This guide explains what a data breach is, how breaches unfold across modern enterprise environments, and what security teams, from SOC analysts and incident responders to CISOs and security architects, can do to detect, contain, and prevent them. It covers attack vectors, breach costs by industry, behavioral detection indicators, compliance notification timelines, and operational lessons from recent incidents including Change Healthcare, AT&T, and National Public Data.
A data breach is any security incident in which unauthorized parties gain access to confidential, protected, or sensitive information. This includes personal data such as names and Social Security numbers, financial data including credit card and bank account details, and business-critical information like trade secrets and intellectual property. Unlike accidental exposure, a breach involves confirmed unauthorized access, typically by threat actors seeking to steal, sell, or leverage compromised data for financial gain, espionage, or extortion.
Not every security event qualifies. The distinction between breach, leak, and incident determines which regulatory clock starts ticking, and whether a 72-hour notification window applies.
A data breach involves confirmed unauthorized access to sensitive data by malicious actors. Threat actors deliberately penetrated systems, accessed or exfiltrated data, and caused confirmed exposure.
A data leak describes unintentional exposure without malicious actor involvement, a misconfigured cloud storage bucket exposing customer records is a leak; no adversary necessarily discovered or exploited it.
A security incident encompasses any event that potentially compromises information security, including failed attack attempts, policy violations, and anomalous activity. Not every incident constitutes a breach, but every breach begins as an incident.
Under GDPR, only confirmed breaches trigger the 72-hour notification requirement to supervisory authorities. Organizations that misclassify leaks as breaches, or the reverse, face compounding regulatory penalties and reputational damage.
Most intentional data breaches follow the same sequence, reconnaissance, compromise, lateral movement, staging, exfiltration, and attackers rarely skip steps. Three root causes drive the majority of incidents: innocent employee mistakes, malicious insiders with authorized access, and external attackers operating independently or as part of organized criminal groups.
Across those root causes, the progression from initial access to full impact follows five consistent phases, each representing a distinct detection opportunity and a distinct failure point if visibility is absent.

Credential theft alone accounts for 61% of confirmed breaches, but five other vectors contribute meaningfully to the incident population, each with distinct prevalence rates and different detection requirements.
Sources: IBM Cost of a Data Breach 2025; Verizon DBIR 2025; SailPoint 2025
Third-party compromises create asymmetric risk. While representing less than 5% of initial attack vectors, supply chain breaches affected 47% of all victims in 2025 (Verizon DBIR 2025). The Snowflake platform incident illustrates the mechanism: attackers compromised customer environments through stolen credentials, affecting AT&T, Ticketmaster, Neiman Marcus, and others simultaneously. A single vendor weak point cascaded into breaches affecting hundreds of millions of individuals.
In 2025, 16% of breaches involved attackers using AI tools — LLM-generated phishing that defeats language-based filters, polymorphic malware that rewrites itself to evade signatures, and automated reconnaissance at scales that previously required nation-state infrastructure (IBM 2025). That number was effectively zero three years ago.
The USD 4.44 million global average breach cost understates the financial exposure for most enterprise organizations. US organizations pay more than twice the global average. Costs arise from four categories: lost business, detection and escalation, post-breach response, and regulatory notification, and they compound through legal settlements that arrive months or years after the incident. Healthcare has held the highest average breach cost of any industry for 14 consecutive years, with industrial and energy sectors both trending upward in 2025.
Source: IBM Cost of a Data Breach 2025
Detection timing determines cost magnitude more than almost any other single factor. Organizations using AI-powered security detect breaches 80 days faster and spend USD 1.9 million less on average (IBM 2025). Organizations with formal incident response plans save USD 1.2 million per breach. Those operating zero-trust architectures save USD 1.04 million. Breaches that remain undetected for more than 200 days cost significantly more than those contained within 100 days, making detection speed a direct financial variable, not an abstract security metric.
