{"id":60913,"date":"2022-12-30T11:46:07","date_gmt":"2022-12-30T03:46:07","guid":{"rendered":"https:\/\/version-2.com\/?p=60913"},"modified":"2022-12-30T11:47:38","modified_gmt":"2022-12-30T03:47:38","slug":"the-top-5-data-security-breaches-of-2022-and-how-to-avoid-them","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/12\/the-top-5-data-security-breaches-of-2022-and-how-to-avoid-them\/","title":{"rendered":"The Top 5 Data Security Breaches of 2022 (and How to Avoid Them)"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"60913\" class=\"elementor elementor-60913\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<article class=\"is-type-body-default is-important\"><p>Today\u2019s leading organizations use <a href=\"https:\/\/jumpcloud.com\/blog\/data-privacy-laws-smes\">personal data<\/a> to create eerily accurate insights into user behaviors, preferences, and conversations. While the primary goal is often to improve customer experience, the stakes are higher when sensitive or confidential information is involved.&nbsp;<\/p> <p>Malicious actors are always on the hunt for fresh exploitation opportunities; one might even say data is the new oil in terms of espionage! User credentials, medical records, and financial information have all come under attack in recent years,<a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\"> leading to millions of dollars in costs<\/a>.&nbsp;<\/p> <p>This article will highlight the most prominent high-profile data security breaches of 2022. In it, we\u2019ll also share how each organization responded with the intention of learning from their experiences. Let\u2019s get started:&nbsp;<\/p> <h2>5 Lessons Learned From 2022\u2019s Biggest Security Breaches<\/h2> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"384\" src=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/confidential.jpeg\" alt=\"confidential data screen\" srcset=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/confidential.jpeg 512w, https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/confidential-300x225.jpeg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" class=\"wp-image-72986\"><\/figure> <p>Unfortunately, 2022 was no exception to breach activity.&nbsp;<\/p> <p><a href=\"https:\/\/www.statista.com\/statistics\/1307426\/number-of-data-breaches-worldwide\/\" target=\"_blank\" rel=\"noreferrer noopener\">According to Statista<\/a>, approximately 24 million data records were exposed worldwide during the year\u2019s first three quarters. Has data taken over for oil as the most valuable commodity of the modern age?<\/p> <ol><li>Crypto.com Witnesses Widespread Theft<\/li><\/ol> <p>Crypto.com is a cryptocurrency trading exchange based in Singapore. On the 17th of January 2022, it became the latest (at the time) high-profile victim of <a href=\"https:\/\/www.investopedia.com\/hackers-stole-15m-from-crypto-com-5216480\" target=\"_blank\" rel=\"noreferrer noopener\">hackers targeting crypto wallets<\/a> and making away with customers\u2019 crypto tokens.<\/p> <h4>What Happened?<\/h4> <p>According to an <a href=\"https:\/\/crypto.com\/product-news\/crypto-com-security-report-next-steps\" target=\"_blank\" rel=\"noreferrer noopener\">official report<\/a> from the exchange company, its risk monitoring systems detected transactions from customer accounts that were approved without two-factor authentication (2FA) from the account holders. The attack targeted 500 customers\u2019 accounts and saw the actors steal up to <a href=\"https:\/\/techcrunch.com\/2022\/01\/20\/2fa-compromise-led-to-34m-crypto-com-hack\/\" target=\"_blank\" rel=\"noreferrer noopener\">$33 million worth<\/a> of bitcoin and Ethereum.<\/p> <h4>The Aftermath<\/h4> <p>Crypto.com put its withdrawal services on hold for 14 hours and upgraded to a new 2FA infrastructure. It revoked existing 2FA tokens and required users to create new ones compatible with the new infrastructure.<\/p> <p>The exchange also maintained that it conducted a full-scale audit of its network infrastructure and improved its security posture.<\/p> <p>It also contracted with external security firms to carry out security checks and provide threat intelligence services.<\/p> <p>What about the poor customers whose crypto tokens got filched? Despite initially claiming that \u201c<a href=\"https:\/\/decrypt.co\/90786\/crypto-com-confirms-exchange-lost-nearly-34m-hackers\" target=\"_blank\" rel=\"noreferrer noopener\"><em>No funds were lost<\/em><\/a>,\u201d Crypto.com acknowledged that money had been stolen and reimbursed its customers.