PROTECTING EMPLOYEE DATA FROM PHISHING: A COMPLETE FRAMEWORK FOR DETECTION, PREVENTION, AND RESPONSE
A comprehensive guide to protecting employee personally identifiable information (PII) from phishing attacks. Covers how phishing targets employee data, real breach cases, detection checklists, NIST-based prevention frameworks, zero-trust access controls, and incident response procedures grounded in FBI IC3, IRS, and NIST guidance.
How Do You Protect Employee Data from Phishing Attacks?
The direct answer
Protecting employee data from phishing requires layering email authentication (SPF, DKIM, DMARC), behavioral AI email security, zero-trust access controls, phishing-resistant multi-factor authentication, and continuous security awareness training. Employee personally identifiable information (PII) is the most targeted data type in phishing attacks, with breaches involving employee PII costing organizations an average of $4.90 million (IBM, 2024). The FBI reported $2.77 billion in BEC losses in 2024, and phishing accounts for 16% of all initial breach vectors.
What is employee data phishing?
Employee data phishing is a category of social engineering attack in which criminals use deceptive emails, messages, or websites to trick employees or the people who manage employee records into disclosing sensitive personal information, credentials, or access to systems that store employee data.
The employee data targeted in these attacks includes personally identifiable information (PII) such as Social Security numbers, home addresses, dates of birth, bank account numbers for direct deposit, W-2 tax forms, health insurance information, and corporate credentials that provide access to HR systems, payroll platforms, and internal databases.
Employee data phishing takes several forms. In credential phishing, attackers impersonate trusted platforms like Microsoft 365 or Google Workspace to harvest login credentials that unlock HR and payroll systems. In business email compromise (BEC), attackers impersonate executives to request employee records, W-2 data, or payroll changes directly from HR or finance staff. In spear phishing, attackers target specific employees with personalized messages designed to install malware, steal credentials, or extract sensitive data. In payroll diversion, attackers impersonate employees and request changes to direct deposit information, redirecting paychecks to accounts they control.
NIST defines phishing as "a technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person" (NIST SP 800-83). The FBI classifies attacks targeting employee PII and W-2 data as a specific "Data Theft" variant of business email compromise (FBI.gov).
Employee data is among the most valuable targets in cybercrime because it enables cascading attacks: a single credential compromise can unlock systems containing thousands of employee records, and a single W-2 disclosure can expose every employee in an organization simultaneously.
Why does protecting employee data from phishing matter?
The intersection of phishing and employee data creates a threat that is simultaneously high-frequency, high-impact, and high-cost.
Employee PII is the most expensive data type to lose. Employee PII breaches cost organizations an average of $4.90 million, exceeding even customer PII breaches at $4.44 million (IBM Cost of a Data Breach Report, 2024). The cost per compromised employee record reached $168 in 2025, and breaches involving PII of any type account for over 53% of all data breaches (IBM, 2025). The majority of breaches target employee and customer PII, which costs between $160 and $168 to contain per record (StrongDM, 2025).
Phishing is the leading initial attack vector. Phishing replaced stolen credentials in 2025 as the most common initial vector attackers use to gain access to systems, accounting for 16% of all breaches (IBM, 2025). Approximately 36% of all data breaches involve phishing, and 80% of phishing campaigns specifically aim to steal credentials targeting cloud services like Microsoft 365 and Google Workspace (TechMagic, Verizon DBIR). Social engineering appeared among the top three breach patterns in 13 of the 16 industries analyzed in the Verizon 2025 DBIR.
The human element remains the primary vulnerability. Sixty percent of data breaches in 2025 involved a human element such as falling for phishing or credential misuse (Verizon DBIR, 2025). An estimated 95% of all data breaches can be attributed to human error, including poor cyber hygiene and susceptibility to phishing (Mimecast). In phishing simulations, the median time to click a malicious link is 21 seconds, and the median time to enter data on a phishing page is 28 seconds (Verizon, 2025).
BEC targeting employee data causes billions in losses. The FBI's Internet Crime Complaint Center reported $2.77 billion in BEC losses and 21,442 complaints in 2024. Total cybercrime losses reached $16.6 billion, a 33% increase from 2023 (FBI IC3, 2024 Annual Report). BEC attacks specifically targeting W-2 data, payroll changes, and direct deposit diversions have compromised workforces of major organizations including Snapchat (all employee W-2s), Sprouts Farmers Market (21,000 employees), and Seagate (10,000 employees).