61% of breaches involve compromised credentials, attackers authenticating as legitimate users, performing actions that appear authorized, on systems that flag nothing unusual. Detection that waits for known-bad signatures misses these attacks entirely. EDR sees the endpoint. SIEM sees the log. Neither sees the attacker moving east-west between workloads.
Across those environments, seven behavioral anomalies reliably signal an active breach in progress, each representing a point where attacker movement diverges from legitimate patterns and becomes observable before data leaves the environment.
Endpoint detection and response monitors managed endpoints but cannot observe east-west movement across the network or detect threats on unmanaged devices, IoT systems, and cloud workloads where agents cannot be deployed. SIEMs reconstruct incidents from logs after activity has occurred, requiring time, manual correlation, and assumptions about what matters. Network detection and response fills the visibility gap by analyzing traffic patterns across the entire environment in real time, including encrypted traffic, lateral movement between systems, and identity behavior that never touches an agent-equipped endpoint.
The 241-day average breach detection window reflects how long defenders operate with incomplete visibility before activity becomes observable through existing tools. Behavioral detection closes that window by identifying attacker progression while it is still happening, not after data has left.
Breach prevention reduces the probability of initial compromise and limits attacker movement after access is obtained. Incident response limits the damage once a breach is confirmed. Both are required — prevention without response planning assumes perfect defenses; response planning without prevention accepts unnecessary exposure.
The controls with the most consistent evidence base address credential abuse, third-party exposure, and the human factors that enable initial compromise — each with documented cost impact from IBM 2025 research.
An effective response follows a documented sequence — beginning with containment before any remediation occurs, and ending with post-incident review that updates both controls and detection rules.
EUR 5.6–5.9 billion in GDPR fines since 2018 were not primarily levied for failing to prevent breaches, many were issued for missed notification windows, misclassified incidents, and inadequate reporting (GDPR Enforcement Tracker 2025). The framework an organization is subject to determines which reporting clock starts the moment a breach is confirmed, and misclassifying a breach as a security incident can trigger a second, independent penalty on top of the original event.
Sources: GDPR Enforcement Tracker 2025; HHS; Foley & Lardner 2025
NIS2, enforceable since October 2024, introduces personal executive liability, a first in EU cybersecurity law, for organizations in 18 critical sectors including energy, transport, health, and finance. In the United States, California has moved to a 30-day notification requirement effective January 2026, and all 50 states plus the District of Columbia, Puerto Rico, and the Virgin Islands maintain independent notification laws. An organization operating across the US, EU, and UK often faces three simultaneous notification windows, and the shortest one sets the operational deadline.
The MITRE ATT&CK framework maps attacker techniques to specific IDs, giving detection teams a shared vocabulary for coverage gaps. Credential access and valid account abuse dominate the first half of the breach lifecycle, while collection and exfiltration techniques define the second, each tactic representing a distinct opportunity for detection before impact occurs.
Sources: MITRE ATT&CK; IBM Cost of a Data Breach 2025; Verizon DBIR 2025
Three recent incidents illustrate the operational mechanics of modern breaches — and the detection failures that allowed each one to progress from initial compromise to full impact.
Change Healthcare fell to the ALPHV/BlackCat ransomware group in February 2024 after attackers exploited Citrix remote access credentials with no MFA protection. The attack, the largest healthcare data breach in history, affected 192.7 million individuals (HIPAA Journal), disrupted pharmacy operations nationwide for months, and forced UnitedHealth Group to pay a reported USD 22 million ransom.
Key details:
Lessons for security teams:
AT&T experienced two separate breaches in 2024, resulting in a USD 177 million settlement. The March incident exposed customer data through a third-party platform compromise; the July incident involved a Snowflake-related breach affecting customer call records. Combined impact: 73 million-plus customers affected.
Key details:
Lessons for security teams:
The background check company National Public Data experienced a breach exposing 2.9 billion records including Social Security numbers, names, and addresses.

Root cause: plaintext credentials on a sister website enabled access to the primary database. The company subsequently filed for bankruptcy.
