Data Breach Record of 2018 in the First Half

Data Breach Record of 2018

Data Breach Record of 2018 in the First Half

According to Breach Level Index of 2018 First Half Review report, records breached in the first half of 2018 are 4,553,172,708. In 2018, more data were stolen than ever before.  The major source of these data breaches result from human errors and poor security practices . Especially insecure mobile devices constitute a significant number of breaches. “Mobile Security researchers observed this trend in action when they found that the Firebase databases for thousands of Android and iOS apps were unprotected and had thereby exposed approximately 100 million data records” (Gemalto NV, 2018).

Data records compromised in the first half of 2018

Data records compromised in the first half of 2018

Malicious outsiders and accidental loss were at the top of the list in the first half of 2018  In terms of data breach sources. “ Those forces accounted for some of the biggest security incidents reported including Twitter and Under Armour … Accidental loss in particular, was the leading factor behind several breaches where data records were disclosed because organizations didn’t take proper action to secure their cloud-based assets. One of the largest of these leaks involved the exposure of 48 million records belonging to LocalBlox, a personal and business data search service. Then there was Bongo International, a company acquired by FedEx in 2014 which misconfigured an Amazon S3 bucket containing 119,000 scanned documents including individual passports, driving licenses and security IDs.”(Gemalto NV, 2018).

In the report, it was stated “ Given the rationale for GDPR and other data protection regulations, it’s no wonder that privacy took centre stage in the first half of 2018. That was the case especially with instances where companies violated users’ privacy. Such was the case in a data scandal where the political consulting firm Cambridge Analytica improperly harvested the data of 87 million Facebook users”(Gemalto NV, 2018).

Malicious outsiders constituted a significant  source of data breaches

Malicious outsiders constituted a significant source of data breaches

Malicious outsiders constituted a significant source of data breaches

Malicious outsiders constituted a significant source of data breaches in the first half of 2018. The number of records exposed by external attackers rose to 3,648,160,927 records breached. (Gemalto NV, 2018).

The Domination of Identity Theft

Identity theft was once again the most prevalent data breach type tracked. It accounted for 3,972,437,893 compromised records.

The social media industry ranks first in terms of a breach in the first half of 2018.  Then, other industries subsequently follow it: government sector, other industries, retail, technology, industrial and education.

Number of records breached by industry first half of 2018

Number of records breached by industry first half of 2018

The healthcare industry ranks first in terms of the number of breach incidents by industry in the first half of 2018.  Then, other industries subsequently follow it: other industries, Financial Services, Education, Professional Services, Government, Retail,  Technology, Industrial.

See the number of the breach by industry over time in the following picture.

Number of breach Incidents by industry over time

Number of breach Incidents by industry over time

Solutions to Prevent Data Loss

There are a number of causes of data loss such as human error, computer viruses, natural disasters, hardware or system problem and software corruption or program problems which makes data loss a reality. It is not a matter of time that data loss will occur. Therefore, users cannot rely upon their technological solution alone. They must adopt and implement some holistic solutions in order to prevent data loss.  

People, Process and Technology- Keepnet Labs cyber security

People, Process and Technology- Keepnet Labs cybersecurity

Due to the intensification and variation of cyber attacks, the wide range of victims, the role of an outsider as well as the insider threats, it’s been clear that the technology cannot alone address the number of cyber attacks those threat organizations. Therefore it is important for organizations to employ a holistic approach to cybersecurity defence posture. A holistic approach incorporates technical, human and process phenomenon that is projected to detect,  prevent, and remove the cybersecurity threats.

Holistic Approach: People, Process and Technology

Keepnet Labs uses threat simulation and threat intelligence to unleash real risks that affect users for the “first-line-of-defence technology”, which is against email-origin malware, especially phishing attacks,  and allows them to take measures against threats.

When technology investments are inadequate to counteract cyber attacks, the human factor is considered the most effective means of security and data defence. With phishing simulation, online training and incident response features, Keepnet Labs transforms users into proactive agents who can actively identify and fight against cyber attacks.

Firms divided into dozens of departments generate difficulties and the problems of integrating separate departments with one another lead to a delay in cyber attacks awareness and blocking. It’s difficult for organisations to measure the real benefits of investing in human-based cybersecurity — and as long as there isn’t any damage — firms fall into an artificial sense of confidence. Keepnet Labs fixes these issues with the “process solution”, which enables companies to their own security processes and execute them — as well as create real-time development charts, monitor compliance with standards and live this life cycle.

Want to try Keepnet's Solutions for free?

Click the button and start your free trial today

 

Share this post