<\/p> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"328\" src=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/identity.jpeg\" alt=\"Fingerprint Biometric Authentication Button. Digital Security Concept\" srcset=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/identity.jpeg 512w, https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/identity-300x192.jpeg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" class=\"wp-image-72988\"><\/figure> <h3>2. International Committee of the Red Cross Gets Attacked<\/h3> <p>The Red Cross is a reputable international organization that provides essential medical and humanitarian aid to vulnerable persons worldwide.&nbsp;<\/p> <p>However, in January 2022, they became data insecurity victims after cyberattackers gained entry to their network due to a late patch of their security systems. The attack led to the breach of records of 515,000 vulnerable persons, containing their names, locations, and other personal data.<\/p> <h4>What Happened?<\/h4> <p>The attack on the <a href=\"https:\/\/www.icrc.org\/en\/document\/cyber-attack-icrc-what-we-know\" target=\"_blank\" rel=\"noreferrer noopener\">Red Cross\u2019s servers<\/a> was a deliberate target that featured sophisticated techniques and codes designed to run on specific ICRC servers.<\/p> <p>The cyberattackers gained access to the Red Cross\u2019s network on the 9th of November 2021 through an unpatched vulnerability in an authentication module. Upon gaining entry, they deployed security tools that helped them pose as authorized users and admins.<\/p> <p>From there, the attackers could access the sensitive information they wanted despite the data encryption.<\/p> <p>To date, there\u2019s been no evidence that the information stolen from this attack has been traded or used for illicit purposes. And despite speculation that the responsible actors may be state-sponsored, the identity of the persons behind the attack and their motives is still anyone\u2019s guess.<\/p> <h4>The Aftermath<\/h4> <p>After determining on the 18th of January that their systems had been compromised, the Red Cross worked with security experts to investigate and secure the vulnerability through which the attackers gained entry.<\/p> <p>For a time, the affected systems were taken offline and were only taken back up after several penetration tests had been carried out to prevent reoccurrence.<\/p> <p>The organization also took extensive measures to communicate the breach to those affected.<\/p> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"342\" src=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/work-2.jpeg\" alt=\"Shot of a young businessman looking bored while working at his desk during late night at work\" srcset=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/work-2.jpeg 512w, https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/work-2-300x200.jpeg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" class=\"wp-image-72989\"><\/figure> <h3>3. Whistleblower Reveals Suisse Secrets<\/h3> <p>Switzerland is world-famous for three things: the Alps, staying neutral during conflicts, and banking secrecy laws. The latter forms the background of this data breach incident.<\/p> <p>At its forefront was Credit Suisse, one of the world\u2019s biggest financial institutions, with its clients\u2019 financial details totaling assets worth $108.5 billion being publicly revealed.<\/p> <h4>What Happened?<\/h4> <p>The leak was an intentional attempt by a person or group to expose the bank\u2019s alleged lucrative business of helping clients hide their wealth. Financial details from as far back as the 1940s-2010 were revealed to a network of 163 journalists from 48 media organizations worldwide.<\/p> <p>It is believed that the attack was from an inside threat, as the source was most likely an employee of the bank who gained access through their legitimate credentials.<\/p> <p>Although the bigger story is definitely about<a href=\"https:\/\/www.theguardian.com\/news\/2022\/feb\/20\/credit-suisse-secrets-leak-unmasks-criminals-fraudsters-corrupt-politicians\" target=\"_blank\" rel=\"noreferrer noopener\"> how some of the bank\u2019s clients<\/a> controversially acquired their wealth, there is no shying away from the fact that the data breach itself is a significant concern for the organization\u2019s security integrity.<\/p> <p>This is particularly so when one considers that, as the whistleblower themselves admitted, owning a Swiss bank account is not a crime, and many of the bank\u2019s clients had gotten their wealth through honest means.<\/p> <h4>The Aftermath<\/h4> <p>Credit Suisse <a href=\"https:\/\/www.credit-suisse.com\/about-us-news\/en\/articles\/media-releases\/csg-statement-media-202202.html\" target=\"_blank\" rel=\"noreferrer noopener\">denied any wrongdoing<\/a> and maintained that the information revealed was history taken out of context.