{"id":6423,"date":"2021-06-29T14:47:39","date_gmt":"2021-06-29T12:47:39","guid":{"rendered":"https:\/\/edorteam.com\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/"},"modified":"2026-05-04T17:28:30","modified_gmt":"2026-05-04T15:28:30","slug":"incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them","status":"publish","type":"post","link":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/","title":{"rendered":"Incidents that may cause a breach of personal data according to the AEPD and how to avoid them"},"content":{"rendered":"<div class=\"et_pb_section_0 et_pb_section et_section_regular et_block_section\"><div class=\"et_pb_row_0 et_pb_row et_block_row\"><div class=\"et_pb_column_0 et_pb_column et_pb_column_4_4 et-last-child et_block_column et_pb_css_mix_blend_mode_passthrough\"><div class=\"et_pb_text_0 et_pb_text et_pb_bg_layout_light et_pb_module et_block_module\"><div class=\"et_pb_text_inner\"><p>Recently, the AEPD has published an update of its  <a href=\"https:\/\/www.aepd.es\/es\/node\/799\" target=\"_blank\" rel=\"noopener\"><strong><em>Guide for the notification of personal data breaches<\/em><\/strong><\/a> , a useful document so that those responsible for processing personal data know when to <strong>report a breach to the supervisory authority,<\/strong> in what term, or who and what content should include that notification.<\/p>\n<p>In addition to publishing the new guide, the AEPD makes a<strong> assessment of the current situation<\/strong> in terms of personal data breaches, of which we highlight this fragment:<\/p>\n<blockquote>\n<p><em>\"The Agency has managed more than 700 data breaches reported in the first five months of 2021. Most of them have been caused by an external and intentional attack, ransomware being the most frequent threat, compromising not only availability but also confidentiality of personal data \".<\/em><\/p>\n<\/blockquote>\n<\/div><\/div><div class=\"et_pb_text_1 et_pb_text et_pb_bg_layout_light et_pb_module et_block_module\"><div class=\"et_pb_text_inner\"><h2>If you do not apply these cybersecurity measures in your company, you are in breach of the LOPD and RGPD<\/h2>\n<p>We insist on the importance of<strong> implement preventive security measures<\/strong> as the only effective way to protect the personal data that your company guards against cyberattacks, abuse of internal privileges or human errors.<\/p>\n<p>We recall that the LOPD requires the implementation of<strong> following cybersecurity measures<\/strong> for correct compliance:<\/p>\n<ul>\n<li>Register and control the accesses made to files and programs that contain personal data. To do this, you need a<a href=\"\/et-seguridad-software-productividad-empresa\/\"> registration and access control software such as ET Seguridad.<\/a><\/li>\n<li>Limit the resources of the computer equipment to which users have access only to those they need for the development of their work functions (also possible with<a href=\"\/et-seguridad-software-productividad-empresa\/\"> ET Security<\/a> ).<\/li>\n<li>Encrypt or password protect files, programs and removable devices that contain personal data,<a href=\"\/cifrado-seguro-archivos-aes-256\/\"> something possible with ET Encrypt<\/a> , included free of charge with ET Seguridad.<\/li>\n<li>Last but not least, you need to make physical and online backups of all the data on your business network. Cloud copies should be stored encrypted and duplicated elsewhere,<a href=\"https:\/\/nova.edorteam.com\/et-backup-cloud-backup\/?lang=en\"> as we offer with ET Backup<\/a> . This is the only truly effective weapon against ransomware attacks, as they are becoming increasingly aggressive and difficult to block.<\/li>\n<\/ul>\n<\/div><\/div><div class=\"et_pb_text_2 et_pb_text et_pb_bg_layout_light et_pb_module et_block_module\"><div class=\"et_pb_text_inner\"><h2>Avoid most personal data breaches with ET Seguridad<\/h2>\n<p>The AEPD includes in its new guide the<strong> incidents that can cause a security breach<\/strong> . In this table we detail which are the most common and how to prevent them:<\/p>\n<\/div><\/div><div class=\"et_pb_text_3 et_pb_text et_pb_bg_layout_light et_pb_module et_block_module\"><div class=\"et_pb_text_inner\"><table border=\"1\" style=\"width: 100%; border-collapse: collapse; border-style: solid; border-color: #e5e5e5; height: 706px;\" cellpadding=\"10\" cellspacing=\"10\">\n<tbody>\n<tr style=\"height: 66px;\">\n<th style=\"width: 36.5407%; height: 66px; vertical-align: bottom;\">\n<h4><strong>Guiding incident<\/strong><\/h4>\n<\/th>\n<th style=\"width: 63.4593%; height: 66px; vertical-align: bottom;\">\n<h4><strong>How does ET Seguridad solve it?<\/strong><\/h4>\n<\/th>\n<\/tr>\n<tr style=\"height: 128px;\">\n<td style=\"width: 36.5407%; height: 128px;\"><strong>Unauthorized modification or deletion of personal data<\/strong><\/td>\n<td style=\"width: 63.4593%; height: 128px;\">\n<ul>\n<li>Configure user profiles to limit access and functions of the computer equipment.<\/li>\n<li>In the event of an incident, the activity log will determine who and when deleted or modified the data.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 152px;\">\n<td style=\"width: 36.5407%; height: 152px;\"><strong>Abuse of access privileges to extract, forward or copy personal data<\/strong><\/td>\n<td style=\"width: 63.4593%; height: 152px;\">\n<ul>\n<li>Configure user profiles to limit access and functions of the computer equipment.<\/li>\n<li>Control access to certain files with username and password.<\/li>\n<li>In the event of an incident, the activity log will record who, when and what actions performed on the IT equipment.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 104px;\">\n<td style=\"width: 36.5407%; height: 104px;\"><strong>Personal data sent by mistake electronically<\/strong><\/td>\n<td style=\"width: 63.4593%; height: 104px;\">\n<ul>\n<li>Use the ET Encrypt tool to encrypt any document with personal data that you are going to send over the internet. Thus, in case of human error, you will prevent them from reading the content.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 104px;\">\n<td style=\"width: 36.5407%; height: 104px;\"><strong>Lost or stolen device<\/strong><\/td>\n<td style=\"width: 63.4593%; height: 104px;\">\n<ul>\n<li>Use the ET Encrypt tool to preventively encrypt your removable USB devices. Thus, in case of loss or theft, you will prevent them from accessing its content.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 152px;\">\n<td style=\"width: 36.5407%; height: 152px;\"><strong>Cyber incident: unauthorized access to personal data<\/strong><\/td>\n<td style=\"width: 63.4593%; height: 152px;\">\n<ul>\n<li>Configure user profiles to prevent unauthorized access to confidential information.<\/li>\n<li>Control access to documents containing personal data with username and password, or store them always encrypted.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div><\/div><div class=\"et_pb_blurb_0 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_left et_pb_module et_block_module\"><div class=\"et_pb_blurb_content\"><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">Remember that, if you always predict documents containing personal data, it will not be necessary to notify the AEPD in the event of a cyber-incident or human error.<\/h4><div class=\"et_pb_blurb_description\"><p>The reason for this is that, in the event that a file falls into the hands of an unauthorized third party, if it was previously encrypted, it will not be possible to access its content unless you know the password. Therefore,<strong> confidential information will remain intact, thus avoiding a personal data breach.<\/strong><\/p>\n<p>The preventive encryption of sensitive information, whether it is the one you store on your computer or the one you send over the internet, is a very simple habit once it has been acquired and is very beneficial for business activity, since it protects you, not only from external attacks, but from inadvertent human errors.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"et_pb_section_1 et_pb_section et_section_regular et_block_section et_animated\"><div class=\"et_pb_row_1 et_pb_row et_pb_equal_columns et_pb_gutters1 et_block_row\"><div class=\"et_pb_column_1 et_pb_column et_pb_column_1_2 et_block_column et_pb_css_mix_blend_mode_passthrough\"><div class=\"et_pb_text_4 et_pb_text et_pb_bg_layout_light et_pb_module et_block_module\"><div class=\"et_pb_text_inner\"><h3>Get ET Security at a special price<\/h3>\n<p>Request your personalized offer and start applying all these digital security measures. Get<strong> complete LOPD security.<\/strong><\/p>\n<\/div><\/div><div class=\"et_pb_module et_pb_button_module_wrapper et_pb_button_0_wrapper\"><a class=\"et_pb_button_0 et_pb_button et_pb_bg_layout_dark et_pb_module et_block_module\" href=\"https:\/\/nova.edorteam.com\/clientes-etseguridad\/\">Request offer<\/a><\/div><\/div><div class=\"et_pb_column_2 et_pb_column et_pb_column_1_2 et-last-child et_block_column et_pb_css_mix_blend_mode_passthrough et_clickable\"><div class=\"et_pb_divider_0 et_pb_divider_hidden et_pb_space et_pb_divider_position_top et_pb_module\"><div class=\"et_pb_divider_internal\"><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":6186,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110,106,122],"tags":[117,119,124,120,123,118,125,121],"class_list":["post-6423","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-data-protection-and-rgpd","category-file-encryption","tag-access-control","tag-aepd-en","tag-aes-256-en","tag-cyber-attack","tag-data-confidentiality","tag-data-protection","tag-encrypt-files","tag-ransomware-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Incidents that cause personal data breaches and how to avoid them<\/title>\n<meta name=\"description\" content=\"Preventive security measures are the only effective way to protect the personal data that your company keeps. We explain how.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Incidents that cause personal data breaches and how to avoid them\" \/>\n<meta property=\"og:description\" content=\"Preventive security measures are the only effective way to protect the personal data that your company keeps. We explain how.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Edorteam\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/edorteam\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-29T12:47:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-04T15:28:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nova.edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"498\" \/>\n\t<meta property=\"og:image:height\" content=\"346\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Edorteam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@edorteam\" \/>\n<meta name=\"twitter:site\" content=\"@edorteam\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Edorteam\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/\"},\"author\":{\"name\":\"Edorteam\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#\\\/schema\\\/person\\\/4bb44f6c1a9e5938ce0a0e863b0c85dd\"},\"headline\":\"Incidents that may cause a breach of personal data according to the AEPD and how to avoid them\",\"datePublished\":\"2021-06-29T12:47:39+00:00\",\"dateModified\":\"2026-05-04T15:28:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/\"},\"wordCount\":18,\"commentCount\":10,\"publisher\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nova.edorteam.com\\\/wp-content\\\/uploads\\\/infraccion-lssi-cookies-banner-consentimiento.jpg\",\"keywords\":[\"access control\",\"aepd\",\"aes 256\",\"cyber attack\",\"data confidentiality\",\"Data Protection\",\"encrypt files\",\"ransomware\"],\"articleSection\":[\"Cybersecurity\",\"Data protection and RGPD\",\"File encryption\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/\",\"url\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/\",\"name\":\"Incidents that cause personal data breaches and how to avoid them\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nova.edorteam.com\\\/wp-content\\\/uploads\\\/infraccion-lssi-cookies-banner-consentimiento.jpg\",\"datePublished\":\"2021-06-29T12:47:39+00:00\",\"dateModified\":\"2026-05-04T15:28:30+00:00\",\"description\":\"Preventive security measures are the only effective way to protect the personal data that your company keeps. We explain how.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nova.edorteam.com\\\/wp-content\\\/uploads\\\/infraccion-lssi-cookies-banner-consentimiento.jpg\",\"contentUrl\":\"https:\\\/\\\/nova.edorteam.com\\\/wp-content\\\/uploads\\\/infraccion-lssi-cookies-banner-consentimiento.jpg\",\"width\":498,\"height\":346,\"caption\":\"Protect your data against accidental or malicious information leaks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Incidents that may cause a breach of personal data according to the AEPD and how to avoid them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/\",\"name\":\"Consultor\u00eda Compliance y protecci\u00f3n de datos\",\"description\":\"Empresa de Ciberseguridad y Protecci\u00f3n de Datos\",\"publisher\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#organization\"},\"alternateName\":\"Edorteam\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#organization\",\"name\":\"Edorteam | Cibersecurity services and data protection company\",\"alternateName\":\"Edorteam\",\"url\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nova.edorteam.com\\\/wp-content\\\/uploads\\\/cropped-favicon.png\",\"contentUrl\":\"https:\\\/\\\/nova.edorteam.com\\\/wp-content\\\/uploads\\\/cropped-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Edorteam | Cibersecurity services and data protection company\"},\"image\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/edorteam\\\/\",\"https:\\\/\\\/x.com\\\/edorteam\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/edorteam\\\/\",\"https:\\\/\\\/www.instagram.com\\\/edorteam\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#\\\/schema\\\/person\\\/4bb44f6c1a9e5938ce0a0e863b0c85dd\",\"name\":\"Edorteam\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g\",\"caption\":\"Edorteam\"},\"sameAs\":[\"http:\\\/\\\/edorteam.com\"],\"url\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/author\\\/web_edorteam\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Incidents that cause personal data breaches and how to avoid them","description":"Preventive security measures are the only effective way to protect the personal data that your company keeps. We explain how.