Tracking Data Breaches by Industry - Slide 8

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next Health Care-8 Next

Health Care

Hospitals continue to be the leading cause of data breach incidents for the health care industry, with 36 percent of all breaches in 2009. That happens to be exactly the same percentage of hospital-related data breach incidents when analyzing all reported data breaches for this industry. When looking at all reported data breach incidents for the health care industry, the #2 spot falls just below 14 percent. So hospitals really do carry the lion’s share of incidents over all.

Insurance companies, on the other hand, account for more records compromised than any other subcategory both in 2009 and when all reported breaches are analyzed. Insurance companies account for 40 percent of all records compromised within this industry. Hospitals account for 32 percent when all years and breaches are taken into account. For 2009, insurance companies account for over 85 percent of all records compromised in this industry, followed by hospitals at 6 percent.

New laws and regulations regarding data security breaches and disclosure laws affect the way in which nearly all organizations do business in the United States. This study, by Perimeter CTO Kevin Prince, provides a review of the scope and impact of data security breaches in an effort to encourage proactive modification to risk mitigation technologies, policies, and procedures that reduce exposure to a data breach incident.

Here, Prince examines data breaches distributed across five verticals: finance, health care, retail, government and education. However, keep in mind that the data used to extrapolate the charts, graphs, and representations for this study is by its very nature misleading.

You may also want to check out Prince's other slideshows: top security threats for 2010 and data breach trends of 2009.

Related Topics : Security Breaches, Vulnerabilities and Patches, Application Security, Spyware, Pharming

More Slideshows

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.