This guide explains what a data breach is, how breaches unfold across modern enterprise environments, and what security teams, from SOC analysts and incident responders to CISOs and security architects, can do to detect, contain, and prevent them. It covers attack vectors, breach costs by industry, behavioral detection indicators, compliance notification timelines, and operational lessons from recent incidents including Change Healthcare, AT&T, and National Public Data.
A data breach is any security incident in which unauthorized parties gain access to confidential, protected, or sensitive information. This includes personal data such as names and Social Security numbers, financial data including credit card and bank account details, and business-critical information like trade secrets and intellectual property. Unlike accidental exposure, a breach involves confirmed unauthorized access, typically by threat actors seeking to steal, sell, or leverage compromised data for financial gain, espionage, or extortion.
Not every security event qualifies. The distinction between breach, leak, and incident determines which regulatory clock starts ticking, and whether a 72-hour notification window applies.
A data breach involves confirmed unauthorized access to sensitive data by malicious actors. Threat actors deliberately penetrated systems, accessed or exfiltrated data, and caused confirmed exposure.
A data leak describes unintentional exposure without malicious actor involvement, a misconfigured cloud storage bucket exposing customer records is a leak; no adversary necessarily discovered or exploited it.
A security incident encompasses any event that potentially compromises information security, including failed attack attempts, policy violations, and anomalous activity. Not every incident constitutes a breach, but every breach begins as an incident.
Under GDPR, only confirmed breaches trigger the 72-hour notification requirement to supervisory authorities. Organizations that misclassify leaks as breaches, or the reverse, face compounding regulatory penalties and reputational damage.
Most intentional data breaches follow the same sequence, reconnaissance, compromise, lateral movement, staging, exfiltration, and attackers rarely skip steps. Three root causes drive the majority of incidents: innocent employee mistakes, malicious insiders with authorized access, and external attackers operating independently or as part of organized criminal groups.
Across those root causes, the progression from initial access to full impact follows five consistent phases, each representing a distinct detection opportunity and a distinct failure point if visibility is absent.

Credential theft alone accounts for 61% of confirmed breaches, but five other vectors contribute meaningfully to the incident population, each with distinct prevalence rates and different detection requirements.
Sources: IBM Cost of a Data Breach 2025; Verizon DBIR 2025; SailPoint 2025
Third-party compromises create asymmetric risk. While representing less than 5% of initial attack vectors, supply chain breaches affected 47% of all victims in 2025 (Verizon DBIR 2025). The Snowflake platform incident illustrates the mechanism: attackers compromised customer environments through stolen credentials, affecting AT&T, Ticketmaster, Neiman Marcus, and others simultaneously. A single vendor weak point cascaded into breaches affecting hundreds of millions of individuals.
In 2025, 16% of breaches involved attackers using AI tools — LLM-generated phishing that defeats language-based filters, polymorphic malware that rewrites itself to evade signatures, and automated reconnaissance at scales that previously required nation-state infrastructure (IBM 2025). That number was effectively zero three years ago.
The USD 4.44 million global average breach cost understates the financial exposure for most enterprise organizations. US organizations pay more than twice the global average. Costs arise from four categories: lost business, detection and escalation, post-breach response, and regulatory notification, and they compound through legal settlements that arrive months or years after the incident. Healthcare has held the highest average breach cost of any industry for 14 consecutive years, with industrial and energy sectors both trending upward in 2025.
Source: IBM Cost of a Data Breach 2025
Detection timing determines cost magnitude more than almost any other single factor. Organizations using AI-powered security detect breaches 80 days faster and spend USD 1.9 million less on average (IBM 2025). Organizations with formal incident response plans save USD 1.2 million per breach. Those operating zero-trust architectures save USD 1.04 million. Breaches that remain undetected for more than 200 days cost significantly more than those contained within 100 days, making detection speed a direct financial variable, not an abstract security metric.
61% of breaches involve compromised credentials, attackers authenticating as legitimate users, performing actions that appear authorized, on systems that flag nothing unusual. Detection that waits for known-bad signatures misses these attacks entirely. EDR sees the endpoint. SIEM sees the log. Neither sees the attacker moving east-west between workloads.
Across those environments, seven behavioral anomalies reliably signal an active breach in progress, each representing a point where attacker movement diverges from legitimate patterns and becomes observable before data leaves the environment.