Stolen credentials fuel further attacks. SpyCloud recaptured 53.3 billion distinct identity records circulating on the dark web in 2024, a 22% increase from 2023. Nearly 80% of breaches involved the use of stolen credentials (SpyCloud Identity Exposure Report, 2025). When employee credentials are stolen through phishing, they become the entry point for ransomware, account takeover, lateral movement across internal systems, and access to databases containing thousands of additional employee records.
Regulatory and legal exposure is increasing. Over one-third of organizations incur regulatory fines following a data breach, and only 8% of fined organizations paid less than $25,000 (StrongDM, 2025). Depending on jurisdiction, employee data breaches can trigger notification requirements under GDPR, HIPAA, CCPA, and state-specific breach notification laws, along with potential class-action litigation from affected employees.
The average employee data breach does not just cost money. It compromises the personal financial security of every affected employee and creates cascading legal, regulatory, and reputational liabilities.
How do phishing attacks steal employee data?
Phishing attacks targeting employee data follow escalating levels of sophistication, from mass credential harvesting to highly targeted executive impersonation.
Step 1: Reconnaissance and target identification
Attackers identify target organizations and the individuals who control access to employee data. LinkedIn, corporate websites, job postings, and social media reveal organizational hierarchies, HR leadership, payroll contacts, and the technology platforms in use (e.g., Workday, ADP, BambooHR). AI tools now automate this reconnaissance, building personalized vulnerability profiles with 88% accuracy according to recent research.
Step 2: Credential phishing
The most common attack vector is a phishing email impersonating a trusted platform. Attackers send emails mimicking Microsoft 365 login pages, Google Workspace authentication prompts, or HR platform password resets. The emails direct recipients to credential harvesting pages that capture usernames and passwords. Approximately 80% of phishing campaigns aim to steal credentials, and Microsoft remains the most impersonated brand (TechMagic, Hoxhunt Threat Intelligence Report 2026).
Step 3: Account takeover
Once credentials are captured, attackers log in to the employee's corporate accounts. If the compromised account belongs to an HR or payroll administrator, the attacker now has direct access to employee databases, tax records, benefits information, and personnel files. If multi-factor authentication is in place but uses SMS or app-based methods, attackers deploy adversary-in-the-middle (AiTM) techniques to intercept session tokens, a tactic that surged 146% in 2024.
Step 4: Executive impersonation and BEC
In parallel or alternatively, attackers impersonate a CEO, CFO, or other executive and email HR, payroll, or finance staff directly requesting employee records. The requests target W-2 data, employee rosters with Social Security numbers, salary information, direct deposit details, or benefits enrollment data. The emails use urgency language ("I need this for the board meeting today") and confidentiality instructions ("please keep this between us") to prevent verification. Hoxhunt's 2026 Threat Intelligence Report documents the growing use of "fake email chain" techniques where attackers fabricate prior conversation threads to make requests appear to be continuations of legitimate business discussions.
Step 5: Payroll diversion
A variant attack targets individual employee records rather than bulk data. Attackers impersonate a specific employee and email HR or use a compromised employee self-service portal to change direct deposit bank account information. Paychecks are then redirected to accounts controlled by the attacker. The FBI has identified payroll diversion as a growing BEC sub-category.
Step 6: Data exfiltration and monetization
Stolen employee data is either used directly for identity theft (fraudulent tax returns, credit applications, medical identity theft), sold on dark web marketplaces, or leveraged for secondary attacks against the affected employees and organization. SpyCloud's research indicates the scale of identity data circulating in criminal networks reached 53.3 billion records in 2024. The IRS estimates billions in annual losses from tax-related identity theft enabled by stolen Social Security numbers and W-2 data.
Phishing attacks on employee data exploit the gap between the speed of human trust decisions (21 seconds to click) and the time required for organizational controls to intervene.
What are real cases of employee data stolen through phishing?
Snapchat (February 2016)
An HR employee at Snapchat received an email impersonating CEO Evan Spiegel requesting W-2 data for all current and former employees. The employee compiled and sent the complete payroll dataset before the company identified the email as fraudulent. Snapchat disclosed the breach publicly, notified the FBI, and offered two years of identity theft insurance and monitoring to affected employees (CNN, 2016).
