Data Breaches
What is an Incident Response Plan?
An incident response plan is a set of written instructions that outline your organization's response to data breaches, data leaks, and cyber attacks.
Read more
The Amex Partner Data Breach and Downstream Liability
Learn more about the recent American Express data breach notification and what it means for cardholders worldwide.
Read more
What is Sensitive Data?
Sensitive data is information that must be protected against unauthorized access.
Read more
What are Indicators of Compromise (IOCs)?
Indicators of compromise (IOCs) are pieces of forensic data, such as system log entries, system files or network traffic that identify malicious activity.
Read more
What is a Data Breach?
A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.
Read more
How to Fix The Top 10 Critical CVEs That Can Lead To A Data Breaches
Learn more about how to fix these top 10 CVEs that commonly lead to data breaches.
Read more
What is Data Security?
Data security is the process of protecting sensitive data from unauthorized access and corruption throughout its lifecycle.
Read more
Data Leaks and the Deep Web: Swimming in the Deep End
The deep web makes up 95-99% of the entire internet. The dark web makes up less than 1%. UpGuard explores how deep web assets can lead to data exposure.
Read more
The 72 Biggest Data Breaches of All Time [Updated 2024]
Our updated list for 2023 ranks the 72 biggest data breaches of all time, ranked by impact. Learn from their mistakes to avoid costly damages.
Read more
116 Must-Know Data Breach Statistics for 2023
116 data breach statistics that cover risk, cost, prevention, industry trends, and more. Assess and analyze these stats and learn to prevent data breaches.
Read more
9 Ways to Prevent Third-Party Data Breaches in 2024
This is a complete guide to preventing third-party data breaches. Learn about how organizations like yours are keeping themselves and their customers safe.
Read more
Spotify Resets User Passwords to Protect Against Third Party Data Breaches
The LinkedIn data breach compromised hundreds of thousands of passwords, leaving accounts wide open across numerous sites. Spotify took action.
Read more
What is the Cost of a Data Breach in 2023?
Learn about the global costs of a data breach and how to implement the right defenses to protect your business.
Read more
What is Protected Health Information (PHI)?
Protected health information (PHI) is any information about health status, provision of health care or payment for health care that is created or collected
Read more
What is Defense in Depth?
Defense in depth is a cyber security strategy that uses a series of layered, redundant defensive measures to protect sensitive data, PII and other assets.
Read more
What Are Cloud Leaks?
Cloud leaks are a unique risk facing businesses that store data in the cloud or use vendors who do. And they're caused by misconfigurations, not hackers.
Read more
Sign up for our newsletter
Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities