dcsimg

Data Breach Trends of 2009

  • Data Breach Trends of 2009-
    The Source of 'Inside' as opposed to 'Inside-Accidental' and 'Inside-Malicious' is where not enough details are available to put it into one of the other categories, or could refer to social engineering attacks where an insider is tricked into helping a malicious individual.

    While all other categories dropped in overall number of incidents between 2008 and 2009, the number of Insider Accidents remained nearly identical. Some industry experts attribute this to a reduction in budgetary spending for employee training as well as reduction in overall head count, both of which often lead to a greater number of mistakes.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

Data Breach Trends of 2009

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
  • Data Breach Trends of 2009-9
    The Source of 'Inside' as opposed to 'Inside-Accidental' and 'Inside-Malicious' is where not enough details are available to put it into one of the other categories, or could refer to social engineering attacks where an insider is tricked into helping a malicious individual.

    While all other categories dropped in overall number of incidents between 2008 and 2009, the number of Insider Accidents remained nearly identical. Some industry experts attribute this to a reduction in budgetary spending for employee training as well as reduction in overall head count, both of which often lead to a greater number of mistakes.

New laws and regulations regarding data security breaches and disclosure laws affect the way in which nearly all organizations do business in the United States. This study, by Perimeter CTO Kevin Prince, provides a review of the scope and impact of data security breaches in an effort to encourage proactive modification to risk mitigation technologies, policies, and procedures that reduce exposure to a data breach incident.

However, keep in mind that the data used to extrapolate the charts, graphs, and representations for this study is by its very nature misleading.

You may also want to check out Prince's other slideshow on the top security threats for 2010.