This guide explains what a data breach is, how breaches unfold across modern enterprise environments, and what security teams, from SOC analysts and incident responders to CISOs and security architects, can do to detect, contain, and prevent them. It covers attack vectors, breach costs by industry, behavioral detection indicators, compliance notification timelines, and operational lessons from recent incidents including Change Healthcare, AT&T, and National Public Data.
A data breach is any security incident in which unauthorized parties gain access to confidential, protected, or sensitive information. This includes personal data such as names and Social Security numbers, financial data including credit card and bank account details, and business-critical information like trade secrets and intellectual property. Unlike accidental exposure, a breach involves confirmed unauthorized access, typically by threat actors seeking to steal, sell, or leverage compromised data for financial gain, espionage, or extortion.
Not every security event qualifies. The distinction between breach, leak, and incident determines which regulatory clock starts ticking, and whether a 72-hour notification window applies.
A data breach involves confirmed unauthorized access to sensitive data by malicious actors. Threat actors deliberately penetrated systems, accessed or exfiltrated data, and caused confirmed exposure.
A data leak describes unintentional exposure without malicious actor involvement, a misconfigured cloud storage bucket exposing customer records is a leak; no adversary necessarily discovered or exploited it.
A security incident encompasses any event that potentially compromises information security, including failed attack attempts, policy violations, and anomalous activity. Not every incident constitutes a breach, but every breach begins as an incident.
Under GDPR, only confirmed breaches trigger the 72-hour notification requirement to supervisory authorities. Organizations that misclassify leaks as breaches, or the reverse, face compounding regulatory penalties and reputational damage.
Most intentional data breaches follow the same sequence, reconnaissance, compromise, lateral movement, staging, exfiltration, and attackers rarely skip steps. Three root causes drive the majority of incidents: innocent employee mistakes, malicious insiders with authorized access, and external attackers operating independently or as part of organized criminal groups.
Across those root causes, the progression from initial access to full impact follows five consistent phases, each representing a distinct detection opportunity and a distinct failure point if visibility is absent.

Credential theft alone accounts for 61% of confirmed breaches, but five other vectors contribute meaningfully to the incident population, each with distinct prevalence rates and different detection requirements.
Sources: IBM Cost of a Data Breach 2025; Verizon DBIR 2025; SailPoint 2025
Third-party compromises create asymmetric risk. While representing less than 5% of initial attack vectors, supply chain breaches affected 47% of all victims in 2025 (Verizon DBIR 2025). The Snowflake platform incident illustrates the mechanism: attackers compromised customer environments through stolen credentials, affecting AT&T, Ticketmaster, Neiman Marcus, and others simultaneously. A single vendor weak point cascaded into breaches affecting hundreds of millions of individuals.
In 2025, 16% of breaches involved attackers using AI tools — LLM-generated phishing that defeats language-based filters, polymorphic malware that rewrites itself to evade signatures, and automated reconnaissance at scales that previously required nation-state infrastructure (IBM 2025). That number was effectively zero three years ago.
The USD 4.44 million global average breach cost understates the financial exposure for most enterprise organizations. US organizations pay more than twice the global average. Costs arise from four categories: lost business, detection and escalation, post-breach response, and regulatory notification, and they compound through legal settlements that arrive months or years after the incident. Healthcare has held the highest average breach cost of any industry for 14 consecutive years, with industrial and energy sectors both trending upward in 2025.
Source: IBM Cost of a Data Breach 2025
Detection timing determines cost magnitude more than almost any other single factor. Organizations using AI-powered security detect breaches 80 days faster and spend USD 1.9 million less on average (IBM 2025). Organizations with formal incident response plans save USD 1.2 million per breach. Those operating zero-trust architectures save USD 1.04 million. Breaches that remain undetected for more than 200 days cost significantly more than those contained within 100 days, making detection speed a direct financial variable, not an abstract security metric.
61% of breaches involve compromised credentials, attackers authenticating as legitimate users, performing actions that appear authorized, on systems that flag nothing unusual. Detection that waits for known-bad signatures misses these attacks entirely. EDR sees the endpoint. SIEM sees the log. Neither sees the attacker moving east-west between workloads.
Across those environments, seven behavioral anomalies reliably signal an active breach in progress, each representing a point where attacker movement diverges from legitimate patterns and becomes observable before data leaves the environment.
