A Single Stolen Password Cost One Company $3.86 Million

That's the average cost of a data breach in 2020, according to IBM's Cost of a Data Breach Report. And in nearly every major data breach example from recent years, the root cause wasn't some sophisticated zero-day exploit. It was a human mistake — a clicked phishing link, a reused password, a misconfigured cloud bucket left open to the internet.

If you're searching for data breach examples to understand what went wrong and how to prevent it, you're asking the right question. I've spent years studying these incidents, and the patterns are disturbingly consistent. The threat actors change. The techniques barely do.

This post breaks down real breaches, what actually failed, and the specific steps your organization can take right now to avoid becoming the next case study.

The Marriott Breach: 383 Million Records and a Four-Year Dwell Time

In 2018, Marriott International disclosed that attackers had been inside the Starwood guest reservation system since 2014. Four years. The breach exposed up to 383 million guest records, including passport numbers and encrypted credit card data.

The root cause? Marriott inherited the compromised Starwood network during an acquisition and didn't detect the existing intrusion. The attackers used Remote Access Trojans (RATs) and credential theft tools like Mimikatz to move laterally through the environment undetected.

What This Teaches Your Organization

Mergers and acquisitions are a massive blind spot. If you're inheriting another company's IT infrastructure, assume it's compromised until you prove otherwise. Marriott's breach is one of the most cited data breach examples in the industry because it illustrates how long a threat actor can lurk when detection capabilities are weak.

Zero trust architecture — the principle of "never trust, always verify" — would have limited lateral movement significantly. If your security model still relies on a hard perimeter and implicit internal trust, you're running the same playbook that failed Marriott.

Capital One: A Misconfigured Firewall and 106 Million Records

In July 2019, Capital One disclosed that a former cloud services employee exploited a misconfigured web application firewall to access over 106 million customer records stored in AWS. The attacker, Paige Thompson, used a Server Side Request Forgery (SSRF) technique to extract credentials from the cloud instance metadata service.

Capital One had actually invested heavily in cloud security. They weren't negligent — they had a specific misconfiguration that one knowledgeable insider knew how to exploit.

Cloud Doesn't Mean Secure by Default

This breach shattered the assumption that moving to the cloud automatically improves security. Your cloud provider secures the infrastructure. You secure the configuration. That shared responsibility model trips up organizations constantly.

If your team manages cloud resources, they need specific training on secure configuration. A cybersecurity awareness training program should cover cloud security basics for every employee who touches infrastructure — not just the security team.

The SolarWinds Supply Chain Attack: Trust as a Weapon

In December 2020, FireEye disclosed that it had been breached — and traced the intrusion to a compromised software update from SolarWinds, a widely used IT management platform. The attackers — attributed to a Russian intelligence service — inserted a backdoor called SUNBURST into SolarWinds' Orion software updates. Up to 18,000 organizations installed the compromised update.

Victims included the U.S. Treasury, the Department of Homeland Security, and multiple Fortune 500 companies. This is still unfolding as I write this in January 2021, and it may be the most consequential data breach example of our era.

Why Supply Chain Attacks Change Everything

SolarWinds proved that your security is only as strong as your most trusted vendor's security. The threat actors didn't need to phish a single employee at Treasury. They compromised the software those employees trusted implicitly.

This is social engineering at the macro level — exploiting trust in a supply chain rather than trust in an email. CISA has published extensive guidance on this attack at cisa.gov, and every security team should be reviewing it.

Twitter 2020: Social Engineering Bypassed Every Technical Control

In July 2020, attackers compromised high-profile Twitter accounts — Barack Obama, Elon Musk, Apple, Joe Biden — and used them to promote a Bitcoin scam. The attackers didn't exploit a software vulnerability. They called Twitter employees, posed as internal IT staff, and convinced them to provide access to internal admin tools.

A 17-year-old from Florida orchestrated the attack. The total Bitcoin haul was roughly $120,000. The reputational damage to Twitter was incalculable.

Phone-Based Social Engineering Is Exploding

I've seen a sharp increase in vishing (voice phishing) attacks targeting employees who work from home. The shift to remote work in 2020 made these attacks easier — employees are isolated, harder to verify callers through a quick desk-side check, and more likely to comply with urgent-sounding requests.

Your phishing awareness training for organizations needs to extend beyond email. If your employees can't recognize a social engineering attempt over the phone, you have a gap that no firewall will close.