<\/p> <p>As for the data breach itself, well, all of the information itself had become publicly available, and, as such, remediation was not really possible.<\/p> <p>What the bank could do, however, was to review and reinforce its internal processes and data security protocols. All of which they, of course, said they did.<\/p> <figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"331\" src=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/server.jpeg\" alt=\"Connection network in dark servers data center room storage systems 3D rendering\" srcset=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/server.jpeg 512w, https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/server-300x194.jpeg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" class=\"wp-image-72990\"><\/figure> <h3>4. The North Face Data Breach<\/h3> <p>The North Face is one of the world\u2019s leading apparel companies and has been supplying outdoor adventurers with everything they need to get out into <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_North_Face#Credential_stuffing_attack\" target=\"_blank\" rel=\"noreferrer noopener\">nature since 1968<\/a>. However, in August 2022, they became one of the companies that fell victim to a data breach.<\/p> <h4>What Happened?<\/h4> <p>The attackers had used credential-stuffing tactics to gain access to about 200,000 customers\u2019 accounts, where they acquired names, emails, billing &amp; shipping addresses, phone numbers, and more. Tellingly though, no financial information was compromised in the attack.<\/p> <p>The public got informed of the data breach <a href=\"https:\/\/www.documentcloud.org\/documents\/22275912-consumer-notification-template-vans_northface_combined-2022?responsive=1&amp;title=1\" target=\"_blank\" rel=\"noreferrer noopener\">through a notification<\/a> the company sent out to customers who may have been affected. In it, they mentioned that the attack was launched on the 26th of July and got detected and blocked on August 11 and 19, respectively.<\/p> <h4>The Aftermath<\/h4> <p>Upon detection, The North Face moved quickly to contain the attack, resetting passwords of all affected accounts and erasing payment card tokens. The company maintained that compromising the payment card tokens did not put the customers at risk, as the information in them is only useful on the North Face\u2019s website. Customers were also encouraged to use new passwords which they hadn\u2019t used in other accounts.<\/p> <h3>5. Toyota Exposed by Contractor Mistake<\/h3> <p>Think all data breaches boil down to malicious intent? Think again.<\/p> <p>Toyota is arguably the biggest name in the automotive industry so we can skip the introductions. In October 2022, <a href=\"https:\/\/www.reuters.com\/technology\/toyota-says-information-about-296000-users-its-t-connect-service-leaked-2022-10-07\/\" target=\"_blank\" rel=\"noreferrer noopener\">Toyota experienced a significant data breach<\/a> due to an error made by a third-party contractor.<\/p> <h4>What Happened?<\/h4> <p>Sometime in 2017, Toyota hired a website development subcontractor for its T-Connect service. The subcontractor then mistakenly posted some of the source code to a GitHub repository that was publicly accessible. This granted third-party access to almost 300,00 persons\u2019 email addresses and customer control numbers.<\/p> <p>This remained in place for five years and was discovered in 2022.<\/p> <h4>The Aftermath<\/h4> <p>As soon as Toyota made the discovery, it immediately changed the access key and made the source code private.<a href=\"https:\/\/global.toyota\/jp\/newsroom\/corporate\/38095972.html\" target=\"_blank\" rel=\"noreferrer noopener\"> It assured customers<\/a> that there was no possibility of data such as names, telephone numbers, or credit cards being compromised as the affected servers held no such information.<\/p> <p>It also urged customers to remain vigilant and watch out for phishing or spoofing attacks. It also set up a <a href=\"https:\/\/toyota.jp\/form\/contact-tconnect\" target=\"_blank\" rel=\"noreferrer noopener\">help center<\/a> where customers can confirm whether their email address was among those that were breached.<\/p> <figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/KUi_7oFdKo08M7Fs2A4qs0lkJI92zWyK-lzvKrlYDKDoVFvZJmnJxhycC9yH1p-HTh1jefbAvpyObyBm83umsjAT3GlCFRQWaZzWRRB1RXhUMpa7zq2he_krN_c3OM6xTQ4MlheUyfDDGVi0fUgjzu-mJUBf36eTRI2ek_kJoV6dVquohjACEpfUYNpR7w\" alt=\"\"><\/figure> <h2>How to Reduce Your Risk of Data Breaches<\/h2> <p>If there\u2019s any lesson the aforementioned events provide, it\u2019s to never be too careful as the data security space can be unpredictable. Data breaches can happen anytime, from insider threats to malicious external actors and even human error.