dcsimg

Government

  • Government-
    State agencies are the number-one cause of data security breaches for this sector in terms of total incidents. For the last two years, state agencies have been responsible for one half of all data breaches in government. If you remove the National Archives breach, state agencies are also responsible for the greatest number of records compromised both in 2008 and 2009. State agencies make up right around 70 percent of all records compromised in the government sector for the last couple of years.

    The National Archives breach at 76 million records is one of the largest breaches in U.S. history.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14

Government

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
  • Government-12
    State agencies are the number-one cause of data security breaches for this sector in terms of total incidents. For the last two years, state agencies have been responsible for one half of all data breaches in government. If you remove the National Archives breach, state agencies are also responsible for the greatest number of records compromised both in 2008 and 2009. State agencies make up right around 70 percent of all records compromised in the government sector for the last couple of years.

    The National Archives breach at 76 million records is one of the largest breaches in U.S. history.
New laws and regulations regarding data security breaches and disclosure laws affect the way in which nearly all organizations do business in the United States. This study, by Perimeter CTO Kevin Prince, provides a review of the scope and impact of data security breaches in an effort to encourage proactive modification to risk mitigation technologies, policies, and procedures that reduce exposure to a data breach incident.

Here, Prince examines data breaches distributed across five verticals: finance, health care, retail, government and education. However, keep in mind that the data used to extrapolate the charts, graphs, and representations for this study is by its very nature misleading.

You may also want to check out Prince's other slideshows: top security threats for 2010 and data breach trends of 2009.