SlideShare a Scribd company logo
1 of 8
Global Data Leakage Report 2009. Highlights
Data leakages top for 2009 A hard drive storing part of a database of 76 million veterans' personal data had been sent back to a contractor for repair without having its information wiped (USA) Nine employees attempted non-authorized access to the department database with personal data of 62 million citizens – the total majority of UK population (UK) A vulnerability in the social network StayFriends GmbH allowed unauthorized access to personal data of all 7.5 million network members (Germany) More prominent data leak cases available in InfoWatch “Global Data Leakage Report 2009” http://www.infowatch.com/en/threats_and_risks/globalreport2009/
Data leakages in 2009. Statistics  735 leaks * in 2009   2 leaks per day *  2 leaks per 1 million people  754.000 personal data records influenced by a leak Total cost of loss estimated in billions of USD Comprehensive statistics available in InfoWatch “Global Data Leakage Report 2009” 2 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
Intentional or accidental? 2009 2008 What leaks grow faster?  Read in InfoWatch “Global Data Leakage Report 2009” 3 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
Leak sources per organization type 2009 2008 What organizations are mostly influenced by data leaks? Read in InfoWatch “Global Data Leakage Report 2009” 4 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
Personal data is most at risk What is the most cost-intensive item in information risk cost structure?  Read in InfoWatch “Global Data Leakage Report 2009” 5 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
Leak channels Intentional What are the most widely spread data leak channels? Read in InfoWatch “Global Data Leakage Report 2009” Accidental 6 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
Want more? The complete “Global Data Leakage Report 2009” is available for download at:http://www.infowatch.com/en/threats_and_risks/globalreport2009/ You can also request your complimentary copy of the report at pr@infowatch.com 7 http://www.infowatch.com/en/threats_and_risks/globalreport2009/

More Related Content

More from InfoWatch

More from InfoWatch (14)

Как построить систему ИБ в кризис; 3 способа снижения затрат на ИБ
Как построить систему ИБ в кризис; 3 способа снижения затрат на ИБКак построить систему ИБ в кризис; 3 способа снижения затрат на ИБ
Как построить систему ИБ в кризис; 3 способа снижения затрат на ИБ
 
Как защитить Windows 10 от хакерских атак
Как защитить Windows 10 от хакерских атакКак защитить Windows 10 от хакерских атак
Как защитить Windows 10 от хакерских атак
 
Защита веб-приложений и веб-инфраструктуры
Защита веб-приложений и веб-инфраструктурыЗащита веб-приложений и веб-инфраструктуры
Защита веб-приложений и веб-инфраструктуры
 
Как безделье сотрудников влияет на эффективность бизнеса?
Как безделье сотрудников влияет на эффективность бизнеса?Как безделье сотрудников влияет на эффективность бизнеса?
Как безделье сотрудников влияет на эффективность бизнеса?
 
Эволюция таргетированных атак в кризис
Эволюция таргетированных атак в кризисЭволюция таргетированных атак в кризис
Эволюция таргетированных атак в кризис
 
Как защитить веб-сайт от хакеров и внешних атак
Как защитить веб-сайт от хакеров и внешних атакКак защитить веб-сайт от хакеров и внешних атак
Как защитить веб-сайт от хакеров и внешних атак
 
Как довести проект по информационной безопасности до ума
Как довести проект по информационной безопасности до умаКак довести проект по информационной безопасности до ума
Как довести проект по информационной безопасности до ума
 
InfoWatch Attack Killer решение проблемы всех направленных атак
InfoWatch Attack Killerрешение проблемы всех направленных атакInfoWatch Attack Killerрешение проблемы всех направленных атак
InfoWatch Attack Killer решение проблемы всех направленных атак
 
DLP Hero: Используем DLP «по закону»
DLP Hero: Используем DLP «по закону»DLP Hero: Используем DLP «по закону»
DLP Hero: Используем DLP «по закону»
 
Целенаправленные атаки
Целенаправленные атакиЦеленаправленные атаки
Целенаправленные атаки
 
Зачем измерять информационную безопасность
Зачем измерять информационную безопасностьЗачем измерять информационную безопасность
Зачем измерять информационную безопасность
 
Презентация с вебинара InfoWatch "Как сделать защиту бизнеса простой и эффек...
Презентация с вебинара  InfoWatch "Как сделать защиту бизнеса простой и эффек...Презентация с вебинара  InfoWatch "Как сделать защиту бизнеса простой и эффек...
Презентация с вебинара InfoWatch "Как сделать защиту бизнеса простой и эффек...
 
Задачи бизнеса и эволюция DLP: какова следующая ступень?
Задачи бизнеса и эволюция DLP: какова следующая ступень?Задачи бизнеса и эволюция DLP: какова следующая ступень?
Задачи бизнеса и эволюция DLP: какова следующая ступень?
 
Мифы и реальность DLP
Мифы и реальность DLPМифы и реальность DLP
Мифы и реальность DLP
 

Recently uploaded

Recently uploaded (20)

Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 

InfoWatch Global Data Leakage Report 2009 Highlights

  • 1. Global Data Leakage Report 2009. Highlights
  • 2. Data leakages top for 2009 A hard drive storing part of a database of 76 million veterans' personal data had been sent back to a contractor for repair without having its information wiped (USA) Nine employees attempted non-authorized access to the department database with personal data of 62 million citizens – the total majority of UK population (UK) A vulnerability in the social network StayFriends GmbH allowed unauthorized access to personal data of all 7.5 million network members (Germany) More prominent data leak cases available in InfoWatch “Global Data Leakage Report 2009” http://www.infowatch.com/en/threats_and_risks/globalreport2009/
  • 3. Data leakages in 2009. Statistics 735 leaks * in 2009  2 leaks per day *  2 leaks per 1 million people  754.000 personal data records influenced by a leak Total cost of loss estimated in billions of USD Comprehensive statistics available in InfoWatch “Global Data Leakage Report 2009” 2 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
  • 4. Intentional or accidental? 2009 2008 What leaks grow faster? Read in InfoWatch “Global Data Leakage Report 2009” 3 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
  • 5. Leak sources per organization type 2009 2008 What organizations are mostly influenced by data leaks? Read in InfoWatch “Global Data Leakage Report 2009” 4 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
  • 6. Personal data is most at risk What is the most cost-intensive item in information risk cost structure? Read in InfoWatch “Global Data Leakage Report 2009” 5 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
  • 7. Leak channels Intentional What are the most widely spread data leak channels? Read in InfoWatch “Global Data Leakage Report 2009” Accidental 6 http://www.infowatch.com/en/threats_and_risks/globalreport2009/
  • 8. Want more? The complete “Global Data Leakage Report 2009” is available for download at:http://www.infowatch.com/en/threats_and_risks/globalreport2009/ You can also request your complimentary copy of the report at pr@infowatch.com 7 http://www.infowatch.com/en/threats_and_risks/globalreport2009/