Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Almost Half of Disclosed Breaches Don’t Include Number of Records Compromised. Cost of Breach Rises.

Average Total Cost of a Data Breach Rises to $6.75 Million; Major Increase in Number of Records Lost Per Incident. Stolen Laptops Were the Number One Cause of a Data Breach in 2009.

The results of a data breach study, conducted by Perimeter E-Security, were released today, providing a review of the scope and impact of data security breaches that occurred in the past year.

Average Total Cost of a Data Breach Rises to $6.75 Million; Major Increase in Number of Records Lost Per Incident. Stolen Laptops Were the Number One Cause of a Data Breach in 2009.

The results of a data breach study, conducted by Perimeter E-Security, were released today, providing a review of the scope and impact of data security breaches that occurred in the past year.

Data breaches hit many organizations hard, exposing personal information that thieves could leverage to steal identities. These incidents result in both financial loss for the victims and major repercussions for the breached organizations, including an average cost of $204 per compromised record and a loss of the valued trust of their customers. The average total cost of a data breach rose to $6.75 million, according to the study.

“While 2009 had the fewest number of data breach incidents reported in the last four years, there was a dramatic increase in the average number of records lost in each incident and a rise in the costs associated with a breach,” said Kevin Prince, Chief Technology Officer, Perimeter E-Security. “The most disturbing trend is that almost half of publicly disclosed data breaches do not include the total number of records compromised.”

Key Findings in The Report:

  • 2009 had the fewest number of data breach incidents reported in the last four years.
  • Nearly 40% of publicly disclosed data breaches in 2009 did not include the number of records compromised.
  • Stolen laptops remain the number one cause of a data breach incident in 2009.
  • Improper disposal of documents that lead to a data breach rose 130% over 2008.
  • Third parties caused 12% of data breach incidents in 2009.

The data breaches noted in the study include only those reported in the U.S. and showcase incidents that exposed personal information useful to identity thieves such as Social Security numbers, account numbers, and driver’s license numbers. Additionally, some breaches that did not expose such sensitive information were included to underscore the variety and frequency of data breaches.

The study, conducted annually by Perimeter E-Security, focused on several verticals, including finance, retail, healthcare, government and education, which are more prone to identity theft. 

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem