In September 2023, MGM Resorts International lost an estimated $100 million after a threat actor social-engineered a help desk employee with a single phone call. One conversation. That's all it took to cripple slot machines, hotel check-in systems, and digital room keys across Las Vegas for over a week. If you've ever wondered what causes a data breach, that incident is a masterclass: the root cause is almost never a lone technical failure. It's a chain of human decisions, missing controls, and organizational blind spots.

I've spent years analyzing breaches, training organizations, and watching the same patterns repeat. This post breaks down the seven actual root causes I see behind nearly every data breach — not theoretical risks, but the specific failures that show up again and again in incident reports, FTC enforcement actions, and the Verizon Data Breach Investigations Report.

What Causes a Data Breach? It's Rarely Just One Thing

A data breach happens when an unauthorized party accesses, steals, or exposes sensitive information. But asking what causes a data breach is like asking what causes a plane crash — it's almost always a chain of failures, not a single point of breakdown.

The 2023 Verizon DBIR found that 74% of all breaches involved the human element — whether through social engineering, errors, or misuse. Technical exploits get the headlines, but people and processes create the openings.

Here are the seven root causes I see driving breaches in 2024, ranked roughly by how often they show up in real-world incidents.

1. Phishing and Social Engineering: The #1 Entry Point

Phishing remains the single most common initial attack vector for data breaches. The FBI's Internet Crime Complaint Center (IC3) received over 298,000 phishing complaints in 2023 alone — more than any other cybercrime category, for the third year running.

Here's what actually happens. A threat actor sends a convincing email — maybe spoofing your CEO, your HR department, or Microsoft 365. An employee clicks a link, enters credentials on a fake login page, and hands over the keys to your environment. From there, the attacker moves laterally, escalates privileges, and exfiltrates data. The whole attack chain often takes hours. Discovery takes months.

Why Phishing Works So Well

Phishing doesn't exploit software. It exploits trust, urgency, and habit. Employees process hundreds of emails a day. They're conditioned to click. Attackers know this and craft messages that bypass rational thinking — fake invoices, urgent password resets, shipping notifications.

The fix isn't a single tool. It's layered: email filtering, multi-factor authentication, and regular phishing awareness training for your organization that uses realistic phishing simulations to build pattern recognition. You need your people to hesitate at the right moment.

2. Weak and Stolen Credentials

Credential theft is the silent engine behind a staggering number of breaches. The 2023 Verizon DBIR reported that stolen credentials were involved in roughly 49% of breaches. Nearly half.

Password reuse is the core problem. When an employee uses the same password for a work application and a personal forum that gets breached, attackers harvest that credential and try it everywhere. This technique — credential stuffing — is automated, cheap, and devastatingly effective.

What Makes This Worse

  • Organizations that don't enforce multi-factor authentication (MFA) on all external-facing systems
  • Legacy applications that don't support modern authentication
  • Employees who store passwords in browsers, sticky notes, or shared spreadsheets
  • IT teams that don't monitor for compromised credentials on dark web marketplaces

I've seen organizations with firewalls, endpoint detection, and SIEM platforms get breached because a single admin account had no MFA. The attacker didn't need to "hack" anything. They just logged in.

3. Unpatched Software and Known Vulnerabilities

The 2023 MOVEit Transfer vulnerability (CVE-2023-34362) compromised over 2,500 organizations and exposed the data of more than 60 million individuals. The Clop ransomware gang exploited a known SQL injection flaw in a file transfer tool used across government agencies, healthcare systems, and financial institutions.

The pattern is painfully familiar. A vulnerability is disclosed. A patch is released. Organizations delay deployment because of change management, testing requirements, or simple neglect. Threat actors scan for unpatched systems within hours of a CVE announcement.

The Patch Gap Is a Business Decision

Every day between patch release and patch deployment is a window of exposure. CISA's Known Exploited Vulnerabilities (KEV) catalog exists specifically to prioritize the vulnerabilities that attackers are actively using. If your organization isn't tracking that catalog, you're flying blind.

Check CISA's KEV catalog and compare it against your asset inventory. That single step has prevented more breaches than any expensive tool I've seen deployed.

4. Insider Threats: Malicious and Accidental

Not every breach starts with an external attacker. Insider threats account for a significant share of incidents, and they come in two flavors: malicious insiders who intentionally steal data, and careless employees who accidentally expose it.

The accidental category is larger than most people realize. An employee emails a spreadsheet of customer Social Security numbers to the wrong recipient. A developer pushes API keys to a public GitHub repository. A sales rep copies a client database to a personal USB drive before leaving the company.

Why Insider Threats Are Hard to Detect

Insiders already have legitimate access. They don't need to bypass firewalls or crack passwords. Traditional perimeter security is useless here. This is one reason zero trust architecture has gained so much traction — the principle that no user or device should be trusted by default, regardless of location or network.

Building a security-aware culture through consistent cybersecurity awareness training reduces the accidental insider threat significantly. Employees who understand data handling policies, classification, and reporting procedures make fewer catastrophic mistakes.

5. Misconfigured Cloud Services and Storage

Cloud misconfigurations have caused some of the most massive data exposures in recent years. Publicly accessible S3 buckets, open Elasticsearch databases, and misconfigured Azure Blob storage containers have leaked billions of records — often without any hacking required.

In my experience, these exposures share a common trait: no one checked the defaults. Cloud providers ship services in various states of openness, and the shared responsibility model means security configuration is your job, not theirs.

Common Misconfigurations That Lead to Breaches

  • Storage buckets with public read access enabled
  • Databases exposed to the internet with default credentials
  • Overly permissive IAM roles granting admin access to service accounts
  • Logging and monitoring disabled on critical cloud resources
  • Security groups allowing unrestricted inbound traffic on sensitive ports

If your organization migrated to the cloud during the pandemic rush, I'd bet money you have at least one misconfiguration sitting in production right now. Regular cloud security posture assessments aren't optional — they're baseline hygiene.

6. Third-Party and Supply Chain Compromise

The SolarWinds attack in 2020 changed how the industry thinks about supply chain risk. But the lesson hasn't fully sunk in. In 2023, the MOVEit breach demonstrated the same pattern: compromise one widely used vendor, and you gain access to thousands of downstream organizations simultaneously.

Your security is only as strong as your weakest vendor. If a third-party payroll provider, cloud software vendor, or managed service provider gets breached, your data goes with it — regardless of how strong your own controls are.

Questions You Should Be Asking Your Vendors

  • Do you hold SOC 2 Type II certification, and can we review the report?
  • How do you handle vulnerability management and patching?
  • What incident response and notification procedures do you follow?
  • Do you encrypt our data at rest and in transit?
  • Who has access to our data within your organization?

If a vendor can't answer these questions clearly, that's your answer. Vendor risk management is a core security function in 2024, not a procurement checkbox.

7. Ransomware: The Consequence That Compounds Everything

Ransomware deserves its own category because it often exploits multiple root causes at once. A ransomware attack typically starts with phishing or credential theft, moves through unpatched systems or misconfigurations, and ends with encrypted data and extortion demands.

The IBM Cost of a Data Breach Report 2023 found that the average cost of a data breach reached $4.45 million globally. Breaches involving ransomware had higher-than-average costs and longer containment timelines.

Ransomware Is a Business Model

Modern ransomware operations run like businesses. Groups like LockBit and BlackCat offer ransomware-as-a-service to affiliates, provide customer support portals for victims, and publish stolen data on leak sites to increase pressure. They target organizations with weak backup strategies and poor incident response plans because those victims are more likely to pay.

The best defense is layered: security awareness training to stop the initial phishing email, MFA to block credential theft, aggressive patching to close exploitation windows, network segmentation to limit lateral movement, and tested offline backups to eliminate ransom leverage.

The $4.45M Question: Which Root Cause Hits Your Organization?

Here's the uncomfortable truth. Most organizations I've worked with have exposure across multiple root causes simultaneously. They've deployed a firewall and antivirus and assumed they're covered. But what causes a data breach in the real world is the gap between what leadership thinks is protected and what actually is.

The good news: the highest-impact fixes are often the cheapest. Enabling MFA across all accounts costs almost nothing. Training employees to recognize phishing attempts through realistic phishing simulation programs costs a fraction of a breach. Reviewing cloud configurations takes hours, not months.

A Practical Checklist to Address Every Root Cause

If you want to reduce your breach risk right now, here's where I'd start:

  • Deploy MFA everywhere. Start with email, VPN, and any admin console. No exceptions.
  • Run phishing simulations monthly. Measure click rates. Follow up with targeted training for repeat clickers.
  • Patch critical vulnerabilities within 48 hours. Use CISA's KEV catalog as your priority list.
  • Audit cloud configurations quarterly. Use automated tools like AWS Config, Azure Policy, or GCP Security Command Center.
  • Implement least-privilege access. Review who has admin rights. Cut the list in half.
  • Assess your top 10 vendors. Request SOC 2 reports. Add security requirements to contracts.
  • Test your backups. If you haven't restored from backup in the last 90 days, you don't have a backup — you have a hope.
  • Invest in security awareness. Enroll your team in cybersecurity awareness training that covers social engineering, credential hygiene, and incident reporting.

Stop Asking If — Start Asking When

Every breach post-mortem I've read shares one theme: the organization knew it had gaps but hadn't prioritized closing them. The root causes behind data breaches aren't mysterious. They're well-documented, well-understood, and largely preventable.

What causes a data breach in 2024 is the same thing that caused one in 2014 — people, process, and technology failures compounding under pressure. The difference is that attackers are faster, the data is more valuable, and the regulatory consequences are more severe.

Your move is straightforward. Identify which of these seven root causes apply to your environment. Prioritize the highest-impact, lowest-cost fixes first. Build a culture where security awareness isn't an annual compliance event but a daily operational habit.

The organizations that avoid the next headline-making breach won't be the ones with the biggest security budgets. They'll be the ones that addressed these root causes before a threat actor found them first.