dcsimg

Data Breach Trends of 2009

  • Data Breach Trends of 2009-
    Twelve percent of data breaches in 2009 were associated with the acts of third parties. This is often a partner, vendor, or other entity that the company does business with that has access to sensitive or non-public information. While in the care of individuals employed by the third party, the data is stolen, lost, exposed, or otherwise compromised leading to the public disclosure requirement.

    The percentage of third-party involvement in an information security breach in 2009 has dropped. For all recorded data breaches in the U.S., 12 percent are associated with a third party being the cause.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

Data Breach Trends of 2009

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
  • Data Breach Trends of 2009-10
    Twelve percent of data breaches in 2009 were associated with the acts of third parties. This is often a partner, vendor, or other entity that the company does business with that has access to sensitive or non-public information. While in the care of individuals employed by the third party, the data is stolen, lost, exposed, or otherwise compromised leading to the public disclosure requirement.

    The percentage of third-party involvement in an information security breach in 2009 has dropped. For all recorded data breaches in the U.S., 12 percent are associated with a third party being the cause.

New laws and regulations regarding data security breaches and disclosure laws affect the way in which nearly all organizations do business in the United States. This study, by Perimeter CTO Kevin Prince, provides a review of the scope and impact of data security breaches in an effort to encourage proactive modification to risk mitigation technologies, policies, and procedures that reduce exposure to a data breach incident.

However, keep in mind that the data used to extrapolate the charts, graphs, and representations for this study is by its very nature misleading.

You may also want to check out Prince's other slideshow on the top security threats for 2010.