Key details:
Lessons for security teams:
Vectra AI's approach to data breach detection centers on behavioral analysis across network, identity, and cloud domains, identifying attacker activity after initial access occurs, while movement is still happening, before data leaves the environment.
Vectra AI uses Attack Signal Intelligence to detect and prioritize threats based on attacker behaviors rather than known signatures. When attackers use valid credentials, as in 61% of breaches, signature-based tools see authorized access. Behavioral AI identifies that the same identity is performing reconnaissance, accessing systems outside its operational role, and staging data, even when each individual action appears legitimate in isolation. This distinction is what separates detection that catches breaches in progress from detection that discovers them through downstream impact.
By monitoring network traffic, cloud environments, and identity systems simultaneously, Vectra AI identifies breach indicators that traditional tools miss. NDR excels at detecting threats that bypass endpoint controls: lateral movement between unmanaged devices, encrypted command-and-control traffic, and identity abuse across on-premises and cloud environments. For the 61% of breaches driven by credential theft, where attackers appear to be legitimate users, network-level behavioral analysis provides the visibility layer that closes the gap between initial compromise and breach discovery.
Vectra AI detects attacker behavior at every stage of the five-phase breach lifecycle, from early reconnaissance through lateral movement, privilege escalation, and data staging. Security teams gain the opportunity to contain threats before exfiltration occurs rather than discovering them through downstream operational or regulatory impact.
For the 241 days most organizations remain blind to an active breach, the outcome is determined not by the attacker's sophistication but by whether defenders can observe the movement.
Data breaches are not random events. The patterns are consistent: compromised credentials drive initial access, lateral movement through legitimate workflows extends attacker dwell time, fragmented visibility delays detection, and third-party connections multiply impact downstream. Organizations that address these specific vectors through behavioral detection, identity security, and formal incident response planning consistently outperform those pursuing generic security improvements.
To assess your organization's current exposure, consider these diagnostic questions:
The organizations that close these gaps fastest spend less, recover faster, and face regulators with evidence, not explanations.
Statistics and breach figures on this page come from the following primary sources:
Named breach incidents are documented through publicly available reporting and organizational disclosures.
A data breach is a security incident in which unauthorized parties gain access to confidential, protected, or sensitive information, including personal data, financial records, or intellectual property, typically through credential theft, phishing, or system exploitation.
Most intentional breaches follow five stages: Reconnaissance, initial compromise, lateral movement, data collection and staging, and exfiltration. Compromised credentials are the dominant initial access method, implicated in 61% of incidents.
The most prevalent vectors are credential theft (61% of breaches), phishing and social engineering (16%), ransomware (75% of system intrusions), cloud misconfiguration, insider threats, and third-party or supply chain compromise (30% of breaches and growing). Sources: IBM 2025; Verizon DBIR 2025.
Organizations take an average of 241 days to identify and contain a breach (IBM 2025). This is a 9-year low, reflecting improving detection capabilities, but still represents months during which attackers may move laterally, escalate privileges, and stage data undetected.
Contain the breach to prevent further data loss while preserving forensic evidence. Then assess scope, notify applicable regulatory authorities within required timelines, engage forensics and legal specialists, remediate root causes, and document lessons learned. Do not remediate before evidence is preserved.
The global average is USD 4.44 million per breach in 2025, with US organizations paying USD 10.22 million on average, an all-time high. Healthcare is the most expensive sector at USD 7.42 million per breach (IBM Cost of a Data Breach 2025).
Major frameworks include GDPR (72-hour notification to supervisory authorities), NIS2 (24-hour early warning plus 72-hour full report), HIPAA (60 days to individuals), and US state laws varying from 30 to 60 days. All 50 US states plus DC, Puerto Rico, and the Virgin Islands maintain independent notification requirements.
NDR analyzes network traffic in real time across managed and unmanaged devices, cloud environments, and identity systems, detecting lateral movement, credential abuse, and command-and-control communication that endpoint and log-based tools miss. This is the visibility layer that closes the gap between initial compromise and breach discovery for the 61% of attacks driven by valid credential use.