3582502561

3582502561




Dec. 2013 to Dec. 2014


of 2014

If the top breaches of 2014 taught the security world anything, it's that size and sector don't matter. Ali organizations are vulnerable to external attack, and the consequences can derail organizations and their leaders’ careers. Here’s a look at the top incidents of the year and the lessons security experts gleaned from them.


00 PT IQ Community 000    Health Systems

I 4.5 MILLION AFFECTED

Information compromised: Names, addresses, birthdates. telephone numbers, Social Security numbers

Description: The largest healthdata breach in2014 saw a suspected hacker group from China breaching the organization's Systems and pilfering sensitive patient details. The attack offered morę proof that hackers are focusing on healthcare organizations, as they're perceived to be easier targets than other sectors.

Scalę by oooofc affcctcd


i 56 MILLION

53 Million email addresses also stolen

Information compromised: Credit and debit card numbers

Description: Home Depot's breach resulted from the compromise of a third-party vendor, a fect that is "eerily" similar to the circumstances of the Target breach. This points to the need for organizations to morę closely monitor the security measures of their vendors and ramp up breach detection efforts, experts say.


G


JPMorganChase


ń 76 MILLION

Information compromised: Names, addresses, phone numbers, e-mail addresses

Description: A massive breach against Chase likely started with a server the bank's security team overlooked when upgrading to two-factor authentication Controls.

The takeaway from this incident is that if the nation's

largest bank (which was considered to be among the

most secure organizations in the world) can be breached,

then virtually all other banking institutions must be    T 5 i g |

considered at risk.

©    ©TARGET®

Scal* by onwW, affccltd


i 110 MILLION Ł

Information compromised. Credit and debit cards, customer details


Description: Although the breach occurred in 2013, Targefs incident was a major talking point throughout 2014, as the company faced massive breach response costs, a changing C-suite, federal scrutiny and several class action lawsuits. Targefs breach showed that such incidents can cost a CEO's job, and it proved to be the watershed event that kicked off a year that saw several large-scale card breaches.

0    e ay

1    145 MILLION Ł


Information compromised: Encrypted passwords, customer names, e-mail addresses. mailing addresses, phone numbers. dates of birth

Description: This breach, which originated after a smali number of employee log-in credentials were compromised, impacted a massive number of customers, and sparked investigations from State attorneys generał and the UK Information Commissionefs Office. Yet, surprisingly, it remains perhaps the least-discussed major breach of 2014.


f UNKNOWN SŁ


SONY

PICTURES™


Information compromised. Pil, PHI, unreleased feature films, company e-mails

Description: As the dust continues to settle morę than a month after the film studio was hit with a massive “wiper" malware attack that exposed intellectual property along with personal employee details - and led to a heated debate over whether the hack was launched by North Korea - the breach could serve as a major turning point, giving CISOs a new degree of board-level visibility for their security strategies and investments.

To learn morę about data breach response, prevention and detection, visit www.databreachtoday.com.

DataBreask

Prevention. Response. Notification. TODAY

Copyright 2014 Information Security Media Group


Wyszukiwarka

Podobne podstrony:
II3-6 The question arises as to what would happen if the two-wavelength technique were applied to th
omi icnrHow to Handle Battery (Cont d). •    If the electrolyte level is Iow, remove
/ My favourit-e place by Mark Smith I My family and I come to this smali village in the countryside
Tax expenditures: spending through the Polish tax system 97 Tablc 2. Size and fiscal effects of tax
image002 Thls is a fascinating addition to the world of "what If” fiction THE TIMES What If t
rMR. ELECTRONICS AN If you re willing to lose your job tomorrow to a technically-trained man,tum the
S5004011 2Coin and the representation of individual authority If the reladvely unranked Middle Iron
skanowanie0029 (18) Even if the teacher hopes to do morę to sharpen students own response to the li
IMGq26 (3) Marek Falenia jest podejrzany o to, że: w okresie od początku lipca 2013 roku I ^ 13 czer
jak robić kolczyki str 2 2. Add Beads to the top of the earring according to individual beading pa
mbs 073 MY BREATHING SYSTEM Even if the heart has been weakened by athletics badly per-formed, it is
MR293R19072 1 The opftratiojis doscribed below sr« to be carri M out on both the right and left ban
EPIA 2011 ISBN: 978-989-95618-4-7 If the player folds 72% or inore hands then he is considered to be
htdctmw 061 Steps 4) and 5)—as if we have to tell you!—are on the next page... Weil, we know you’re

więcej podobnych podstron