3.24 million records stolen or compromised in 2017-Gemalto

3.24 million records stolen or compromised in 2017-Gemalto

173
0
SHARE
Print Friendly, PDF & Email

Gemalto released the latest findings of the Breach Level Index revealing that 3.24 million records were stolen, lost or exposed in India in 2017, 783% increase from 2016. Globally, 2017 was the first year publicly disclosed breaches surpassed more than two billion compromised data records since the Breach Level Index began tracking data breaches in 2013.

Over the past five years, nearly 10 billion records have been lost, stolen or exposed, with an average of five million records compromised globally every day.

Of the 29 data breach incidents in India in 2017, identity theft represented the leading type of data breach, accounting for 58% of all data breaches. Malicious outsiders remained the number one cybersecurity threat last year at 52% of all breach incidents. Companies in the retail, government and financial services sectors were the primary targets for breaches last year.

The Breach Level Index* serves as a global database that tracks and analyzes data breaches, the type of data compromised and how it was accessed, lost or stolen. Based on data breach reports collected in the Breach Level Index,

“The manipulation of data or data integrity attacks pose an arguably more unknown threat for organizations to combat than simple data theft, as it can allow hackers to alter anything from sales numbers to intellectual property. By nature, data integrity breaches are often difficult to identify and in many cases, where this type of attack has occurred, we have yet to see the real impact,” said Jason Hart, Vice President and Chief Technology Officer for Data Protection at Gemalto. In the event that the confidentiality, or privacy, of the data is breached, an organization must have controls, such as encryption, key management and user access management, in place to ensure that integrity of the data isn’t tampered with and it can still be trusted. Regardless of any concerns around manipulation, these controls would protect the data in situ and render it useless the moment it’s stolen.”

LEAVE A REPLY