• Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
  • Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
HBS logo
HBS Logo
  • Infrastructure
    • CLOUD

      • Cloud Solutions
      • Public Cloud
      • Hybrid Cloud
      • Infrastructure as a Service
      • Cloud Security Solutions
      • Backup, Replication and Disaster Recovery
      • HBS Cloud Hosting Services

      DATA CENTER

      • Data Center Solutions
      • Traditional Data Center
      • Hyperconverged
      • Colocation
      • Directory Services
      • Cloud Email and Calendar Solutions

      NETWORK AND ACCESS

      • Network Infrastructure
      • Enterprise Mobility
      • Wireless Solutions
      • SD-WAN
      • Structured Cabling
      • Staff Augmentation
  • Managed Services
    • MANAGED ONE

      • Managed One Overview
      • Managed Backup and Disaster Recovery
      • Managed Email and Collaboration Security
      • Managed Firewall

       

      • Managed HaaS and SaaS
      • Managed IT Help Desk
      • Managed Network and Server Monitoring

      HBS + PARTNER SOLUTIONS

      • HBS Secure with Verkada
      • HBS Collaborate with Webex
      • Managed XDR
      HBS Managed One Megamenu Graphic
  • Modern Workplace
    • MICROSOFT

      • Microsoft Licensing Management
      • Microsoft Modern Workplace
      • Microsoft Fabric

       

      • Dynamics 365 Business Central
      • Dynamics 365
      • Dynamics GP

      COLLABORATION

      • Audio Visual
      • Unified Communication Solutions
      • HBS Collaborate with Webex
  • Professional Services
    • ADVISORY

      • Virtual CISO
      • Virtual CIO
      • Project Management
      • IT Business Consulting

      ENGINEERING SERVICES

      • Staff Augmentation

      AI & ANALYTICS

      • Artificial Intelligence
      • AI Advance
      • AI Predict
      • AI Assist
      • Data Management and Analytics
      • Microsoft Fabric

      APPLICATION INNOVATION

      • Website Development
      • Application Development

      DOCUMENT MANAGEMENT

      • Document Management Services
      • Document and Check Scanners
  • Security
    • CYBERSECURITY

      • Managed XDR
      • Penetration Testing
      • Vulnerability Scanning
      • Email Security Services
      • Digital Forensics and Incident Response
      • Backup, Replication and Disaster Recovery
      • Firewalls
      • Cloud Security Solutions

       

      • Virtual CISO
      • Virtual Security Team
      • Virtual Security Engineer
      • Cybersecurity Risk Assessment
      • Governance and Compliance
      • SOC 2
      • CMMC
      • Managed Security Awareness Training

      PHYSICAL SECURITY

      • Security Solutions
      • HBS Secure with Verkada
      Cybersecurity Risk Assessment Megamenu Graphic
  • Search
Contact Us
Blog

Avoid Data Breaches in 2024: Key Takeaways from Some of 2023’s Biggest Cyberattacks

  • December 28, 2023
data breaches

According to Juniper Research, the cost of data breaches will rise from $3 trillion each year to over $5 trillion in 2024. That’s an average annual growth of 11%.

And as we step into 2024, the digital landscape continues to evolve rapidly, bringing both opportunities and challenges in cybersecurity. This past year, we witnessed some of the most significant cyberattacks in history, offering valuable lessons for all of us as we look to next year and how to prevent similar data breaches.

This article delves into seven major cyber incidents from 2023, extracting critical takeaways to help avoid data breaches and strengthen cybersecurity defenses in the coming years.

Critical Takeaways

  1. Royal Mail Ransomware Attack: Demonstrated the need for prioritizing endpoint security and individual employee loginsto mitigate ransomware threats.
  1. Okta’s Employee Data Breach: Highlighted the importance of separating personal and professional data on work devices to prevent unauthorized access.
  1. 23andMe Credential Stuffing Incident: Stressed the significance of unique passwords, multi-factor authentication, and web application protection to defend against credential stuffing attacks.
  1. MOVEit File Transfer Tool Breach: Emphasized the necessity of comprehensive security assessments, patch management, strong access controls, and employee training in safeguarding file transfer infrastructures.
  1. Discord.io Website Vulnerability: Underlined the importance of robust firewalls, secure password policies, SSL encryption, and diligent admin user scrutiny to protect websites from cyberattacks.
  1. Activision Smishing Attack: Showcased the dangers of smishing and the need for caution with text links, regular phone OS updates, and skepticism towards texts requesting personal information.
  1. MailChimp’s Social Engineering Attacks: Revealed the critical role of vigilance in verifying communication sources, assessing information authenticity, and employing effective spam filters to counter social engineering.