Endpoint detection and response monitors managed endpoints but cannot observe east-west movement across the network or detect threats on unmanaged devices, IoT systems, and cloud workloads where agents cannot be deployed. SIEMs reconstruct incidents from logs after activity has occurred, requiring time, manual correlation, and assumptions about what matters. Network detection and response fills the visibility gap by analyzing traffic patterns across the entire environment in real time, including encrypted traffic, lateral movement between systems, and identity behavior that never touches an agent-equipped endpoint.
The 241-day average breach detection window reflects how long defenders operate with incomplete visibility before activity becomes observable through existing tools. Behavioral detection closes that window by identifying attacker progression while it is still happening, not after data has left.
Breach prevention reduces the probability of initial compromise and limits attacker movement after access is obtained. Incident response limits the damage once a breach is confirmed. Both are required — prevention without response planning assumes perfect defenses; response planning without prevention accepts unnecessary exposure.
The controls with the most consistent evidence base address credential abuse, third-party exposure, and the human factors that enable initial compromise — each with documented cost impact from IBM 2025 research.
An effective response follows a documented sequence — beginning with containment before any remediation occurs, and ending with post-incident review that updates both controls and detection rules.
EUR 5.6–5.9 billion in GDPR fines since 2018 were not primarily levied for failing to prevent breaches, many were issued for missed notification windows, misclassified incidents, and inadequate reporting (GDPR Enforcement Tracker 2025). The framework an organization is subject to determines which reporting clock starts the moment a breach is confirmed, and misclassifying a breach as a security incident can trigger a second, independent penalty on top of the original event.
Sources: GDPR Enforcement Tracker 2025; HHS; Foley & Lardner 2025
NIS2, enforceable since October 2024, introduces personal executive liability, a first in EU cybersecurity law, for organizations in 18 critical sectors including energy, transport, health, and finance. In the United States, California has moved to a 30-day notification requirement effective January 2026, and all 50 states plus the District of Columbia, Puerto Rico, and the Virgin Islands maintain independent notification laws. An organization operating across the US, EU, and UK often faces three simultaneous notification windows, and the shortest one sets the operational deadline.
The MITRE ATT&CK framework maps attacker techniques to specific IDs, giving detection teams a shared vocabulary for coverage gaps. Credential access and valid account abuse dominate the first half of the breach lifecycle, while collection and exfiltration techniques define the second, each tactic representing a distinct opportunity for detection before impact occurs.
Sources: MITRE ATT&CK; IBM Cost of a Data Breach 2025; Verizon DBIR 2025
Three recent incidents illustrate the operational mechanics of modern breaches — and the detection failures that allowed each one to progress from initial compromise to full impact.
Change Healthcare fell to the ALPHV/BlackCat ransomware group in February 2024 after attackers exploited Citrix remote access credentials with no MFA protection. The attack, the largest healthcare data breach in history, affected 192.7 million individuals (HIPAA Journal), disrupted pharmacy operations nationwide for months, and forced UnitedHealth Group to pay a reported USD 22 million ransom.
Detalles clave:
Lecciones para los equipos de seguridad:
AT&T experienced two separate breaches in 2024, resulting in a USD 177 million settlement. The March incident exposed customer data through a third-party platform compromise; the July incident involved a Snowflake-related breach affecting customer call records. Combined impact: 73 million-plus customers affected.
Detalles clave:
Lecciones para los equipos de seguridad:
The background check company National Public Data experienced a breach exposing 2.9 billion records including Social Security numbers, names, and addresses.

Root cause: plaintext credentials on a sister website enabled access to the primary database. The company subsequently filed for bankruptcy.
Detalles clave:
Lecciones para los equipos de seguridad:
Vectra AI's approach to data breach detection centers on behavioral analysis across network, identity, and cloud domains, identifying attacker activity after initial access occurs, while movement is still happening, before data leaves the environment.
Vectra AI uses Attack Signal Intelligence to detect and prioritize threats based on attacker behaviors rather than known signatures. When attackers use valid credentials, as in 61% of breaches, signature-based tools see authorized access. Behavioral AI identifies that the same identity is performing reconnaissance, accessing systems outside its operational role, and staging data, even when each individual action appears legitimate in isolation. This distinction is what separates detection that catches breaches in progress from detection that discovers them through downstream impact.
