dcsimg

Data Breach Trends of 2009

  • Data Breach Trends of 2009-
    Looking at the top three breach categories by records compromised shows just how pervasive hackers have been in 2009. Hackers represent nearly two thirds of all records compromised (much of which was the Heartland data breach). Improper drive disposal accounts for the other third (which is almost entirely the single National Archives incident) and all other categories are 1 percent or less. These two categories dwarf all others due to the couple of extra-large data breach incidents in 2009.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

Data Breach Trends of 2009

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
  • Data Breach Trends of 2009-8
    Looking at the top three breach categories by records compromised shows just how pervasive hackers have been in 2009. Hackers represent nearly two thirds of all records compromised (much of which was the Heartland data breach). Improper drive disposal accounts for the other third (which is almost entirely the single National Archives incident) and all other categories are 1 percent or less. These two categories dwarf all others due to the couple of extra-large data breach incidents in 2009.

New laws and regulations regarding data security breaches and disclosure laws affect the way in which nearly all organizations do business in the United States. This study, by Perimeter CTO Kevin Prince, provides a review of the scope and impact of data security breaches in an effort to encourage proactive modification to risk mitigation technologies, policies, and procedures that reduce exposure to a data breach incident.

However, keep in mind that the data used to extrapolate the charts, graphs, and representations for this study is by its very nature misleading.

You may also want to check out Prince's other slideshow on the top security threats for 2010.