Royal Mail Ransomware Attack

In January 2023, the British postal service company was hit by a ransomware attack that was attributed to a LockBit affiliate. This attack led to significant disruptions in international services. The ransomware actors demanded around $80 million to prevent the release of stolen data. Despite Royal Mail’s mature security program, issues like understaffing and lack of experience in system hardening against ransomware threats were evident.

Keys to Prevent:

  • Prioritize Endpoint Security: Endpoint security safeguards networks connected to devices like laptops, tablets, and mobile devices. It’s a crucial part of any cybersecurity strategy.
  • Separate Personal Accounts for Employees: Each employee should have unique logins for different software and applications. Shared credentials increase security risks. Providing individual logins reduces the attack surface, enhancing security and usability.

Okta Employee Signs into Personal Account on a Company Laptop

In one of the most glaring examples of any organization being vulnerable to a data breach, Okta, a company whose entire business is built around identity management and security, was breached.

The cyberattack on Okta involved unauthorized access to its customer support system. This access was gained through a service account that was stored within the system and had permission to view and update customer support cases.

Okta’s investigation revealed that an employee, using an Okta-managed laptop, had logged into their personal Google profile on Chrome. The username and password for the service account were saved in the employee’s personal Google account, which led to the security breach.

Key to Prevent:

  • Consider barring employees from accessing personal information on work computers and vice versa.This separation of personal and professional accounts and data can significantly reduce the risk of sensitive information being compromised through personal accounts. Organizations can better secure their critical systems and data by enforcing strict policies that separate personal and work-related activities on company-managed devices.

23andMe Falls Prey to Credential Stuffing

The attack on 23andMe involved credential stuffing, where attackers used pre-collected login credentials from other organizations to access user accounts, leading to potential identity theft and financial fraud.

Keys to Prevent:

  • Use Unique Passwords for Each Service: Encourage users to create unique passwords for every account. This can be managed easily with the help of a password manager or by creating personal “encryption rules” for password generation.
  • Implement Web Application and API Protection (WAAP): Invest in a reliable WAAP solution to detect abnormal traffic and suspicious login attempts, which is crucial in defending against automated attacks like credential stuffing.
  • Limit Authentication Requests and Set Up Failed Request Alerts: Limit the number of failed login attempts by various criteria (IP address, location, device, timeframe) and alert users of failed attempts. This can slow down attackers and inform users of potential breaches.
  • Use Multi-Factor Authentication (MFA): Implement MFA, requiring additional information beyond passwords for login. This could be knowledge-based (security questions), possession-based (one-time codes sent to a phone), or biometric (fingerprint or facial recognition).
  • Screen for Leaked Credentials:Use tools to check user credentials against databases of known compromised credentials. Services like HaveIBeenPwned.com can help service providers and end-users identify if their credentials have been part of a data breach.

FREE WEBINAR One attack changed everything. Hear firsthand how a school district faced the worst-case scenario—a devastating ransomware attack with major disruptions. Learn what worked, what didn't and how you can strengthen your defenses.   

File Transfer Tool MoveIt Breach Affected Over 2,000 Organizations

The attack on MOVEit, a file transfer program used by various organizations, was carried out by a hacker group called CL0P in May 2023. They exploited three vulnerabilities, including a zero-day vulnerability, resulting in escalated privileges and unauthorized data access. Affected entities included the NYC public school system, Sony, British Airways, BBC, and the Ontario Birth Registry.

Keys to Prevent:

  • Comprehensive Security Assessments: Regular security assessments and penetration testing should be conducted to identify vulnerabilities in the MFT infrastructure.
  • Patch Management and Updates: Implement a robust patch management process to address known vulnerabilities promptly. Ensure all software components are up to date.
  • Access Controls and Authentication: Enforce strict access controls and role-based permissions. Implement multi-factor authentication to enhance security.
  • Encryption and Security Protocols: Use strong encryption algorithms for data in transit and at rest. Employ secure file-transfer protocols like SFTP or FTPS.
  • Employee Awareness and Training: Conduct regular security training for employees and promote a culture of cybersecurity awareness within the organization.
  • Backup and Disaster Recovery: Regularly back up critical data and maintain an effective disaster recovery plan for business continuity in case of an attack.
  • Managed Detection and Response Service: Implement an MDR service for additional layers of detection, investigation, and response to abnormal activities and attempts at lateral movement.

Discord.io Shuts Down Following Website Vulnerability

The attack against Discord.io, a third-party site that allowed Discord users to create personal invites, occurred on August 14. A hacker exploited a vulnerability in the website’s code, gaining access to the company’s database. The hacker downloaded the entire database and subsequently put it up for sale on Breached Forums, a notorious hacking site. Discord.io was forced to shut down all business operations and no longer exists.

