Welcome!

Mobile IoT Authors: Jason Bloomberg, Liz McMillan, Pat Romanski, Elizabeth White, Yeshim Deniz

Blog Feed Post

Data Breaches Surge in 2014 with 200 Million Data Records Stolen in First Three Months of the Year

- 233 Per cent Increase Over Q1 2013
- SafeNet Breach Level Index Reveals Only 1 Per cent of 254 Q1 Data Breaches Were "Secure Breaches" Using Encryption
- Four of the five worst data breaches occurred in South Korea

CAMBERLEY - April 29, 2014SafeNet, Inc., a global leader in data protection solutions, today released the highlights from its SafeNet Breach Level Index (BLI) for the first quarter of 2014. Nearly 200 million records were stolen, the equivalent of approximately 93,000 records stolen every hour, between January and March, which was an increase of 233 per cent over the same time last year. Of the 254 data breaches that occurred during the quarter, only 1 per cent were "secure breaches," or breaches where strong encryption, key management, or authentication solutions protected the data from being used.

Q1 Highlights
The Breach Level Index provides details about hundreds of individual data breaches, which can be sorted by source, industry, risk level, and date. Highlights from the first quarter research include:

  • More than 254 data breaches were publicised, representing 200 million lost or stolen data records. Because of the varying strictness of data breach reporting requirements around the globe, this quarterly data does not include organisations that didn't disclose the amount of data records that were exposed. In all probability, the total number is likely to be even higher.
  • South Korea took the top spot of all countries with four of the top five breaches worldwide and a loss of 158 million records across a variety of industries. This represents 79 per cent of the total number of reported breached records worldwide. These four breaches included the Korea Credit Bureau, Korean Medical Association, Korea Telecom, and Naver, a major Korean search portal. While the number of South Korean breached records was extremely high, the number of breach incidents in Asia Pacific as a whole accounted for only 7 per cent of the total number of global breaches, dwarfed by the 78 per cent (199 incidents) that occurred in North America and 13 per cent in Europe.
  • The financial industry was hit hardest, accounting for 56 per cent of all data records lost or stolen. However, it represented 14 per cent of total breaches during the quarter.
  • The healthcare industry was hit hard in terms of breach events, accounting for 24 per cent of all breaches. However, the industry accounted for just 9 per cent of data records lost or stolen.
  • 20 per cent of all records lost or stolen came from the technology industry, while retail represented just 1 per cent of data records lost or stolen and 10 per cent of all data breaches, even including the Sally Beauty Supply breach, which made major headlines.
  • Government and education breaches accounted for less than 1 per cent of total records stolen and 23 per cent of data breaches, including the University of Maryland's breach of 287,000 records stolen early this year.
  • Malicious outsiders accounted for 156 (62 per cent) of total incidents during the first quarter, with over 86 million records stolen. Malicious insiders only accounted for 11 per cent of total incidents, but they were much more effective, accounting for 52 per cent of records stolen. Accidental loss represented 25 per cent of total incidents, while hacktivist and state-sponsored attacks added up to only 2 per cent of the total.
  • There were approximately three breaches and 2.2 million records stolen each day, and more than 92,000 per hour.
  • Additional quarterly breakdowns are available in the BLI Executive Summary.

"The white noise of data breach reporting makes every breach seem just as bad as the last, but this is certainly not the case. Some organisations are handling customer data responsibly, and others are not. Tools like the Breach Level Index can help companies and the public alike understand the actual severity of breaches on a graduated scale and distinguish between these two groups," said Jason Hart, VP Cloud Solutions, SafeNet. "In differentiating between secure and insecure breaches, it's important to look at which victims have protected their data with encryption to limit the damage from a breach and render the date unusable to cyber criminals."

About the Breach Level Index
The BLI provides a centralised, global database of data breaches and calculates their severity based on multiple dimensions, including the type of data and the number of records stolen, the source of the breach, and whether or not the data was encrypted. By assigning a severity score to each breach, the BLI provides a comparative list of breaches, distinguishing nuisances from truly impactful mega breaches. Information populating the BLI database is based on publicly-available breach disclosure information.

SafeNet first collaborated with industry analyst firm IT-Harvest in 2013 to develop the logarithmic formula used to determine breach severity. When calculating the severity of data breaches, the BLI factors in multiple inputs, including data type, number of records stolen, breach source, and if the high-value data remained secure after the breach was discovered. These inputs are then processed through a proprietary algorithm that produces an index number, with 1 being least severe and 10 being most severe.

Note: Information in the Breach Level Index is collected from public sources. SafeNet provides this information "as-is", makes no representation or guarantees regarding this information, and is not liable for any use. A secure breach is categorised as a breach in which strong encryption, key management and authentication solutions protect the data from being accessed during an attack.

Resources

About SafeNet, Inc.
Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organisations around the globe. SafeNet's data-centric approach focuses on the protection of high-value information throughout its lifecycle, from the data centre to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments. Learn more about SafeNet on Twitter, LinkedIn, Facebook, YouTube, and Google+.

SafeNet Media Contact:
Ella Thompson / Deborah Reid
08453 700655
[email protected]

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

IoT & Smart Cities Stories
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...