There have been many, so let’s count down some of the year’s biggest data breaches.

As we look back at the year, it’s impossible not to acknowledge the rampant data breaches that caused such chaos for what seemed to be all 52 weeks of the year. The secret and sensitive data of literally hundreds of millions of people has been torn open and exposed, then aggregated on various dark web lists for sale. Data breaches are a terrifying top trend in the cybercrime world that shows no sign of slowing any time soon.

If your info has been compromised in one of these unfortunate events, we have covered how to survive a data breach , but there are many whose recovery from a breach was a nightmarish climb back to sanity. For the morbidly curious, let’s take a closer look at our top 10 data breaches of 2018.

The interesting thing is, while some data breaches are deliberate attacks, others are simply neglected databases that security auditors find lying around the web like unguarded, unlocked safes. Our list contains some of each. In descending order, counting down some of the biggest data breaches of the year, what follows is the worst of the worst.

#10 — Panera

Number of victims: 37 million

Who was targeted: All PaneraBread.com customer accounts

What data was exposed: Names, email and physical addresses, birthdays, and the last four digits of the customers’ credit card numbers

Timeframe: Disclosed April 2018

What happened: Despite being warned by a cybersecurity expert in August 2017 that their website was leaking data, the Panera IT team failed to act until 8 months later when it announced the leak and took the site down for security maintenance.

#9 — Newegg

Number of victims: 50 million

Who was targeted: Newegg online shoppers

What data was exposed: Credit card info

Timeframe: August 14, 2018 - September 18, 2018

What happened: The online retailer was hacked by cybergang Magecart, who injected a credit card skimming code into the Newegg website. Whenever a customer bought something online, that payment info went straight to Magecart’s C&C (command and control server).

#8 — Elasticsearch

Number of victims: 82 million (57M consumers, 26M businesses)

Who was targeted: Users and online businesses across the internet

What data was exposed: From individual users — names, email and physical addresses, phone numbers, IP addresses, employers, and job titles. From businesses — names, company details, zip codes, carrier routes, latitudes/longitudes, census tracts, phone numbers, web addresses, email addresses, employee count, revenue numbers, NAICS codes, SIC codes, and more.

Timeframe: Discovered November 14, 2018

What happened: This is one of those cases we mentioned above where a regular security audit led to a researcher stumbling upon over 80 million records of sensitive, aggregated data . It is unknown how long the databases were sitting unguarded and who, if anyone, has had the opportunity to copy and steal all the data. Cybersecurity experts believe they have tracked down the source of the unguarded databases to a data management company that has since closed its doors, but it is still officially unknown.

#7 — Facebook

Number of victims: 87 million

Who was targeted: Facebook users

What data was exposed: Profile info, political beliefs, friend networks, private messages

Timeframe: Disclosed September 2018

What happened: This is the notorious Cambridge Analytica scandal where the data-collecting firm illegally harvested users’ info without their permission. The secret operation was politically motivated—namely, to influence the 2016 US presidential campaign. And though the breach occurred a couple years ago, it’s only this year that investigatory conclusions have come out, giving us a clearer picture of what happened.

#6 — MyHeritage

Number of victims: 92 million

Who was targeted: MyHeritage users

What data was exposed: email addresses and hashed passwords

Timeframe: Alerted June 2018

What happened: Cybersecurity researchers alerted the genealogy site in June 2018 that an outside server had been discovered with sensitive MyHeritage info. The company confirmed the info was legitimate and alerted its users that any account holders who signed up earlier than October 26, 2017 were at risk and should change their passwords.

#5 — Quora

Number of victims: 100 million

Who was targeted: Quora users

What data was exposed: Names, email addresses, hashed passwords, profile data, public and non-public actions

Timeframe: Discovered December 3, 2018

What happened: Many questions still surround the details of this breach, but the question-and-answer site reported to its users that a third party had gained unauthorized access to one of their systems, expounding no further.

#4 — Under Armour

Number of victims: 150 million

Who was targeted: MyFitnessPal users

What data was exposed: User names, email addresses, hashed passwords

Timeframe: Late February 2018

What happened: The company’s food and nutrition app was hacked , opening up the above info to the attackers, but not, thankfully, any payment info, which the company processes through a separate channel.

#3 — Exactis

Number of victims: 340 million (230M consumers, 110M businesses)

Who was targeted: Users and businesses across the internet

What data was exposed: Over 400 categories of detail, such as phone numbers, email and physical addresses, interests, ages, religions, pet ownership, etc.

Timeframe: June 2018

What happened: Data collection firm Exactis somehow had 2 terabytes of data relocated to a public site for all to see. It’s unknown who or how many people accessed the info before it was discovered.

#2 — Starwood

Number of victims: 500 million

Who was targeted: Starwood guests

What data was exposed: Names, email and physical addresses, phone numbers, passport numbers, account info, birth dates, gender, travel info, and accommodation info. Some of the breached info also included hashed credit card info.

Timeframe: Discovered September 10, 2018, but could have stretched as far back as 2014

What happened: Like many of the other official breach statements, the Marriott-owned hotel chain issued a statement that its servers had suffered “unauthorized access,” but recent discoveries from the investigation indicate the breach may have been caused by the Chinese government for political purposes.

#1 — Aadhaar

Number of victims: 1.1 billion

Who was targeted: Indian citizens

What data was exposed: Aadhaar numbers, names, email and physical addresses, phone numbers, and photos

Timeframe: August 2017 - January 2018

What happened: Anonymous sellers over WhatsApp charged Rs 500 and lower for a portal into India’s Unique Identification Authority where the records of virtually every citizen was at the payer’s fingertips.

What to do if your password was stolen in a data breach

If you fear you may be a victim of any of these incidents or others, immediately:

Change any and all passwords similar to the password that was breached (and get out of the habit of reusing passwords in the first place). Make your login credentials uncrackable by following today’s best password practices . And never send 2FA codes to anyone.

Be wary of suspicious SMS or emails that claim to be from your bank or insurance company — or any company for that matter — as impersonations are especially common in the aftermath of data breaches.

Use caution when providing data that may not be necessary for any online account you have set up (like a passport number for booking a hotel room), and always monitor your credit score for changes, which could indicate identity theft.

Looking ahead — How to protect yourself in 2019

We must at all costs avoid falling into the jaded mindset of “another day, another data breach,” because protecting your personal information matters now more than ever before. If you’ve ever provided personal data to any company, either online or offline, I’m sorry to say that you are a potential target of cybercrime.

The stark reality is that any experienced hacker, if he or she works hard enough, will eventually gain access to an unprotected organization. So instead of blindly putting faith in companies’ privacy policies, individuals must educate themselves and not trust anyone to be a good custodian of their private information. Here are a few simple actions you can take to keep yourself in the “Unharmed” category for 2019.

Use a password manager

No excuses. Password manager tools work on your desktop, mobile phone, and tablet. Using them means you can assign every account you have a unique, complex password, but you yourself need only remember one. This ensures that any data breach that includes your credentials won't “bleed over” into other accounts.

Remember, if you ever feel your information has been breached, you can search your own email address on an aggregated stolen password site, like Avast Hack Check , and it will let you know if the password to that account has been leaked. And, yes, it’s always better to know.

Whenever possible, activate 2FA

By activating two-factor authentication, even if attackers have your username and password, they still cannot access your account. And, definitely use 2FA on your email account if you can.

Have a safe new year, everyone!