Keys to Prevent:

  • Install a Good Firewall: A robust firewall acts as the first line of defense against cyber threats, monitoring incoming and outgoing network traffic based on security rules.
  • Strong Password Policy and Password Manager: Implement a firm password policy that requires complex passwords. Use a password manager to store and manage these passwords securely.
  • Install SSL and Use HTTPS: Secure your website with SSL (Secure Sockets Layer) to encrypt data transferred between the user and the server. Ensure that HTTPS, which uses SSL, is enabled for your website.
  • Scrutinize Admin Users Carefully: Admin accounts have extensive access and control. It’s crucial to vet individuals who are given admin privileges thoroughly.
  • Use an Activity Log: Keep an activity log to monitor and record actions taken on your website. This can help detect unusual activities early and trace actions in case of a breach.

Smishing Attack Exposes Activision

The attack against Activision was an SMS phishing (smishing) attack targeting a privileged user on the network. Hackers managed to steal employee information such as full names, emails, phone numbers, salaries, workplace addresses, and details about upcoming Call of Duty games.

Keys to Prevent:

  • Avoid Clicking Suspicious Links in Texts: Be cautious about hyperlinks in texts, especially from unknown or suspicious numbers. Cybercriminals often use shortened URLs in SMS messages to disguise fake URLs.
  • Do Not Respond to Unknown or Suspicious Texts: Responding to such texts can confirm to scammers that your number is active, potentially leading to more spam and harassment.
  • Keep Phone’s Operating System Updated: Regular updates can protect against malware hidden in smishing links.
  • Be Skeptical of Texts Requesting Personal Information: Legitimate organizations, including government agencies and reputable companies, will not ask for sensitive details via text. Verify any such requests through a trusted channel.

Social Engineering Sinks MailChimp for the Third Time

The attack on Mailchimp on January 18 was the result of social engineering, marking the third such attack within a year. Social engineering exploits human traits like curiosity, respect for authority, and the desire to help. 

Keys to Prevent:

  • Check the Source: Always verify the origin of communications. Be skeptical of unexpected emails, phone calls, or physical items like USB sticks. Scrutinize email headers, check link destinations without clicking, and look for spelling errors.
  • Assess the Information They Have: Legitimate entities like banks should have your personal details. Be cautious if the caller or sender lacks information they should already have.
  • Break the Loop of Urgency: Social engineering relies on creating a sense of urgency. Take time to think and verify the authenticity through official channels, like ringing the official number or visiting the official website.
  • Ask for ID: In physical interactions, always ask for identification, especially if someone requests access to secure areas or information.
  • Use a Good Spam Filter: Adjust your email program’s settings to ensure effective spam filtering. Look for filters that detect suspicious files, links, and content.
  • Evaluate Realism: Assess the plausibility of the situation. Consider if the scenario presented makes sense, like unexpected inheritances or friends in unlikely emergencies.

Lessons Learned from 2023 Data Breaches

2023 featured a series of significant cyber incidents, highlighting the continuous evolution and complexity of cybersecurity challenges. As we move into 2024, it is imperative to learn from these events to bolster our defenses against future threats.

We have provided an in-depth analysis of seven major cyberattacks from 2023, each presenting unique lessons and strategies for enhancing cybersecurity measures. These incidents collectively underline the ever-evolving nature of cyber threats and the necessity for ongoing vigilance, education, and advanced security measures.

HBS provides cybersecurity solutions that keep your network secure and protected from threats by detecting and responding to threats quickly while preventing others completely. Contact HBS today and get connected with our cybersecurity experts.

Related Content

Blog header image with the text "What 2024's Cyberattacks Taught Us" emphasizing lessons learned from 2024 cyberattacks for improved cybersecurity.

Learning from 2024’s Cyberattacks to Secure Your 2025

Explore lessons from 2024’s most significant cyberattacks. Learn how to strengthen your defenses with actionable insights and prepare for a safer 2025.

Learn More »
Image of Locks on a Blue Background

9 Tips for Preventing Ransomware

Have all the ransomware headlines convinced you it’s time to strengthen your defenses? We have the tips to help you prevent ransomware.

Explore More »
managed data backup

Data Security Services: Why Managed Backup Is a Must for Modern Businesses

Discover what managed backup does for modern businesses. Ensure data safety, efficiency, and focus on core business goals with expert data security services.

Read More »
  • Cybersecurity, IT Leadership, Phishing, Ransomware, Security Awareness
Blog

Connect:

[email protected]  |  800.236.7914

HBS logo

HQ | 1700 Stephen Street
Little Chute, WI 54140
Locations

HBS Remote Support | Service & Technical Support | E-Bill Portal
Terms & Conditions | Cookie Policy | Privacy Policy | Onboarding Form | End User Agreements | E-Bill FAQ | Site Map
©2026 Heartland Business Systems. All rights reserved.

Halo from HBS
This chat may be recorded as described in our Privacy Policy.