advertisement
Gemalto: 246 million records worldwide compromised by breaches in past 6 months
Gemalto has released the findings of the Breach Level Index for the first six months of 2015, revealing that 888…
Gemalto has released the findings of the Breach Level Index for the first six months of 2015, revealing that 888 data breaches occurred, compromising 246 million records worldwide.
Compared to the first half of 2014, data breaches increased by 10 per cent while the number of compromised data records declined by 41 per cent during the first six months of this year.
This decline in compromised records can most likely be attributed to that fact that fewer large scale mega breaches have occurred in the retail industry compared to the same period last year.
advertisement
Despite the decrease in the number of compromised records, large data breaches continued to expose massive amounts of personal information and identities.
The largest breach in the first half of 2015 ā which scored a 10 in terms of severity on the Breach Level Index ā was an identity theft attack on Anthem Insurance that exposed 78.8 million records, representing almost a third (32 per cent) of the total data records stolen in the first six months of 2015.
Other notable breaches during this analysis period included a 21-million-record breach at the U.S. Office of Personnel Management (BLI: 9.7); a 50-million-record breach at Turkeyās General Directorate of Population and Citizenship Affairs (BLI: 9.3); and a 20-million-record breach at Russiaās Topface (BLI: 9.2). In fact, the top 10 breaches accounted for 81.4 per cent of all compromised records.
advertisement
āWhat weāre continuing to see is a large ROI for hackers with sophisticated attacks that expose massive amounts data records. Cyber criminals are still getting away with big and very valuable data sets. For instance, the average healthcare data breach in the first half of 2015 netted more than 450,000 data records, which is an increase of 200 percent compared to the same time last year,ā said Jason Hart, Vice President and Chief Technology Officer for Data Protection at Gemalto.
The number of state-sponsored attacks accounted for just 2 per cent of data breach incidents, but the number of records compromised as a result of those attacks totalled 41 per cent of all records exposed, due to the breaches at Anthem Insurance and the U.S. Office of Personnel Management. While none of the top 10 breaches from first half of 2014 were caused by state-sponsored attacks, three of the top ten this year were state sponsoredāincluding the top two.
At the same time, malicious outsiders were the leading source of data breaches in the first half of 2015, accounting for 546 or 62 per cent of breaches, compared to 465 or 58 per cent in the first half of last year. Forty-six percent or 116 million of the total compromised records were attributable to malicious outsiders, down from 71.8 per cent or 298 million in 2014.
advertisement
Identity theft remained the primary type of breach, accounting for 75 per cent of all records compromised and slightly more than half (53 per cent) of data breaches in the first half of 2015. Five of the top ten breaches, including the top three ā which were all classified as Catastrophic on the BLI ā were identity theft breaches, down from seven of the top 10 from the same period last year.
Across industries, the government and healthcare sectors accounted for about two-thirds of compromised data records (31 per cent and 34 per cent respectively), though healthcare only accounted for 21 per cent of breaches this year, down from 29 per cent compared to the same period last year. The retail sector saw a significant drop in the number of stolen data records, accounting for 4 per cent compared to 38 per cent for the same period last year.
Across regions, the U.S. represented the largest share with three-quarters (76 per cent) of data breaches and nearly half of all compromised records (49 per cent). Turkey accounted for 26 per cent of compromised records, with its massive GDPCA breach in which 50 million records were breached by a malicious outsider.
The level of encryption used to protect exposed data — which can dramatically reduce the impact of data breaches ā increased slightly to 4 per cent of all breaches compared with 1 per cent in H1 2014.
āWhile the number of data breaches fluctuates, itās still clear that breaches are not a matter of āifā but āwhen.ā The Breach Level Index data shows that most companies are not able to protect their data once their perimeter defenses are compromised. Although more companies are encrypting data, they are not doing it at the levels needed to reduce the magnitude of these attacks,ā added Hart. “What is needed is a data-centric view of digital threats starting with better identity and access control techniques including multi-factor authentication and strong encryption to render sensitive information useless to thieves.ā
According to Forrester, as cybercriminals have become more skillful and sophisticated, they have eroded the effectiveness of traditional perimeter-based security controls. The constantly mutating threat landscape requires new defensive measures, one of which is the pervasive use of data encryption technologies.
In the future, organizations will encrypt data ā both in motion and at rest ā by default. This data-centric approach to security is a much more effective way to keep up with determined cybercriminals.
By encrypting, and thereby devaluing, sensitive data, organizations can make cybercriminals bypass their networks and look for less robustly protected targets. Encryption will become a strategic cornerstone for security and risk executives responsible for their organizationās data security and privacy efforts.
The Breach Level Index provides a centralized, global database of data breaches and calculates their severity based on multiple dimensions, including the type of data and the number of records stolen, the source of the breach, and whether or not the data was encrypted.
By assigning a severity score to each breach, the BLI provides a comparative list of breaches, distinguishing nuisances from truly impactful mega breaches. Information populating the BLI database is based on publicly-available breach disclosure information.