dcsimg

Data Breach Trends of 2009

  • Data Breach Trends of 2009-
    The red line indicates when California SB 1386 went into effect, the first state to adopt such legislation. It is unlikely that there were fewer data security breaches in several years prior to 2006, but rather companies weren't required to make them public. Data breach incidents haven't just begun to occur in the past few years, rather the requirement to disclose those events gives a first view into the nature and severity of the problem. Publicly known data breaches prior to these laws going into effect are nearly all known as a result of fraud committed using the data, or by media leaks.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

Data Breach Trends of 2009

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
  • Data Breach Trends of 2009-2
    The red line indicates when California SB 1386 went into effect, the first state to adopt such legislation. It is unlikely that there were fewer data security breaches in several years prior to 2006, but rather companies weren't required to make them public. Data breach incidents haven't just begun to occur in the past few years, rather the requirement to disclose those events gives a first view into the nature and severity of the problem. Publicly known data breaches prior to these laws going into effect are nearly all known as a result of fraud committed using the data, or by media leaks.

New laws and regulations regarding data security breaches and disclosure laws affect the way in which nearly all organizations do business in the United States. This study, by Perimeter CTO Kevin Prince, provides a review of the scope and impact of data security breaches in an effort to encourage proactive modification to risk mitigation technologies, policies, and procedures that reduce exposure to a data breach incident.

However, keep in mind that the data used to extrapolate the charts, graphs, and representations for this study is by its very nature misleading.

You may also want to check out Prince's other slideshow on the top security threats for 2010.