Sprouts Farmers Market (March 2016)
A payroll employee at Sprouts Farmers Market sent 2015 W-2 statements for the entire workforce, approximately 21,000 employees, to an attacker impersonating a company executive. The breach exposed names, Social Security numbers, home addresses, and wages. Sprouts confirmed the incident was being investigated with the FBI and IRS, and provided one year of credit monitoring to affected employees (Trend Micro, 2016).
Activision (December 2022)
An Activision employee's credentials were stolen through an SMS phishing attack (smishing). The stolen credentials provided access to internal systems containing employee data and content release schedules. The breach demonstrated how a single credential compromise through phishing can cascade into access to multiple internal data repositories.
700Credit (2025)
700Credit, a credit check and identity verification provider serving auto dealerships, disclosed a data breach affecting 5.6 million individuals. An attacker accessed data collected from dealerships between May and October 2025, stealing full names, home addresses, dates of birth, and Social Security numbers. Michigan Attorney General Dana Nessel urged affected individuals to immediately freeze credit and monitor for identity theft (Cybernews, Bright Defense, 2025).
Broader pattern: the 2025 landscape
The Identity Theft Resource Center tracked over 3,158 data compromises in 2024, generating 1.3 billion victim notices, approximately six for every adult in the United States. In 2025, 30% of data breaches involved third-party vendors, double the rate from 2024 (Verizon, 2025). The Verizon DBIR confirmed that social engineering remained among the top three breach patterns across nearly every industry analyzed.
These cases confirm a consistent pattern: employee data breaches begin with a single phishing message and end with organizational-scale exposure.
How do you detect phishing attacks targeting employee data?
Traditional advice to "look for typos" is inadequate against modern phishing. AI-generated phishing emails now feature perfect grammar, accurate branding, and personalized context. Use this updated detection framework.
Sender authentication failure. Check whether the email passes SPF, DKIM, and DMARC validation. Emails impersonating internal addresses from external domains should fail DMARC alignment. Many email clients display authentication results in message headers. If your organization has deployed DMARC at enforcement level (p=reject), spoofed external emails should not reach inboxes at all.
Display name and domain mismatch. Examine the full sender address, not just the display name. An email showing "John Smith, CEO" in the display name but originating from john.smith.ceo@gmail.com or from a lookalike domain (company-inc.com vs. companyinc.com) is an impersonation attempt.
Unusual data requests. Any email requesting employee Social Security numbers, W-2 forms, salary data, direct deposit changes, employee rosters, or credentials should be treated as suspicious by default. Legitimate internal processes for handling this data should use secure systems, not email.
Urgency paired with confidentiality. The combination of "send this immediately" with "keep this between us" or "do not discuss with anyone else" is the most reliable behavioral indicator of BEC. Legitimate executives rarely instruct subordinates to bypass established procedures in secret.
Credential harvesting indicators. Emails directing recipients to "verify your account," "update your password," or "confirm your identity" through embedded links frequently lead to credential harvesting pages. Hover over links to verify the destination URL matches the legitimate domain before clicking. Microsoft, Google, DocuSign, and ADP are among the most impersonated platforms.
Timing anomalies. Phishing campaigns frequently arrive outside normal business hours or when the impersonated sender is known to be unavailable. A CEO sending a data request at 2:00 a.m. from an email address that does not match internal systems should trigger immediate verification.
Context mismatches. AI-generated phishing may reference correct project names or colleague names but use slightly incorrect terminology, reference processes that don't exist in your organization, or display a communication style that doesn't match the supposed sender's typical patterns.
Payroll change requests without in-person verification. Any request to modify direct deposit information, tax withholding, or benefit elections received via email should require in-person or phone verification before processing. Payroll diversion attacks rely entirely on bypassing this step.
The most reliable detection principle is not identifying suspicious content but verifying every request involving employee data through a separate, authenticated communication channel.
How do You prevent employee data phishing?
Protecting employee data from phishing requires a layered defense that combines technical controls, access governance, organizational policy, and human training. No single control is sufficient.