Endpoint detection and response monitors managed endpoints but cannot observe east-west movement across the network or detect threats on unmanaged devices, IoT systems, and cloud workloads where agents cannot be deployed. SIEMs reconstruct incidents from logs after activity has occurred, requiring time, manual correlation, and assumptions about what matters. Network detection and response fills the visibility gap by analyzing traffic patterns across the entire environment in real time, including encrypted traffic, lateral movement between systems, and identity behavior that never touches an agent-equipped endpoint.
The 241-day average breach detection window reflects how long defenders operate with incomplete visibility before activity becomes observable through existing tools. Behavioral detection closes that window by identifying attacker progression while it is still happening, not after data has left.
Breach prevention reduces the probability of initial compromise and limits attacker movement after access is obtained. Incident response limits the damage once a breach is confirmed. Both are required — prevention without response planning assumes perfect defenses; response planning without prevention accepts unnecessary exposure.
The controls with the most consistent evidence base address credential abuse, third-party exposure, and the human factors that enable initial compromise — each with documented cost impact from IBM 2025 research.
An effective response follows a documented sequence — beginning with containment before any remediation occurs, and ending with post-incident review that updates both controls and detection rules.
EUR 5.6–5.9 billion in GDPR fines since 2018 were not primarily levied for failing to prevent breaches, many were issued for missed notification windows, misclassified incidents, and inadequate reporting (GDPR Enforcement Tracker 2025). The framework an organization is subject to determines which reporting clock starts the moment a breach is confirmed, and misclassifying a breach as a security incident can trigger a second, independent penalty on top of the original event.
Sources: GDPR Enforcement Tracker 2025; HHS; Foley & Lardner 2025
NIS2, enforceable since October 2024, introduces personal executive liability, a first in EU cybersecurity law, for organizations in 18 critical sectors including energy, transport, health, and finance. In the United States, California has moved to a 30-day notification requirement effective January 2026, and all 50 states plus the District of Columbia, Puerto Rico, and the Virgin Islands maintain independent notification laws. An organization operating across the US, EU, and UK often faces three simultaneous notification windows, and the shortest one sets the operational deadline.
The MITRE ATT&CK framework maps attacker techniques to specific IDs, giving detection teams a shared vocabulary for coverage gaps. Credential access and valid account abuse dominate the first half of the breach lifecycle, while collection and exfiltration techniques define the second, each tactic representing a distinct opportunity for detection before impact occurs.
Sources: MITRE ATT&CK; IBM Cost of a Data Breach 2025; Verizon DBIR 2025
Three recent incidents illustrate the operational mechanics of modern breaches — and the detection failures that allowed each one to progress from initial compromise to full impact.
Change Healthcare fell to the ALPHV/BlackCat ransomware group in February 2024 after attackers exploited Citrix remote access credentials with no MFA protection. The attack, the largest healthcare data breach in history, affected 192.7 million individuals (HIPAA Journal), disrupted pharmacy operations nationwide for months, and forced UnitedHealth Group to pay a reported USD 22 million ransom.
主な詳細:
セキュリティチームへの教訓:
AT&T experienced two separate breaches in 2024, resulting in a USD 177 million settlement. The March incident exposed customer data through a third-party platform compromise; the July incident involved a Snowflake-related breach affecting customer call records. Combined impact: 73 million-plus customers affected.
主な詳細:
セキュリティチームへの教訓:
The background check company National Public Data experienced a breach exposing 2.9 billion records including Social Security numbers, names, and addresses.

Root cause: plaintext credentials on a sister website enabled access to the primary database. The company subsequently filed for bankruptcy.
主な詳細:
セキュリティチームへの教訓:
Vectra AI's approach to data breach detection centers on behavioral analysis across network, identity, and cloud domains, identifying attacker activity after initial access occurs, while movement is still happening, before data leaves the environment.
Vectra AI uses Attack Signal Intelligence to detect and prioritize threats based on attacker behaviors rather than known signatures. When attackers use valid credentials, as in 61% of breaches, signature-based tools see authorized access. Behavioral AI identifies that the same identity is performing reconnaissance, accessing systems outside its operational role, and staging data, even when each individual action appears legitimate in isolation. This distinction is what separates detection that catches breaches in progress from detection that discovers them through downstream impact.
