dcsimg

Data Breach Trends of 2009

  • Data Breach Trends of 2009-
    Perhaps the best way to truly analyze the trends behind lost records per incident is to remove those large incidents from the analysis. So after removing incidents where no records are reported, and also removing large data breaches where more than 10 million records were compromised, a less erratic chart seems to emerge that is very different from the previous chart. Through this data normalization process, it would appear that data breach incidents are reducing both in number and severity (in terms of records compromised).
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

Data Breach Trends of 2009

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
  • Data Breach Trends of 2009-5
    Perhaps the best way to truly analyze the trends behind lost records per incident is to remove those large incidents from the analysis. So after removing incidents where no records are reported, and also removing large data breaches where more than 10 million records were compromised, a less erratic chart seems to emerge that is very different from the previous chart. Through this data normalization process, it would appear that data breach incidents are reducing both in number and severity (in terms of records compromised).

New laws and regulations regarding data security breaches and disclosure laws affect the way in which nearly all organizations do business in the United States. This study, by Perimeter CTO Kevin Prince, provides a review of the scope and impact of data security breaches in an effort to encourage proactive modification to risk mitigation technologies, policies, and procedures that reduce exposure to a data breach incident.

However, keep in mind that the data used to extrapolate the charts, graphs, and representations for this study is by its very nature misleading.

You may also want to check out Prince's other slideshow on the top security threats for 2010.