dcsimg

Data Breach Trends of 2009

  • Data Breach Trends of 2009-
    While credit card data does represent the largest single type of data that is compromised in data breaches historically, when analyzing data breaches by incident, it ranks number four on the list. The majority of data breach incidents go after much more valuable information that can lead to identity theft and fraud. Social Security numbers, name and address, and date of birth are exposed through a data breach far more often than credit card information. This information can get confusing because usually there isn't just a single data type that is compromised (such as SSN). Usually it is a combination of data types involved in each incident.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

Data Breach Trends of 2009

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
  • Data Breach Trends of 2009-6
    While credit card data does represent the largest single type of data that is compromised in data breaches historically, when analyzing data breaches by incident, it ranks number four on the list. The majority of data breach incidents go after much more valuable information that can lead to identity theft and fraud. Social Security numbers, name and address, and date of birth are exposed through a data breach far more often than credit card information. This information can get confusing because usually there isn't just a single data type that is compromised (such as SSN). Usually it is a combination of data types involved in each incident.

New laws and regulations regarding data security breaches and disclosure laws affect the way in which nearly all organizations do business in the United States. This study, by Perimeter CTO Kevin Prince, provides a review of the scope and impact of data security breaches in an effort to encourage proactive modification to risk mitigation technologies, policies, and procedures that reduce exposure to a data breach incident.

However, keep in mind that the data used to extrapolate the charts, graphs, and representations for this study is by its very nature misleading.

You may also want to check out Prince's other slideshow on the top security threats for 2010.