By monitoring network traffic, cloud environments, and identity systems simultaneously, Vectra AI identifies breach indicators that traditional tools miss. NDR excels at detecting threats that bypass endpoint controls: lateral movement between unmanaged devices, encrypted command-and-control traffic, and identity abuse across on-premises and cloud environments. For the 61% of breaches driven by credential theft, where attackers appear to be legitimate users, network-level behavioral analysis provides the visibility layer that closes the gap between initial compromise and breach discovery.
Vectra AI detects attacker behavior at every stage of the five-phase breach lifecycle, from early reconnaissance through lateral movement, privilege escalation, and data staging. Security teams gain the opportunity to contain threats before exfiltration occurs rather than discovering them through downstream operational or regulatory impact.
For the 241 days most organizations remain blind to an active breach, the outcome is determined not by the attacker's sophistication but by whether defenders can observe the movement.
Data breaches are not random events. The patterns are consistent: compromised credentials drive initial access, lateral movement through legitimate workflows extends attacker dwell time, fragmented visibility delays detection, and third-party connections multiply impact downstream. Organizations that address these specific vectors through behavioral detection, identity security, and formal incident response planning consistently outperform those pursuing generic security improvements.
To assess your organization's current exposure, consider these diagnostic questions:
The organizations that close these gaps fastest spend less, recover faster, and face regulators with evidence, not explanations.
Statistics and breach figures on this page come from the following primary sources:
Named breach incidents are documented through publicly available reporting and organizational disclosures.
データ侵害とは、通常、認証情報の盗難などを通じて、権限のない第三者が個人データ、財務記録、知的財産などの機密情報、保護対象情報、または機微情報にアクセスしてしまうセキュリティインシデントのことです。 フィッシング、あるいはシステムの脆弱性を悪用することを通じて発生するセキュリティインシデントです。
意図的な侵害の多くは、以下の5つの段階を経ます。すなわち、偵察、初期侵入、横方向の移動、データの収集と準備、そしてデータの持ち出しです。侵害された認証情報は、最も一般的な初期侵入手段であり、インシデントの61%に関与しています。
最も一般的な攻撃経路は認証情報の盗難(侵害事例の61%)であり、 フィッシング およびソーシャルエンジニアリング(16%)、ランサムウェア(システム侵入の75%)、クラウドの設定ミス、内部者による脅威、およびサードパーティやサプライチェーンの侵害(侵害の30%を占め、増加傾向にある)。出典:IBM 2025;Verizon DBIR 2025。
組織がセキュリティ侵害を検知し、封じ込めるまでに要する期間は平均241日である(IBM 2025年)。これは過去9年間で最も短い期間であり、検知能力の向上を反映しているが、それでも攻撃者が検知されることなく横方向への移動を行い、権限を昇格させ、データの持ち出しを準備する時間が数ヶ月間も与えられていることを意味する。
フォレンジック証拠を保全しつつ、さらなるデータ損失を防ぐために侵害の拡大を食い止めましょう。その後、影響範囲を評価し、所定の期限内に該当する規制当局へ通報し、フォレンジックおよび法務の専門家を関与させ、根本原因を是正し、得られた教訓を文書化してください。証拠が保全されるまでは、是正措置を行わないでください。
2025年の世界平均は1件あたり444万米ドルであり、米国の組織が支払う平均額は1,022万米ドルと、過去最高を記録しています。医療業界は1件あたり742万米ドルと、最もコストが高いセクターとなっています(IBM「データ侵害のコスト 2025」)。
主な規制枠組みには、GDPR(監督当局への72時間以内の通知)、NIS2(24時間以内の早期通報および72時間以内の詳細報告)、HIPAA(個人への60日以内の通知)、および30日から60日までの期間を定めた米国の各州法が含まれます。米国の全50州に加え、コロンビア特別区、プエルトリコ、およびバージン諸島は、それぞれ独自の通知要件を設けています。
NDRは、管理対象および非管理対象のデバイス、クラウド環境、IDシステムにわたるネットワークトラフィックをリアルタイムで分析し、エンドポイントやログベースのツールでは検知できない横方向の移動、認証情報の悪用、コマンド&コントロール通信を検知します。これは、有効な認証情報の使用によって引き起こされる攻撃の61%において、最初の侵害から侵害の発見までのギャップを埋める可視化レイヤーです。