Common causes of breaches typically include human mistakes, technical weaknesses, and malicious attacks.
Most common causes
- Phishing and social engineering, where attackers trick users into revealing credentials or clicking malicious links.
- Weak or stolen passwords, including reused, simple, or shared credentials that are easy to guess or capture.
- Unpatched software and known vulnerabilities in applications, operating systems, or devices that are not updated promptly.
- Malware and ransomware that infiltrate systems to steal, encrypt, or exfiltrate data.
- Insider threats, both accidental (human error, misdirected emails, misconfigurations) and malicious (abuse of access).
- Third‑party or vendor breaches, where partners with network or data access are compromised.
Quick check approach
When given options on an exam or checklist, the items that usually qualify as common causes are:
- Phishing/social engineering and malware.
- Weak passwords or stolen credentials.
- Unpatched or vulnerable systems and applications.
- Insider mistakes or misuse, including misconfiguration and sending data to the wrong recipient.