By monitoring network traffic, cloud environments, and identity systems simultaneously, Vectra AI identifies breach indicators that traditional tools miss. NDR excels at detecting threats that bypass endpoint controls: lateral movement between unmanaged devices, encrypted command-and-control traffic, and identity abuse across on-premises and cloud environments. For the 61% of breaches driven by credential theft, where attackers appear to be legitimate users, network-level behavioral analysis provides the visibility layer that closes the gap between initial compromise and breach discovery.
Vectra AI detects attacker behavior at every stage of the five-phase breach lifecycle, from early reconnaissance through lateral movement, privilege escalation, and data staging. Security teams gain the opportunity to contain threats before exfiltration occurs rather than discovering them through downstream operational or regulatory impact.
For the 241 days most organizations remain blind to an active breach, the outcome is determined not by the attacker's sophistication but by whether defenders can observe the movement.
Data breaches are not random events. The patterns are consistent: compromised credentials drive initial access, lateral movement through legitimate workflows extends attacker dwell time, fragmented visibility delays detection, and third-party connections multiply impact downstream. Organizations that address these specific vectors through behavioral detection, identity security, and formal incident response planning consistently outperform those pursuing generic security improvements.
To assess your organization's current exposure, consider these diagnostic questions:
The organizations that close these gaps fastest spend less, recover faster, and face regulators with evidence, not explanations.
Statistics and breach figures on this page come from the following primary sources:
Named breach incidents are documented through publicly available reporting and organizational disclosures.
Una filtración de datos es un incidente de seguridad en el que personas no autorizadas obtienen acceso a información confidencial, protegida o sensible, incluidos datos personales, registros financieros o propiedad intelectual, normalmente mediante el robo de credenciales, phishing o la explotación de sistemas.
La mayoría de las violaciones de seguridad intencionadas siguen cinco etapas: reconocimiento, compromiso inicial, movimiento lateral, recopilación y preparación de datos, y exfiltración. Las credenciales comprometidas son el método de acceso inicial más habitual, ya que están implicadas en el 61 % de los incidentes.
Los vectores más frecuentes son el robo de credenciales (el 61 % de las filtraciones), phishing la ingeniería social (el 16 %), el ransomware (el 75 % de las intrusiones en los sistemas), cloud , las amenazas internas y el compromiso de terceros o de la cadena de suministro (el 30 % de las filtraciones, y la cifra va en aumento). Fuentes: IBM 2025; Verizon DBIR 2025.
Las organizaciones tardan una media de 241 días en detectar y contener una violación de seguridad (IBM 2025). Se trata del mínimo registrado en los últimos nueve años, lo que refleja una mejora en las capacidades de detección, pero sigue suponiendo meses durante los cuales los atacantes pueden desplazarse lateralmente, ampliar sus privilegios y preparar el robo de datos sin ser detectados.
Limite la incidencia para evitar una mayor pérdida de datos, conservando al mismo tiempo las pruebas forenses. A continuación, evalúe el alcance, notifique a las autoridades reguladoras pertinentes dentro de los plazos establecidos, recurra a especialistas forenses y jurídicos, solucione las causas fundamentales y documente las lecciones aprendidas. No proceda a la solución antes de que se hayan conservado las pruebas.
La media mundial será de 4,44 millones de dólares por incidente en 2025, y las empresas estadounidenses pagarán una media de 10,22 millones de dólares, lo que supone un máximo histórico. El sector sanitario es el más costoso, con 7,42 millones de dólares por incidente (IBM Cost of a Data Breach 2025).
Entre los principales marcos normativos se incluyen el RGPD (notificación a las autoridades de control en un plazo de 72 horas), la Directiva NIS 2 (alerta temprana en un plazo de 24 horas más un informe completo en un plazo de 72 horas), la HIPAA (60 días para informar a los interesados) y las leyes estatales de EE. UU., cuyos plazos oscilan entre 30 y 60 días. Los 50 estados de EE. UU., además del Distrito de Columbia, Puerto Rico y las Islas Vírgenes, establecen requisitos de notificación independientes.
NDR analiza el tráfico de red en tiempo real en dispositivos gestionados y no gestionados, cloud y sistemas de identidades, detectando movimientos laterales, uso indebido de credenciales y comunicaciones de comando y control que las herramientas basadas en terminales y registros no detectan. Se trata de la capa de visibilidad que reduce el lapso de tiempo entre la intrusión inicial y la detección de la violación de seguridad en el 61 % de los ataques motivados por el uso de credenciales válidas.