Data Breaches: Myth vs. Reality

By Samuel Greengard
  • Previous
    Data Breaches: Myth vs. Reality

    Data Breaches: Myth vs. Reality

    There's growing awareness of cyber-threats, but there's little insight on what happens when data is stolen, where it goes and what information is taken from it.

Data breaches have become a persistent and unavoidable risk in the digital age. Businesses large and small—and across virtually every industry—find themselves increasingly in the crosshairs of hackers, thieves and state-sponsored cyber-terrorists. But separating fear and uncertainty from reality poses problems for even the most astute and savvy security experts. Trend Micro recently put the issue under a magnifying glass. Its research paper, "Follow the Data: Dissecting Data Breaches and Debunking Myths," offers deep insights into the rapidly changing space. Among the key findings: While there is growing awareness of cyber-threats—including the impact on victims and brand reputations, as well as the cost of incidents—there's very little understanding of what happens when data is stolen, including where it goes and what information is pulled from it. Trend Micro tracked data breaches based on approximately 10 years of data supplied by the Privacy Rights Clearinghouse, and it used that data to generate some notable findings. Here are some of the highlights.

This article was originally published on 2015-12-07
Samuel Greengard writes about business and technology for Baseline, CIO Insight and other publications. His most recent book is The Internet of Things (MIT Press, 2015).
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.