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Incidents that cause personal data breaches and how to avoid them","og_description":"Preventive security measures are the only effective way to protect the personal data that your company keeps. We explain how.","og_url":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/","og_site_name":"Edorteam","article_publisher":"https:\/\/www.facebook.com\/edorteam\/","article_published_time":"2021-06-29T12:47:39+00:00","article_modified_time":"2026-05-04T15:28:30+00:00","og_image":[{"width":498,"height":346,"url":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg","type":"image\/jpeg"}],"author":"Edorteam","twitter_card":"summary_large_image","twitter_creator":"@edorteam","twitter_site":"@edorteam","twitter_misc":{"Written by":"Edorteam"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#article","isPartOf":{"@id":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/"},"author":{"name":"Edorteam","@id":"https:\/\/nova.edorteam.com\/en\/#\/schema\/person\/4bb44f6c1a9e5938ce0a0e863b0c85dd"},"headline":"Incidents that may cause a breach of personal data according to the AEPD and how to avoid them","datePublished":"2021-06-29T12:47:39+00:00","dateModified":"2026-05-04T15:28:30+00:00","mainEntityOfPage":{"@id":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/"},"wordCount":18,"commentCount":10,"publisher":{"@id":"https:\/\/nova.edorteam.com\/en\/#organization"},"image":{"@id":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg","keywords":["access control","aepd","aes 256","cyber attack","data confidentiality","Data Protection","encrypt files","ransomware"],"articleSection":["Cybersecurity","Data protection and RGPD","File encryption"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/","url":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/","name":"Incidents that cause personal data breaches and how to avoid them","isPartOf":{"@id":"https:\/\/nova.edorteam.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#primaryimage"},"image":{"@id":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg","datePublished":"2021-06-29T12:47:39+00:00","dateModified":"2026-05-04T15:28:30+00:00","description":"Preventive security measures are the only effective way to protect the personal data that your company keeps. We explain how.","breadcrumb":{"@id":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#primaryimage","url":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg","contentUrl":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/infraccion-lssi-cookies-banner-consentimiento.jpg","width":498,"height":346,"caption":"Protect your data against accidental or malicious information leaks"},{"@type":"BreadcrumbList","@id":"https:\/\/nova.edorteam.com\/en\/incidents-that-may-cause-a-breach-of-personal-data-according-to-the-aepd-and-how-to-avoid-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/nova.edorteam.com\/en\/"},{"@type":"ListItem","position":2,"name":"Incidents that may cause a breach of personal data according to the AEPD and how to avoid them"}]},{"@type":"WebSite","@id":"https:\/\/nova.edorteam.com\/en\/#website","url":"https:\/\/nova.edorteam.com\/en\/","name":"Consultor\u00eda Compliance y protecci\u00f3n de datos","description":"Empresa de Ciberseguridad y Protecci\u00f3n de Datos","publisher":{"@id":"https:\/\/nova.edorteam.com\/en\/#organization"},"alternateName":"Edorteam","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nova.edorteam.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nova.edorteam.com\/en\/#organization","name":"Edorteam | Cibersecurity services and data protection company","alternateName":"Edorteam","url":"https:\/\/nova.edorteam.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nova.edorteam.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/cropped-favicon.png","contentUrl":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/cropped-favicon.png","width":512,"height":512,"caption":"Edorteam | Cibersecurity services and data protection company"},"image":{"@id":"https:\/\/nova.edorteam.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/edorteam\/","https:\/\/x.com\/edorteam","https:\/\/www.linkedin.com\/company\/edorteam\/","https:\/\/www.instagram.com\/edorteam\/"]},{"@type":"Person","@id":"https:\/\/nova.edorteam.com\/en\/#\/schema\/person\/4bb44f6c1a9e5938ce0a0e863b0c85dd","name":"Edorteam","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g","caption":"Edorteam"},"sameAs":["http:\/\/edorteam.com"],"url":"https:\/\/nova.edorteam.com\/en\/author\/web_edorteam\/"}]}},"_links":{"self":[{"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/posts\/6423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/comments?post=6423"}],"version-history":[{"count":1,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/posts\/6423\/revisions"}],"predecessor-version":[{"id":20307,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/posts\/6423\/revisions\/20307"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/media\/6186"}],"wp:attachment":[{"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/media?parent=6423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/categories?post=6423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/tags?post=6423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}