Future of AIAI

The data breach surge: Why identity must evolve

By Doriel Abrahams, Principal Technologist at Forter

Data breaches today aren’t just a security issue; they are a direct hit to hard earned consumer trust. Every compromised record ultimately chips away at customer confidence, inviting regulatory scrutiny and exposing organisations to reputational and financial damage. Yet even with the rise of AI threat monitoring and advanced detection, the core problem persists that many companies are still using email addresses and passwords as their only form of identity verification – when in fact these are static, easily guessed, and often breached. 

Cybercrime is no longer the work of faceless hackers in dark rooms, but of sophisticated fraud rings operating as legitimate businesses, opportunists exploiting pricing arbitrage opportunities, and social-engineering specialists targeting weak links. They adapt fast, tapping into anything exploitable, and they won’t wait for your next security release. Over the past three months we have observed a stark spike in data breaches across a number of sectors, as businesses large and small have fallen victim to determined hackers who have identified and exploited their weaknesses. 

Poor data access controls in third-party systems can create a perfect storm for opportunistic cybercriminals and give them access to seemingly innocent records we often overlook, such as our names, emails and date of birth – which provide more than enough for fraudsters. These fields can fuel credential stuffing attacks, spear phishing lures and synthetic identities that are apt to slip past legacy detection systems.  

If something is left exposed – whether it’s data, a discount code, or a loophole in the returns process – it is open to being exploited. The mindset of a fraudster is always opportunistic and if they can steal it, they will. 

Lessons for digital identity strategy 

One key lesson from the recent surge in breaches is that digital identity needs a fundamental reset. Static personal data has long been used as a gatekeeper for authentication: names, emails, birthdates. But while these attributes might help tailor customer experiences, they simply aren’t secure enough to verify who someone is. Once that data is exposed, its integrity is lost, and with it, the trust it was meant to establish. 

While businesses often invest heavily in securing their internal systems, it’s easy to overlook the role that vendors and third-party platforms play in the broader security landscape. These aren’t external concerns; they’re integrated into the ecosystem. Every connection introduces risk. If partners aren’t held to the same standards as in-house teams, the defences are incomplete. 

In today’s interconnected world, security isn’t something you protect in isolation. It’s something you enforce collectively, across every touchpoint where trust is expected. 

Transparency after a breach is also essential, but it doesn’t prevent the damage. Real protection comes from designing identity frameworks that render stolen data useless. That means building systems rooted in cryptography, dynamic context, and behaviour – and not just personal details that can be guessed, scraped or recycled. 

Passwords don’t cut it anymore 

Passwords are the weakest link. Easy to guess, often reused, and vulnerable to phishing. Even what are often deemed as strong password policies can’t stop human behaviour or prevent credentials from ending up in breach dumps. 

Passwordless authentication and moving towards a passwordless society propels security forward. It uses asymmetric cryptography, biometrics, or device-specific keys, meaning that there’s no shared secret to steal – just cryptographic proof tied to the individual and their device. It’s safer, faster, and frictionless when done right. 

But going passwordless isn’t just about turning on a new feature. It requires updates across backend architecture such as the stack, identity protocols like FIDO2, seamless enrolment flows, and cross-team collaboration between engineering, support, and customer experience. In this way, the change is not only technological, but social, and requires new ways of working. 

Context is the new frontline 

Even robust authentication should adapt in real time. Risk-based decisions driven by location, device fingerprint, behavioural patterns, and network environment turn authentication into a living process. Suspicious activity triggers step-up verification, while regular users get seamless access. 

Decentralised identity: Giving power back 

Centralised identity storage creates massive breach risk. Decentralised models offer an alternative which gives users control, allowing them to share only what’s necessary. It aligns with data minimisation and modern privacy regulations while reducing the attack surface.  

The role of zero trust 

Zero trust isn’t a buzzword: it’s architecture in action. Every request must prove its validity. Access is limited to the bare minimum, and high-risk actions always prompt fresh checks. Even successful logins don’t mean full access. This layered defence disrupts attackers ability to move freely inside environments. 

Combined with contextual authentication and passwordless tech, zero trust builds depth and not just walls which can be broken down with a weakness. 

The individual’s part 

Technology alone won’t fix identity. Individuals need to be equipped and not just protected. Multi-factor authentication is critical. Awareness of phishing tactics, secure password management, and breach monitoring all play a role. Unfortunately, one of the biggest challenges victims often face is sadly the shame associated with being scammed. This mindset also needs shifting, and this can be done through greater education around cyber vigilance and encouraging transparency.  

Stepping forward 

It is time for a reckoning with outdated identity frameworks such as the static data and susceptible passwords; the relics fraudsters exploit daily. Modern identity must be dynamic, cryptographically secure, and context-aware by default. 

Consumer trust is not a single action today, but the ongoing art of balancing frictionless experiences with uncompromising protection. Identity isn’t static and neither is fraud, so our verification processes shouldn’t be either. 

Author

Related Articles

Back to top button