1. Deploy email authentication at enforcement level
Implement SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting and Conformance) with DMARC policy set to p=reject or p=quarantine. This prevents external attackers from sending emails that appear to originate from your domain. NIST SP 800-177 (Trustworthy Email) provides comprehensive implementation guidance. Email authentication is the single most effective technical control against domain spoofing.
2. Deploy behavioral AI email security
Signature-based email filters miss BEC and spear phishing because these emails contain no malware, no malicious URLs, and no attachments. They are pure social engineering. Behavioral AI tools analyze sender patterns, communication relationships, message intent, and linguistic anomalies to detect impersonation attempts. Deploy a solution that flags emails where the display name matches an internal executive but the sending domain is external, and that detects anomalous requests for sensitive data.
3. Implement zero-trust access controls
Apply the principle of least privilege to all systems containing employee data. Only designated personnel should have access to HR platforms, payroll systems, and employee databases, and only through authenticated, audited channels. Solutions like StrongDM provide unified privileged access management across infrastructure, enforcing just-in-time access, real-time session monitoring, and comprehensive audit trails that record exactly who accessed what employee data and when. Zero-trust architecture reduces breach costs by an average of $1.76 million compared to organizations without zero-trust controls (IBM, 2025). StrongDM's approach eliminates persistent credentials entirely, which removes the primary attack vector (credential theft) that phishing depends on for system access.
4. Deploy phishing-resistant multi-factor authentication
Standard SMS and app-based MFA is increasingly bypassed through adversary-in-the-middle attacks. NIST SP 800-63B recommends phishing-resistant MFA using FIDO2/WebAuthn hardware security keys that cryptographically verify the authenticating domain. Prioritize phishing-resistant MFA for all accounts with access to employee data systems, executive accounts, and IT administrator accounts. StrongDM enforces biometric or hardware-backed multi-factor authentication for all access to systems that process or store sensitive data.
5. Establish written data handling policies
Create formal policies that explicitly prohibit the transmission of employee PII, W-2 data, Social Security numbers, or salary information via email under any circumstances. Define approved channels (encrypted HR portals, secure file transfer) and require dual authorization for any bulk disclosure of employee data. Ensure every employee in HR, payroll, and finance has acknowledged these policies in writing.
6. Mandate out-of-band verification
Require that any request for employee data, payroll changes, or direct deposit modifications be verified through a separate communication channel (phone call to a known number, in-person confirmation) before any action is taken. The FBI advises: "Don't rely on e-mail alone" (FBI.gov). This single policy would have prevented the Snapchat, Sprouts, and Seagate W-2 breaches.
7. Run adaptive phishing simulations
Generic annual security training is insufficient against targeted attacks. Deploy adaptive phishing simulation platforms that replicate real-world attack scenarios including executive impersonation, W-2 requests, payroll diversion, and credential harvesting. Hoxhunt's research demonstrates that organizations running adaptive simulations see phishing failure rates drop by 5.5x within 12 months, from 11% to below 2% (Hoxhunt Phishing Trends Report, 2025). Simulations should include the "fake email chain" technique identified in Hoxhunt's 2026 Threat Intelligence Report as an increasingly common tactic.
8. Monitor for credential exposure
Subscribe to threat intelligence services that monitor for compromised employee credentials on the dark web and in breach datasets. SpyCloud recaptured 53.3 billion identity records in 2024. Proactive detection of exposed credentials enables forced password resets before attackers can use them. Combine credential monitoring with just-in-time access controls that minimize the window of exposure when credentials are compromised.
9. Segment and audit access to employee data
Separate employee data systems from general corporate networks. Audit access logs regularly for anomalous queries, bulk exports, or access from unusual locations or devices. StrongDM's session recording capability enables organizations to replay access events in real time, providing forensic evidence of exactly what happened in the event of a breach (StrongDM, 2025). Configure alerts for any bulk export of employee records.
10. Conduct pre-tax-season security briefings
Before each tax season (December through January), conduct targeted briefings for all HR, payroll, and finance staff. Review the IRS Dirty Dozen scam list, share current phishing examples, and reinforce the out-of-band verification requirement for all employee data requests. The IRS's annual National Tax Security Awareness Week provides ready-made resources.
The organizations that protect employee data most effectively treat phishing as a systemic risk requiring layered controls, not as an awareness problem that training alone can solve.
What should you do if employee data is compromised through phishing?
