Tracking Data Breaches by Industry - Slide 11

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next Government-11 Next


The number of incidents in the government sector only slightly varied between 2008 and 2009. There were 66 incidents in 2008 and 68 incidents in 2009. The wide variance in the number of records compromised between 2008 and 2009 was due to the 76 million records compromised at the National Archives and Records Administration. Even without the National Archives breach, there was over a 400 percent increase in records lost between 2008 and 2009. So while the number of incidents seems steady with 2008 levels, the number of records compromised significantly increased.

New laws and regulations regarding data security breaches and disclosure laws affect the way in which nearly all organizations do business in the United States. This study, by Perimeter CTO Kevin Prince, provides a review of the scope and impact of data security breaches in an effort to encourage proactive modification to risk mitigation technologies, policies, and procedures that reduce exposure to a data breach incident.

Here, Prince examines data breaches distributed across five verticals: finance, health care, retail, government and education. However, keep in mind that the data used to extrapolate the charts, graphs, and representations for this study is by its very nature misleading.

You may also want to check out Prince's other slideshows: top security threats for 2010 and data breach trends of 2009.

Related Topics : Security Breaches, Vulnerabilities and Patches, Application Security, Spyware, Pharming

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.