Back to glossary
February 27, 2026

What is a Data Breach?

A data breach is a security incident in which unauthorized individuals gain access to protected, sensitive, or confidential information.

‍

Main takeaways

  • The majority of breaches involve credential compromise or identity-related failures—not novel malware or infrastructure exploits.
  • In SaaS environments, a breach often doesn't involve "hacking" a system; it involves exploiting an existing access pathway—a stale account, an over-permissioned OAuth grant, a leaked API key.
  • The cost of a breach includes more than incident response. Regulatory fines, reputational damage, and customer notification obligations compound the operational impact.
  • Reducing breach risk in a SaaS-heavy organization is fundamentally an identity and access problem: who has access to what, and is any of it unnecessary or ungoverned?

What is a data breach?

A data breach occurs when an unauthorized party gains access to data they're not permitted to see or take. That data might be customer records, financial information, intellectual property, employee details, or protected health information. The mechanism can vary widely—compromised credentials, misconfigured storage, phishing, insider threats, or exploitation of a third-party integration—but the defining characteristic is unauthorized access to data that was supposed to be protected.

‍

Breaches vary significantly in scope and impact. A small unauthorized access event involving a handful of records carries different legal and operational consequences than a large-scale exfiltration of millions of customer records. But the underlying causes tend to have more in common than the headlines suggest: weak access controls, ungoverned permissions, and identities that had more access than they needed.

‍

How breaches happen in practice

Despite the complexity of modern threat landscapes, the majority of data breaches trace back to a small number of root causes. The Verizon Data Breach Investigations Report consistently finds that credential compromise, phishing, and exploitation of legitimate access paths are responsible for the overwhelming majority of incidents.

‍

In practical terms, this means:

  • Compromised credentials—Stolen or reused passwords that give attackers access to SaaS applications, cloud storage, or email accounts.
  • Phishing—Employees deceived into providing credentials or authorizing OAuth grants to attacker-controlled applications.
  • Stale accounts—Former employees or contractors whose accounts were never fully deprovisioned, providing persistent unauthorized access.
  • Over-permissioned integrations—Third-party applications connected via OAuth that have broader access than necessary; if that third party is breached, the data exposed extends to everything the integration could reach.
  • Misconfigured access controls—Storage buckets, databases, or shared drives inadvertently exposed to a wider audience than intended.
  • Insider threats—Employees or contractors intentionally exfiltrating data they have legitimate access to.

The SaaS breach surface

SaaS environments have significantly expanded the potential breach surface for most organizations. Employees have accounts across dozens of applications, many of which IT never formally approved or inventoried. Each of those accounts is a potential entry point. Each OAuth integration is a potential data pathway that attackers can exploit if they compromise the right identity.

‍

What makes SaaS breaches particularly challenging is the combination of breadth and invisibility. When an attacker gains access to a central identity provider account, they may be able to access every application in the SSO environment. When they compromise an account in a shadow SaaS application, they may access whatever data that application holds—or whatever it's connected to through OAuth—without any of it appearing in the security team's monitoring tools.

‍

The result is a breach surface that's larger and less visible than most organizations realize. Addressing it requires comprehensive identity discovery: knowing every account, every integration, and every permission associated with every identity in the environment before an incident makes that information urgently necessary.

‍

Learn how Nudge Security maps SaaS identity and access to reduce breach exposure →

Stop worrying about shadow IT security risks.

With an unrivaled, patented approach to SaaS discovery, Nudge Security inventories all cloud and SaaS assets ever created across your organization on Day One, and alerts you as new SaaS apps are adopted.