Speed determines the difference between a contained incident and a cascading breach. Follow this response framework, aligned with NIST SP 800-61 (Computer Security Incident Handling Guide).
Phase 1: Containment (first 1 to 4 hours)
Isolate compromised accounts. Immediately disable or reset credentials for any accounts involved in the breach. If an executive email account was compromised, reset the account, terminate all active sessions, and revoke OAuth tokens. If an HR system was accessed, temporarily restrict access while the scope is assessed.
Preserve evidence. Capture full email headers, server logs, access logs from HR and payroll systems, and session recordings if available. Do not delete the phishing email or any communications. StrongDM's session recording enables real-time replay of access events to determine exactly what data was accessed during a compromise.
Determine scope. Identify which employee records were accessed or exfiltrated. Determine whether the breach involved a single employee's credentials, a targeted data request (e.g., W-2 data for all employees), or a payroll diversion targeting individual accounts.
Phase 2: Notification (within 24 to 72 hours)
Notify law enforcement. File a complaint with the FBI's Internet Crime Complaint Center (IC3) at ic3.gov. For W-2 data breaches specifically, email the IRS at dataloss@irs.gov with "W-2 Data Loss" in the subject line. Forward phishing emails to phishing@irs.gov. Notify state tax agencies at statealert@taxadmin.org.
Notify affected employees. Provide clear, factual communication about what data was compromised, when the breach occurred, and what specific protective actions employees should take. Recommended actions include filing IRS Form 14039 (Identity Theft Affidavit), filing tax returns immediately to preempt fraudulent filings, requesting an IRS Identity Protection PIN, placing fraud alerts or credit freezes with Equifax, Experian, and TransUnion, and monitoring bank and credit accounts for unauthorized activity.
Provide identity protection services. Offer at minimum 12 months of credit monitoring and identity theft protection through a reputable provider. For breaches involving Social Security numbers and W-2 data, 24 months is the recommended minimum based on the timeline for identity theft exploitation.
Phase 3: Remediation
Conduct root cause analysis. Determine how the phishing email bypassed technical controls, why the employee complied without verification, and which access controls failed to prevent unauthorized data access. Review whether email authentication, AI email security, MFA, and access governance policies were in place and functioning.
Implement corrective controls. Based on the root cause analysis, close the specific gaps that enabled the breach. This may include deploying or upgrading email authentication, implementing phishing-resistant MFA, tightening access controls to employee data systems, establishing formal data handling policies, or enhancing phishing simulation training.
Review and update the incident response plan. Incorporate lessons learned into the incident response playbook. Test the updated plan through tabletop exercises that simulate employee data phishing scenarios.
Phase 4: Regulatory compliance
Assess breach notification obligations under applicable laws including GDPR (72-hour notification to supervisory authority), HIPAA (60-day notification for health information), CCPA (notification to California residents), and state-specific breach notification statutes. Over one-third of organizations incur regulatory fines following a data breach (StrongDM, 2025). Engage legal counsel to ensure compliance with all applicable notification requirements.
The organizations that recover fastest from phishing incidents are those that had tested response plans, clear access audit trails, and established relationships with law enforcement before the breach occurred.
Frequently Asked Questions
What types of employee data do phishing attacks target most?
Phishing attacks most frequently target employee credentials (usernames and passwords for corporate systems), W-2 tax data (containing Social Security numbers, addresses, and wages), direct deposit bank account information, employee rosters with PII, health insurance information, and access credentials for HR and payroll platforms. Credentials are the most commonly targeted because they provide access to systems containing all other data types. Approximately 80% of phishing campaigns specifically aim to steal credentials (TechMagic, 2025).
Why is employee PII more expensive to lose than customer PII?
Employee PII breaches cost an average of $4.90 million compared to $4.44 million for customer PII breaches (IBM, 2024). The higher cost reflects several factors: employee data typically includes more sensitive identifiers (Social Security numbers, salary data, tax information), internal breach investigations are more complex, regulatory exposure under employment law is greater, and organizations face potential litigation from affected employees whose personal financial security has been compromised.
Can zero-trust architecture prevent employee data phishing?
