The “Data Breach” is Shaking the IT Companys.

Mohammed Asif Ali
2 min readJan 10, 2021


A data breach involves the release of sensitive information. Many types of online attacks have a primary goal of causing a data breach to release information such as login credentials and personal financial data.

Millions of people are affected by data breaches every year, and they can range in scope from a doctor accidentally looking at the wrong patient’s chart, to a large-scale attempt to access government computers to uncover sensitive information.

Debit and credit card data of around 10 crore individuals in the country was breached over the past week. From digital payments gateway JusPay, which processes payments for Swiggy, Amazon, etc, to sites such as WedMeGood and ClickIndia, servers of several firms saw a data breach. Online grocer BigBasket too, suffered a data breach that could have potentially exposed confidential financial data of over 2 crore users. And these are just a few of the several data breaches that have happened over the past year.

With financial transactions increasingly moving digital, keeping our financial data safe online becomes increasingly important.

For starters, it is important to always exercise some basic caution as not clicking on fishy links or images or giving out sensitive information to anyone. Be careful of what personal data you provide on social networks and avoid sharing personal contact details online. Do not provide your bank details on any link or forms.

There are factors that can increase or decrease the chances of a data breach. Factors that decrease your changes are insurance protection, having an appointed CISO, extensive use of encryption, having an incident response team, and employing security automation technologies. Factors that increase your chance for a data breach? Lost or stolen devices, compliance failures, undocumented security procedures, among others.

Protecting your firm now is well worth the preventative effort and investment it takes.

we recommend these five administrative tools:

1.Conduct regular user training

2.Conduct extensive due diligence on 3rd party vendors

3.Hire dedicated security officer(s)

4.Employ and enforce BYOD policies

5.Enforce password policies.

And these 5 technical tools:

  • Utilize security automation technologies
  • Employ an incident response team
  • Perform regular penetration testing
  • Always patch and update your systems
  • Implement internet whitelisting



Mohammed Asif Ali

A Computer Science Student in Osmania University.Passionate in developing websites and blogs. And curious about latest technology.