Equifax: The $575 Million Lesson in Patch Management

The 2017 Equifax breach exposed the personal data of 147 million Americans. The attack vector was a known vulnerability in Apache Struts (CVE-2017-5638) that Equifax failed to patch for over two months after a fix was available.

In July 2019, the FTC announced a settlement requiring Equifax to pay up to $575 million — one of the largest data breach settlements in history. You can review the FTC's enforcement action at ftc.gov.

Patching Isn't Glamorous. It's Survival.

Every security professional knows patching is critical. And yet, the Verizon 2020 Data Breach Investigations Report found that exploitation of vulnerabilities remains a top attack vector, with many breaches involving flaws that had patches available for months or years. You can access the full DBIR at enterprise.verizon.com.

If your organization doesn't have a documented, enforced patch management policy with SLAs for critical vulnerabilities, you're running the same risk Equifax did. The difference is you've now seen what happens.

What Do All These Data Breach Examples Have in Common?

I've reviewed hundreds of breach reports. Here's the pattern that emerges from every major data breach example:

  • Human error or social engineering is involved in the vast majority of breaches. The Verizon DBIR consistently puts this figure above 80% when you combine phishing, credential theft, and misconfiguration.
  • Detection takes too long. The average time to identify a breach in 2020 was 207 days, according to IBM. Marriott's was over 1,400 days.
  • Basic controls are missing. Multi-factor authentication, timely patching, network segmentation, and least-privilege access would have prevented or limited most of these incidents.
  • Training gaps are universal. Every one of these breaches involved people who either didn't know what to look for or weren't empowered to act on their suspicion.

How Do You Prevent a Data Breach? Start With People.

This is the question I get most often, and it's the one most likely to land you on this page. Here's the direct answer:

You prevent data breaches by combining technical controls with continuous security awareness training. Multi-factor authentication stops credential theft. Network segmentation limits lateral movement. Phishing simulations train employees to recognize social engineering before they click. Patch management closes known vulnerabilities. Zero trust architecture eliminates implicit trust.

No single tool does it. It's a layered approach, and the human layer is the one most organizations underinvest in.

Ransomware: The Breach That Locks You Out of Your Own Data

Ransomware attacks surged in 2020. Garmin paid a reported $10 million ransom after the WastedLocker ransomware shut down its services for days. Universal Health Services, one of the largest healthcare providers in the U.S., was hit by Ryuk ransomware in September 2020, forcing staff to use paper records across 400 facilities.

The FBI's Internet Crime Complaint Center (IC3) reported a sharp increase in ransomware complaints throughout 2020. The IC3's 2019 annual report documented $8.9 million in reported ransomware losses — a figure widely understood to be a fraction of actual costs. You can access IC3 reports at ic3.gov.

Ransomware Starts With Phishing

Most ransomware enters through phishing emails or compromised remote desktop protocol (RDP) connections. The technical sophistication comes after initial access. The initial access itself is almost always a human mistake.

Running regular phishing simulations is one of the highest-ROI security investments you can make. If you haven't started, explore phishing awareness training built for organizations to see how simulation-based training reduces click rates over time.

Building a Security Culture That Actually Works

I've watched organizations throw six-figure budgets at SIEM tools while running a single annual security training that employees click through in 12 minutes. That's not security culture. That's a checkbox.

Here's what actually works:

  • Monthly phishing simulations with immediate, non-punitive feedback when someone clicks.
  • Role-based training — your finance team faces different threats than your developers. Train accordingly.
  • Executive buy-in. When the CEO takes the same training as the intern, culture shifts.
  • Continuous reinforcement. Short, frequent modules beat annual marathon sessions every time.

A comprehensive cybersecurity awareness training program gives your people the knowledge to recognize threats before they become incidents. Every data breach example in this post could have been mitigated — or prevented entirely — with better-trained humans making better decisions.

Your Organization Is Already a Target

If you think your company is too small, too boring, or too obscure to be targeted, you're wrong. Threat actors automate their attacks. They don't care about your revenue or your industry. They care about your vulnerabilities.

Every data breach example I've covered here started with something simple — a misconfiguration, a phishing email, a phone call. The attackers didn't need to be brilliant. They needed your defenses to have one gap.

Close the gaps. Train your people. Implement multi-factor authentication. Patch your systems. Adopt zero trust principles. And start today — because the next breach report is already being written. The only question is whether your organization will be in it.