Hackers steal PII for many reasons: to commit identity theft, for blackmail, or to sell it on the black market, where they can fetch as much as USD 1 per social security number and USD 2,000 for a passport number.
Hackers may also target PII as part of a larger attack: They may hold it hostage using ransomware or steal PII to take over executives' email accounts for use in spear phishing and business email compromise (BEC) scams.
Cybercriminals often use social engineering attacks to trick unsuspecting victims into willingly handing over PII, but they may also purchase it on the dark web or gain access as part of a larger data breach. PII can be stolen physically by rooting through a person's trash or spying on them as they use a computer.
Malicious actors may also monitor a target's social media accounts, where many people unknowingly share non-sensitive PII every day. Over time, an attacker can gather enough information to impersonate a victim or break into their accounts.
For organizations, protecting PII can be complicated. The growth of cloud computing and SaaS services means that PII may be stored and processed in multiple locations instead of a single, centralized network.
According to a report from ESG, the amount of sensitive data stored in public clouds is expected to double by 2024, and more than half of organizations believe that this data is not sufficiently secure.
To safeguard PII, organizations typically create data privacy frameworks. These frameworks can take different forms depending on the organization, the PII it collects, and the data privacy regulations it must follow. As an example, the National Institute of Standards and Technology (NIST) provides this sample framework:
1. Identify all PII in the organization's systems.
2. Minimize the collection and use of PII, and regularly dispose of any PII no longer needed.
3. Categorize PII according to sensitivity level.
4. Apply data security controls. Example controls may include:
- Encryption: Encrypting PII in transit, at rest, and in use through homomorphic encryption or confidential computing can help keep PII secure and compliant regardless of where it is stored or handled.
- Identity and access management (IAM): Two-factor or multifactor authentication can place more barriers between hackers and sensitive data. Similarly, enforcing the principle of least privilege through zero trust architecture and role-based access controls (RBAC) can limit the amount of PII hackers can access if they breach the network.
- Training: Employees learn how to properly handle and dispose of PII. The employees also learn how to protect their own PII. This training covers areas like anti-phishing, social engineering and social media awareness.
- Anonymization: Data anonymization is the process of removing the identifying characteristics of sensitive data. Common anonymization techniques include stripping identifiers from data, aggregating data or strategically adding noise to the data.
- Cybersecurity tools: Data loss prevention (DLP) tools can help track data as it moves throughout the network, making it easier to detect leaks and breaches. Other cybersecurity solutions that offer high-level views of activity on the network—such as extended detection and response (XDR) tools—can also assist in tracking the use and misuse of PII.
5. Draft an incident response plan for PII leaks and breaches.
It's worth noting that NIST and other data privacy experts often recommend applying different controls to different data sets based on how sensitive the data is. Using strict controls for non-sensitive data may be cumbersome and not cost-effective.