<\/p> <p><strong>Here are a few measures you can take to minimize the risk:<\/strong><\/p> <ul><li>Implement<a href=\"https:\/\/jumpcloud.com\/blog\/totp-mfa\"> multi-factor authentication (MFA)<\/a> systems for all sensitive accounts and services.<\/li><li>Ensure that all software is up to date and patched with the latest security updates.<\/li><li>Restrict employee access to sensitive data and use encryption software whenever possible.<\/li><li>Perform regular security audits and risk assessments to identify any possible weak points in your data security.<\/li><li>Use a reputable cloud provider for all of your data storage needs.<\/li><li>Make sure all passwords are strong, unique, and changed regularly.<\/li><\/ul> <p>Following these measures will help you stay one step ahead of the bad guys and keep your data safe. And as hackers become more sophisticated, we must become even more vigilant and update our security strategies accordingly.<\/p> <h2>Beef Up Security With JumpCloud<\/h2> <p>The JumpCloud Directory Platform boosts IT admin and MSP peace of mind by unifying their most integral security tools in one place. From<a href=\"https:\/\/jumpcloud.com\/platform\/multi-factor-authentication-mfa\" target=\"_blank\" rel=\"noreferrer noopener\"> MFA<\/a> to<a href=\"https:\/\/jumpcloud.com\/platform\/single-sign-on\" target=\"_blank\" rel=\"noreferrer noopener\"> single sign-on (SSO)<\/a> to <a href=\"https:\/\/jumpcloud.com\/blog\/mdm-mobile-device-management\">mobile device management (MDM)<\/a>, JumpCloud provides a comprehensive solution to keep organizational data safe and secure from nefarious hackers.&nbsp;<\/p> <p>It provides time-saving capabilities like automated patch management, wipe and lock, and one-touch deployment that help save time. The best part? Most users saved money after switching to JumpCloud and reduced their IT stacks.&nbsp;Stay steps ahead of making the news for the wrong reasons. <a href=\"https:\/\/console.jumpcloud.com\/signup?email=&amp;first_touch=Non-Paid&amp;first_touch_timestamp=2022-09-05T06:42:17.230Z&amp;jcsgmtuuid=3e98afb0-b055-44b0-b943-254a1f55d8f7\" target=\"_blank\" rel=\"noreferrer noopener\">Sign up for a free trial<\/a> today.<\/p> <div class=\"blog-post-tags m-t-2\"><ul class=\"blog-post-topics-list\"><li class=\"blog-post-topics-list-item\"><a href=\"\/en\/blog\/?topics=best-practices\" class=\"blog-post-topics-list-link is-type-body-default is-important is-type-weight-semi-bold has-text-navy\">Best Practices<\/a><\/li><li class=\"blog-post-topics-list-item\"><a href=\"\/en\/blog\/?topics=news\" class=\"blog-post-topics-list-link is-type-body-default is-important is-type-weight-semi-bold has-text-navy\">News<\/a><\/li><\/ul> <ul class=\"blog-post-collections-list\"><li class=\"blog-post-collections-list-item\"><a href=\"\/en\/blog\/?collections=security\" class=\"blog-post-collections-list-link is-type-body-tiny is-type-weight-semi-bold is-important security\">Security<\/a><\/li><\/ul><\/div><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"57539\" class=\"elementor elementor-57539\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About JumpCloud<\/strong><br \/>At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Today\u2019s leading organizations use personal data to crea [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[488,1016,61],"tags":[489,1017],"class_list":["post-60913","post","type-post","status-publish","format-standard","hentry","category-488","category-jumpcloud","category-press-release","tag-489","tag-jumpcloud"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Top 5 Data Security Breaches of 2022 (and How to Avoid Them) - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Top 5 Data Security Breaches of 2022 (and How to Avoid Them) - Version 2\" \/>\n<meta property=\"og:description\" content=\"Today\u2019s leading organizations use personal data to crea [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-30T03:46:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-30T03:47:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/confidential.jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/biggest-data-security-breaches-2022#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2022\\\/12\\\/the-top-5-data-security-breaches-of-2022-and-how-to-avoid-them\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"The Top 5 Data Security Breaches of 2022 (and How to Avoid