SlideShare uma empresa Scribd logo
1 de 8
Global Data Leakage Report 2009. Highlights
Data leakages top for 2009 A hard drive storing part of a database of 76 million veterans' personal data had been sent back to a contractor for repair without having its information wiped (USA) Nine employees attempted non-authorized access to the department database with personal data of 62 million citizens – the total majority of UK population (UK) A vulnerability in the social network StayFriends GmbH allowed unauthorized access to personal data of all 7.5 million network members (Germany) More prominent data leak cases available in InfoWatch “Global Data Leakage Report 2009” http://www.infowatch.com/en/threats_and_risks/globalreport2009/
Data leakages in 2009. Statistics  735 leaks * in 2009   2 leaks per day *  2 leaks per 1 million people  754.000 personal data records influenced by a leak Total cost of loss estimated in billions of USD Comprehensive statistics available in InfoWatch “Global Data Leakage Report 2009” 2 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
Intentional or accidental? 2009 2008 What leaks grow faster?  Read in InfoWatch “Global Data Leakage Report 2009” 3 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
Leak sources per organization type 2009 2008 What organizations are mostly influenced by data leaks? Read in InfoWatch “Global Data Leakage Report 2009” 4 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
Personal data is most at risk What is the most cost-intensive item in information risk cost structure?  Read in InfoWatch “Global Data Leakage Report 2009” 5 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
Leak channels Intentional What are the most widely spread data leak channels? Read in InfoWatch “Global Data Leakage Report 2009” Accidental 6 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
Want more? The complete “Global Data Leakage Report 2009” is available for download at:http://www.infowatch.com/en/threats_and_risks/globalreport2009/ You can also request your complimentary copy of the report at pr@infowatch.com 7 http://www.infowatch.com/en/threats_and_risks/globalreport2009/

Mais conteúdo relacionado

Mais de InfoWatch

Mais de InfoWatch (14)

Как построить систему ИБ в кризис; 3 способа снижения затрат на ИБ
Как построить систему ИБ в кризис; 3 способа снижения затрат на ИБКак построить систему ИБ в кризис; 3 способа снижения затрат на ИБ
Как построить систему ИБ в кризис; 3 способа снижения затрат на ИБ
 
Как защитить Windows 10 от хакерских атак
Как защитить Windows 10 от хакерских атакКак защитить Windows 10 от хакерских атак
Как защитить Windows 10 от хакерских атак
 
Защита веб-приложений и веб-инфраструктуры
Защита веб-приложений и веб-инфраструктурыЗащита веб-приложений и веб-инфраструктуры
Защита веб-приложений и веб-инфраструктуры
 
Как безделье сотрудников влияет на эффективность бизнеса?
Как безделье сотрудников влияет на эффективность бизнеса?Как безделье сотрудников влияет на эффективность бизнеса?
Как безделье сотрудников влияет на эффективность бизнеса?
 
Эволюция таргетированных атак в кризис
Эволюция таргетированных атак в кризисЭволюция таргетированных атак в кризис
Эволюция таргетированных атак в кризис
 
Как защитить веб-сайт от хакеров и внешних атак
Как защитить веб-сайт от хакеров и внешних атакКак защитить веб-сайт от хакеров и внешних атак
Как защитить веб-сайт от хакеров и внешних атак
 
Как довести проект по информационной безопасности до ума
Как довести проект по информационной безопасности до умаКак довести проект по информационной безопасности до ума
Как довести проект по информационной безопасности до ума
 
InfoWatch Attack Killer решение проблемы всех направленных атак
InfoWatch Attack Killerрешение проблемы всех направленных атакInfoWatch Attack Killerрешение проблемы всех направленных атак
InfoWatch Attack Killer решение проблемы всех направленных атак
 
DLP Hero: Используем DLP «по закону»
DLP Hero: Используем DLP «по закону»DLP Hero: Используем DLP «по закону»
DLP Hero: Используем DLP «по закону»
 
Целенаправленные атаки
Целенаправленные атакиЦеленаправленные атаки
Целенаправленные атаки
 
Зачем измерять информационную безопасность
Зачем измерять информационную безопасностьЗачем измерять информационную безопасность
Зачем измерять информационную безопасность
 
Презентация с вебинара InfoWatch "Как сделать защиту бизнеса простой и эффек...
Презентация с вебинара  InfoWatch "Как сделать защиту бизнеса простой и эффек...Презентация с вебинара  InfoWatch "Как сделать защиту бизнеса простой и эффек...
Презентация с вебинара InfoWatch "Как сделать защиту бизнеса простой и эффек...
 
Задачи бизнеса и эволюция DLP: какова следующая ступень?
Задачи бизнеса и эволюция DLP: какова следующая ступень?Задачи бизнеса и эволюция DLP: какова следующая ступень?
Задачи бизнеса и эволюция DLP: какова следующая ступень?
 
Мифы и реальность DLP
Мифы и реальность DLPМифы и реальность DLP
Мифы и реальность DLP
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

InfoWatch Global Data Leakage Report 2009 Highlights

  • 1. Global Data Leakage Report 2009. Highlights
  • 2. Data leakages top for 2009 A hard drive storing part of a database of 76 million veterans' personal data had been sent back to a contractor for repair without having its information wiped (USA) Nine employees attempted non-authorized access to the department database with personal data of 62 million citizens – the total majority of UK population (UK) A vulnerability in the social network StayFriends GmbH allowed unauthorized access to personal data of all 7.5 million network members (Germany) More prominent data leak cases available in InfoWatch “Global Data Leakage Report 2009” http://www.infowatch.com/en/threats_and_risks/globalreport2009/
  • 3. Data leakages in 2009. Statistics 735 leaks * in 2009  2 leaks per day *  2 leaks per 1 million people  754.000 personal data records influenced by a leak Total cost of loss estimated in billions of USD Comprehensive statistics available in InfoWatch “Global Data Leakage Report 2009” 2 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
  • 4. Intentional or accidental? 2009 2008 What leaks grow faster? Read in InfoWatch “Global Data Leakage Report 2009” 3 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
  • 5. Leak sources per organization type 2009 2008 What organizations are mostly influenced by data leaks? Read in InfoWatch “Global Data Leakage Report 2009” 4 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
  • 6. Personal data is most at risk What is the most cost-intensive item in information risk cost structure? Read in InfoWatch “Global Data Leakage Report 2009” 5 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
  • 7. Leak channels Intentional What are the most widely spread data leak channels? Read in InfoWatch “Global Data Leakage Report 2009” Accidental 6 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
  • 8. Want more? The complete “Global Data Leakage Report 2009” is available for download at:http://www.infowatch.com/en/threats_and_risks/globalreport2009/ You can also request your complimentary copy of the report at pr@infowatch.com 7 http://www.infowatch.com/en/threats_and_risks/globalreport2009/