dcsimg
 
 
 
 
 
 

Data Breaches: Myth vs. Reality

 
 
By Samuel Greengard  |  Posted 2015-12-07 Email
 
 
 
 
 
 
 
  • Previous
    Data Breaches: Myth vs. Reality
    Next

    Data Breaches: Myth vs. Reality

    There's growing awareness of cyber-threats, but there's little insight on what happens when data is stolen, where it goes and what information is taken from it.
 

Data breaches have become a persistent and unavoidable risk in the digital age. Businesses large and small—and across virtually every industry—find themselves increasingly in the crosshairs of hackers, thieves and state-sponsored cyber-terrorists. But separating fear and uncertainty from reality poses problems for even the most astute and savvy security experts. Trend Micro recently put the issue under a magnifying glass. Its research paper, "Follow the Data: Dissecting Data Breaches and Debunking Myths," offers deep insights into the rapidly changing space. Among the key findings: While there is growing awareness of cyber-threats—including the impact on victims and brand reputations, as well as the cost of incidents—there's very little understanding of what happens when data is stolen, including where it goes and what information is pulled from it. Trend Micro tracked data breaches based on approximately 10 years of data supplied by the Privacy Rights Clearinghouse, and it used that data to generate some notable findings. Here are some of the highlights.

 
 
 
 
 
Samuel Greengard writes about business and technology for Baseline, CIO Insight and other publications. His most recent book is The Internet of Things (MIT Press, 2015).
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that baselinemag.com may send you Baselinemag offers via email, phone and text message, as well as email offers about other products and services that Baselinemag believes may be of interest to you. Baselinemag will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit