Anyone can become a victim of a data breach

More and more often we hear that data has been leaked, even during new customer conversations the example comes up. Last week the personal data authority published the following message including the annual report. We thought this was important to share with you.

Assume that some of your personal data has already been leaked, or is about to be. Therefore, make work of protecting your personal data. That is the central message in the annual data breach report of the Personal Data Authority (AP).

Every year, the AP provides an overview of the most important facts, figures and trends regarding data breaches in the Netherlands. This overview is known as the data breach report. The report for calendar year 2022 is now available.

Scams

The AP again received a large number of data breach reports in 2022, totaling 21,151. More than 1,800 leaks were the result of cyber attacks, which are especially dangerous. Cyber criminals use captured data, such as e-mail addresses, names and other personal information, for example, to scam large groups of people and organizations with fake messages that appear to come from trusted agencies.

‘Data leaks are unfortunately an ongoing phenomenon. And given their nature and scope, the AP advises everyone to take seriously into account that some of your data has already been leaked, or is about to be leaked,’ said AP chairman Aleid Wolfsen.

5 years of data breaches

In its latest data breach report, the AP also takes stock of the past 5 years. In 2018, the General Data Protection Regulation (GDPR) was introduced, with the AP as the
regulatory body. Since then, the AP received a total of more than 114,000 data breach reports, of which more than 6,500 were the result of cyberattacks. A trend that the AP sees: although the number of data breach notifications per year remains about the same level, the number of victims is very likely to increase. Cyber attacks in particular can affect many people at once. The 3 largest data breaches in the healthcare sector in 2022, for example, put the medical data of some 900,000 people on the street.

Wolfsen: ‘This overview makes it abundantly clear that data breaches are a persistent problem. All the more reason for the AP to warn about the dangers of data breaches, and to urge everyone to take seriously the protection of personal data. You too can become a victim, even though you may not think so.’

Practical Tips

The Year 2022 data breach report contains concrete examples of people who have been victims themselves. To help people get started in protecting their data, the report also offers practical tips. These are both about what people can do to prevent damage and about actions you can take if your data has already been leaked.

In addition, the report explains what people can expect from organizations if personal data has been leaked through an organization, such as because it has been hit by a cyberattack. For example, there may be the possibility of seeking compensation. The AP also continues to remind organizations of their responsibilities when they use people's personal data.

‘The AP hopes people will be better armed with these tips,’ Wolfsen said. ‘The digital world we live in offers us all numerous benefits, but we must also be vigilant.’

https://autoriteitpersoonsgegevens.nl/actueel/iedereen-kan-slachtoffer-worden-van-een-datalek

Recent blogs

kwantumcomputers
Blog
What are quantum computers? And why is everyone suddenly talking about them?
Chances are you've been hearing more and more about quantum computers in recent months. In the news, on LinkedIn, or perhaps even during conversations about AI and cybersecurity. Especially now that a Dutch chip developer is gaining global attention with a new generation of quantum chips, the technology suddenly seems closer than ever. But what exactly is a quantum computer? And why is so much expected of it? From Ordinary Computer to Quantum Computer To understand quantum computers, it's helpful to first look at how a normal computer works. A traditional computer — like your laptop or server — works with bits. A…
frankberry
Blog
With our feet in the mud
Here we are. Not quite recognizable anymore, thanks to AI trying to protect children. Understandable, of course. But believe us: these really are Berry and Frank. More than ten years apart, but in reality, we've always been brothers from another mother. And what do we have in common? A lot... and at the same time, almost nothing. Berry is often the good cop. Calm, down-to-earth, and always working to get things done. I'm usually the bad cop. Direct, critical, and always looking for ways to improve. But that combination is precisely what works. What completely unites us, though, is our love for...
Macadmins Leiden
Blog
MacAdmins Meeting: What's relevant for your organization?
Last week, we attended the MacAdmins Meeting in Leiden. It's a gathering focused on Apple administration, security, and innovation. What stood out? Developments are moving fast. But more importantly: they are becoming increasingly relevant for SMEs. We'd like to share the key insights with you. What's happening? And what does that mean for your organization? Running AI Locally: Control Over Data and Costs AI is now everywhere. But one question remains central: where does your data reside? A significant topic during the meeting was running AI models (LLMs) locally. Instead of relying on external cloud platforms, more and more...

A newsletter

Superlogic right?