Welcome!

Agile Computing Authors: Yeshim Deniz, Liz McMillan, Pat Romanski, Corey Roth, Elizabeth White

Blog Feed Post

Data Breaches Surge in 2014 with 200 Million Data Records Stolen in First Three Months of the Year

- 233 Per cent Increase Over Q1 2013
- SafeNet Breach Level Index Reveals Only 1 Per cent of 254 Q1 Data Breaches Were "Secure Breaches" Using Encryption
- Four of the five worst data breaches occurred in South Korea

CAMBERLEY - April 29, 2014SafeNet, Inc., a global leader in data protection solutions, today released the highlights from its SafeNet Breach Level Index (BLI) for the first quarter of 2014. Nearly 200 million records were stolen, the equivalent of approximately 93,000 records stolen every hour, between January and March, which was an increase of 233 per cent over the same time last year. Of the 254 data breaches that occurred during the quarter, only 1 per cent were "secure breaches," or breaches where strong encryption, key management, or authentication solutions protected the data from being used.

Q1 Highlights
The Breach Level Index provides details about hundreds of individual data breaches, which can be sorted by source, industry, risk level, and date. Highlights from the first quarter research include:

  • More than 254 data breaches were publicised, representing 200 million lost or stolen data records. Because of the varying strictness of data breach reporting requirements around the globe, this quarterly data does not include organisations that didn't disclose the amount of data records that were exposed. In all probability, the total number is likely to be even higher.
  • South Korea took the top spot of all countries with four of the top five breaches worldwide and a loss of 158 million records across a variety of industries. This represents 79 per cent of the total number of reported breached records worldwide. These four breaches included the Korea Credit Bureau, Korean Medical Association, Korea Telecom, and Naver, a major Korean search portal. While the number of South Korean breached records was extremely high, the number of breach incidents in Asia Pacific as a whole accounted for only 7 per cent of the total number of global breaches, dwarfed by the 78 per cent (199 incidents) that occurred in North America and 13 per cent in Europe.
  • The financial industry was hit hardest, accounting for 56 per cent of all data records lost or stolen. However, it represented 14 per cent of total breaches during the quarter.
  • The healthcare industry was hit hard in terms of breach events, accounting for 24 per cent of all breaches. However, the industry accounted for just 9 per cent of data records lost or stolen.
  • 20 per cent of all records lost or stolen came from the technology industry, while retail represented just 1 per cent of data records lost or stolen and 10 per cent of all data breaches, even including the Sally Beauty Supply breach, which made major headlines.
  • Government and education breaches accounted for less than 1 per cent of total records stolen and 23 per cent of data breaches, including the University of Maryland's breach of 287,000 records stolen early this year.
  • Malicious outsiders accounted for 156 (62 per cent) of total incidents during the first quarter, with over 86 million records stolen. Malicious insiders only accounted for 11 per cent of total incidents, but they were much more effective, accounting for 52 per cent of records stolen. Accidental loss represented 25 per cent of total incidents, while hacktivist and state-sponsored attacks added up to only 2 per cent of the total.
  • There were approximately three breaches and 2.2 million records stolen each day, and more than 92,000 per hour.
  • Additional quarterly breakdowns are available in the BLI Executive Summary.

"The white noise of data breach reporting makes every breach seem just as bad as the last, but this is certainly not the case. Some organisations are handling customer data responsibly, and others are not. Tools like the Breach Level Index can help companies and the public alike understand the actual severity of breaches on a graduated scale and distinguish between these two groups," said Jason Hart, VP Cloud Solutions, SafeNet. "In differentiating between secure and insecure breaches, it's important to look at which victims have protected their data with encryption to limit the damage from a breach and render the date unusable to cyber criminals."

About the Breach Level Index
The BLI provides a centralised, global database of data breaches and calculates their severity based on multiple dimensions, including the type of data and the number of records stolen, the source of the breach, and whether or not the data was encrypted. By assigning a severity score to each breach, the BLI provides a comparative list of breaches, distinguishing nuisances from truly impactful mega breaches. Information populating the BLI database is based on publicly-available breach disclosure information.

SafeNet first collaborated with industry analyst firm IT-Harvest in 2013 to develop the logarithmic formula used to determine breach severity. When calculating the severity of data breaches, the BLI factors in multiple inputs, including data type, number of records stolen, breach source, and if the high-value data remained secure after the breach was discovered. These inputs are then processed through a proprietary algorithm that produces an index number, with 1 being least severe and 10 being most severe.

Note: Information in the Breach Level Index is collected from public sources. SafeNet provides this information "as-is", makes no representation or guarantees regarding this information, and is not liable for any use. A secure breach is categorised as a breach in which strong encryption, key management and authentication solutions protect the data from being accessed during an attack.

Resources

About SafeNet, Inc.
Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organisations around the globe. SafeNet's data-centric approach focuses on the protection of high-value information throughout its lifecycle, from the data centre to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments. Learn more about SafeNet on Twitter, LinkedIn, Facebook, YouTube, and Google+.

SafeNet Media Contact:
Ella Thompson / Deborah Reid
08453 700655
[email protected]

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

@ThingsExpo Stories
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abilit...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
In his session at @ThingsExpo, Arvind Radhakrishnen discussed how IoT offers new business models in banking and financial services organizations with the capability to revolutionize products, payments, channels, business processes and asset management built on strong architectural foundation. The following topics were covered: How IoT stands to impact various business parameters including customer experience, cost and risk management within BFS organizations.
Recently, REAN Cloud built a digital concierge for a North Carolina hospital that had observed that most patient call button questions were repetitive. In addition, the paper-based process used to measure patient health metrics was laborious, not in real-time and sometimes error-prone. In their session at 21st Cloud Expo, Sean Finnerty, Executive Director, Practice Lead, Health Care & Life Science at REAN Cloud, and Dr. S.P.T. Krishnan, Principal Architect at REAN Cloud, discussed how they built...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)