Zero-trust architecture cannot prevent the phishing email itself, but it significantly limits the damage when an employee's credentials are compromised. Zero-trust controls enforce continuous verification, least-privilege access, and just-in-time authorization. This means that even if an attacker captures valid credentials, they cannot freely access employee data systems. IBM's 2025 Cost of a Data Breach Report found that zero-trust reduced breach costs by $1.76 million on average. StrongDM's zero-trust privileged access management eliminates persistent credentials entirely and provides real-time session monitoring, ensuring that compromised credentials cannot provide unchecked access to sensitive data.
How do you protect against payroll diversion phishing?
Payroll diversion occurs when attackers impersonate employees and request changes to direct deposit bank account information. Prevention requires mandatory out-of-band verification (phone call or in-person confirmation) for all payroll changes, multi-day processing delays for direct deposit modifications to allow employees to notice unauthorized changes, notification to the employee of record (at their known personal email and phone) whenever a payroll change is submitted, and auditing all self-service portal access for anomalous login patterns.
What should employees do personally if their data is exposed?
Employees should immediately file IRS Form 14039 (Identity Theft Affidavit) to alert the IRS, file their tax return as quickly as possible to preempt fraudulent filings, request an IRS Identity Protection PIN for future tax returns, place fraud alerts or credit freezes with Equifax (equifax.com), Experian (experian.com), and TransUnion (transunion.com), monitor all bank accounts and credit reports for unauthorized activity, and change passwords on all accounts that used the same or similar credentials. The IRS reporting channel for tax-related scams is phishing@irs.gov, and information is available at irs.gov/scams.
Executive summary (TL;DR)
Protecting employee data from phishing requires a layered defense combining email authentication, behavioral AI email security, zero-trust access controls, phishing-resistant MFA, adaptive training, and written data handling policies. Employee PII breaches cost organizations an average of $4.90 million (IBM, 2024), phishing is the leading initial attack vector at 16% of all breaches (IBM, 2025), and 60% of breaches involve a human element (Verizon, 2025). The FBI reported $2.77 billion in BEC losses in 2024. Real cases including Snapchat, Sprouts Farmers Market (21,000 employees), and 700Credit (5.6 million individuals) demonstrate the scale of damage from phishing-enabled employee data breaches. Technical controls must include SPF/DKIM/DMARC at enforcement level, behavioral AI email filtering, and zero-trust privileged access management that eliminates persistent credentials and provides audited, just-in-time access to employee data systems. Organizational controls must include written policies prohibiting employee data transmission via email, mandatory out-of-band verification for all data requests, and adaptive phishing simulations that replicate real-world BEC scenarios. If compromised, immediately report to the FBI IC3 at ic3.gov, the IRS at dataloss@irs.gov for W-2 breaches, and state agencies at statealert@taxadmin.org, then notify affected employees and provide identity protection services.
Sources
- FBI Internet Crime Complaint Center (IC3), 2024 Annual Report, ic3.gov
- FBI, "Business E-Mail Compromise on the Rise," fbi.gov
- IRS, "Dirty Dozen Tax Scams for 2025," IR-2025-26, irs.gov
- IRS, National Tax Security Awareness Week 2025, irs.gov
- IRS, W-2 scam reporting: dataloss@irs.gov; phishing reporting: phishing@irs.gov
- NIST Special Publication 800-177, Trustworthy Email
- NIST Special Publication 800-63B, Digital Identity Guidelines
- NIST Special Publication 800-61, Computer Security Incident Handling Guide
- NIST Special Publication 800-83, Guide to Malware Incident Prevention and Handling
- IBM, Cost of a Data Breach Report 2024 and 2025
- Verizon, 2025 Data Breach Investigations Report
- StrongDM, "35+ Alarming Data Breach Statistics for 2026," strongdm.com
- StrongDM, "Data Breach Response Plan: Your Guide to Leak Prevention," strongdm.com
- Hoxhunt, Phishing Trends Report 2025, hoxhunt.com
- Hoxhunt, Threat Intelligence Report 2026, hoxhunt.com
- SpyCloud, 2025 Identity Exposure Report
- TechMagic, "Phishing Statistics in 2025," techmagic.co
- CNN, Snapchat W-2 phishing breach reporting, 2016
- Trend Micro, Sprouts Farmers Market W-2 breach analysis, 2016
- Bright Defense, "List of Recent Data Breaches in 2025," 2025
- Identity Theft Resource Center, 2024 Annual Data Breach Report