Them)\",\"datePublished\":\"2022-12-30T03:46:07+00:00\",\"dateModified\":\"2022-12-30T03:47:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2022\\\/12\\\/the-top-5-data-security-breaches-of-2022-and-how-to-avoid-them\\\/\"},\"wordCount\":1605,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/biggest-data-security-breaches-2022#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jumpcloud.com\\\/\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/confidential.jpeg\",\"keywords\":[\"2022\",\"JumpCloud\"],\"articleSection\":[\"2022\",\"JumpCloud\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2022\\\/12\\\/the-top-5-data-security-breaches-of-2022-and-how-to-avoid-them\\\/\",\"url\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/biggest-data-security-breaches-2022\",\"name\":\"The Top 5 Data Security Breaches of 2022 (and How to Avoid Them) - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/biggest-data-security-breaches-2022#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/biggest-data-security-breaches-2022#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jumpcloud.com\\\/\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/confidential.jpeg\",\"datePublished\":\"2022-12-30T03:46:07+00:00\",\"dateModified\":\"2022-12-30T03:47:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/biggest-data-security-breaches-2022#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/biggest-data-security-breaches-2022\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/biggest-data-security-breaches-2022#primaryimage\",\"url\":\"https:\\\/\\\/jumpcloud.com\\\/\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/confidential.jpeg\",\"contentUrl\":\"https:\\\/\\\/jumpcloud.com\\\/\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/confidential.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/biggest-data-security-breaches-2022#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Top 5 Data Security Breaches of 2022 (and How to Avoid Them)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Top 5 Data Security Breaches of 2022 (and How to Avoid Them) - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022","og_locale":"en_US","og_type":"article","og_title":"The Top 5 Data Security Breaches of 2022 (and How to Avoid Them) - Version 2","og_description":"Today\u2019s leading organizations use personal data to crea [&hellip;]","og_url":"https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022","og_site_name":"Version 2","article_published_time":"2022-12-30T03:46:07+00:00","article_modified_time":"2022-12-30T03:47:38+00:00","og_image":[{"url":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/confidential.jpeg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2022\/12\/the-top-5-data-security-breaches-of-2022-and-how-to-avoid-them\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"The Top 5 Data Security Breaches of 2022 (and How to Avoid Them)","datePublished":"2022-12-30T03:46:07+00:00","dateModified":"2022-12-30T03:47:38+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2022\/12\/the-top-5-data-security-breaches-of-2022-and-how-to-avoid-them\/"},"wordCount":1605,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/confidential.jpeg","keywords":["2022","JumpCloud"],"articleSection":["2022","JumpCloud","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2022\/12\/the-top-5-data-security-breaches-of-2022-and-how-to-avoid-them\/","url":"https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022","name":"The Top 5 Data Security Breaches of 2022 (and How to Avoid Them) - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/confidential.jpeg","datePublished":"2022-12-30T03:46:07+00:00","dateModified":"2022-12-30T03:47:38+00:00","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022#primaryimage","url":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/confidential.jpeg","contentUrl":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/12\/confidential.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/biggest-data-security-breaches-2022#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The Top 5 Data Security Breaches of 2022 (and How to Avoid Them)"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-fQt","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/60913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=60913"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/60913\/revisions"}],"predecessor-version":[{"id":60920,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/60913\/revisions\/60920"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=60913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=60913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=60913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}