col-lg-6\"><p><strong>Types of data exposed:&nbsp;<\/strong><\/p><ul><li>Account usernames<\/li><li>Email addresses associated with the accounts<\/li><li>Encrypted passwords<\/li><li>IP addresses when creating the account<\/li><\/ul><\/div><\/div><hr><h2><strong>How to avoid&nbsp;<span class=\"text-blue\">data breaches<\/span><\/strong><\/h2><p>There are various ways to avoid data breaches. The tips below might help you to protect your company\u2019s valuable data.<\/p><ul><li>Identify all the sensitive data in your company and review who can access it and why.<\/li><li>Review security policies and make sure they are not too difficult to understand and follow.<\/li><li>Educate your employees and reiterate why data security is important.<\/li><li>Implement a DLP solution that helps you to perform security audits and set and manage security policies.<\/li><\/ul><p>Eighty-five percent of companies experience a data breach and 60% of small businesses close within 6 months due to a major data leak. At Safetica, we help all companies, large and small, from various sectors to protect their data against leakage and insider threats.&nbsp;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"21172\" class=\"elementor elementor-21172\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-61484b6e elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"61484b6e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;9409e5c&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7be6c682\" data-id=\"7be6c682\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62e27ce3 elementor-widget elementor-widget-text-editor\" data-id=\"62e27ce3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Safetica<\/strong><br \/>Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have &#8211; affordably, and without any additional IT administration or disruptions in operation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Data breaches are a common phenomenon in the world of d [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[450,488,61],"tags":[451,489],"class_list":["post-43838","post","type-post","status-publish","format-standard","hentry","category-safetica","category-488","category-press-release","tag-safetica","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Top 5 Biggest Data Leaks in 2021 - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/en\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Top 5 Biggest Data Leaks in 2021 - Version 2\" \/>\n<meta property=\"og:description\" content=\"Data breaches are a common phenomenon in the world of d [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/en\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-09T01:43:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-08T06:35:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/02\\\/the-top-5-biggest-data-leaks-in-2021\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/02\\\/the-top-5-biggest-data-leaks-in-2021\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"The Top 5 Biggest Data Leaks in 2021\",\"datePublished\":\"2022-02-09T01:43:09+00:00\",\"dateModified\":\"2022-03-08T06:35:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/02\\\/the-top-5-biggest-data-leaks-in-2021\\\/\"},\"wordCount\":714,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"Safetica\",\"2022\"],\"articleSection\":[\"Safetica\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/02\\\/the-top-5-biggest-data-leaks-in-2021\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/2022\\\/02\\\/the-top-5-biggest-data-leaks-in-2021\\\/\",\"name\":\"The Top 5 Biggest Data Leaks in 2021 - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2022-02-09T01:43:09+00:00\",\"dateModified\":\"2022-03-08T06:35:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/02\\\/the-top-5-biggest-data-leaks-in-2021\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/2022\\\/02\\\/the-top-5-biggest-data-leaks-in-2021\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/02\\\/the-top-5-biggest-data-leaks-in-2021\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Top 5 Biggest Data Leaks in 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Top 5 Biggest Data Leaks in 2021 - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/en\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/","og_locale":"en_US","og_type":"article","og_title":"The Top 5 Biggest Data Leaks in 2021 - Version 2","og_description":"Data breaches are a common phenomenon in the world of d [&hellip;]","og_url":"https:\/\/version-2.com\/en\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/","og_site_name":"Version 2","article_published_time":"2022-02-09T01:43:09+00:00","article_modified_time":"2022-03-08T06:35:25+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"The Top 5 Biggest Data Leaks in 2021","datePublished":"2022-02-09T01:43:09+00:00","dateModified":"2022-03-08T06:35:25+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/"},"wordCount":714,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["Safetica","2022"],"articleSection":["Safetica","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/","url":"https:\/\/version-2.com\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/","name":"The Top 5 Biggest Data Leaks in 2021 - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2022-02-09T01:43:09+00:00","dateModified":"2022-03-08T06:35:25+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/2022\/02\/the-top-5-biggest-data-leaks-in-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The Top 5 Biggest Data Leaks in 2021"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-bp4","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/43838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=43838"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/43838\/revisions"}],"predecessor-version":[{"id":43842,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/43838\/revisions\/43842"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=43838"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=43838"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=43838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}