No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home GRC Vendor News

Data Breaches Surge in 2014 with 200 Million Data Records Stolen in First Three Months of the Year

by Corporate Compliance Insights
May 1, 2014
in GRC Vendor News

233 percent increase over Q1 2013

SafeNet Breach Level Index reveals only 1 percent of 254 Q1 data breaches were “secure breaches” using encryption

Four of the five worst data breaches occurred in South Korea

BALTIMORE – April 29, 2014 ─SafeNet, Inc., a global leader in data protection solutions, today released the highlights from its SafeNet Breach Level Index (BLI) for the first quarter of 2014. Nearly 200 million records were stolen, the equivalent of approximately 93,000 records stolen every hour between January and March, which was an increase of 233 percent over the same time last year. Of the 254 data breaches that occurred during the quarter, only 1 percent were “secure breaches,” or breaches where strong encryption, key management or authentication solutions protected the data from being used.

infographic 5-1-14

Q1 Highlights

The Breach Level Index provides details about hundreds of individual data breaches, which can be sorted by source, industry, risk level and date. Highlights from the first quarter research include:

  • More than 254 data breaches were publicized, representing 200 million lost or stolen data records. Because of the varying strictness of data breach reporting requirements around the globe, this quarterly data does not include organizations that didn’t disclose the amount of data records that were exposed. In all probability, the total number is likely to be even higher.
  • South Korea took the top spot of all countries with four of the top five breaches worldwide and a loss of 158 million records across a variety of industries. This represents 79 percent of the total number of reported breached records worldwide. These four breaches included the Korea Credit Bureau, Korean Medical Association, Korea Telecom and Naver, a major Korean search portal. While the number of South Korean breached records was extremely high, the number of breach incidents in Asia Pacific as a whole accounted for only 7 percent of the total number of global breaches, dwarfed by the 78 percent (199 incidents) that occurred in North America and 13 percent in Europe.
  • The financial industry was hit hardest, accounting for 56 percent of all data records lost or stolen.  However, it represented 14 percent of total breaches during the quarter.
  • The health care industry was hit hard in terms of breach events, accounting for 24 percent of all breaches.  However, the industry accounted for just 9 percent of data records lost or stolen.
  • Twenty percent of all records lost or stolen came from the technology industry, while retail represented just 1 percent of data records lost or stolen and 10 percent of all data breaches, even including the Sally Beauty Supply breach, which made major headlines.
  • Government and education breaches accounted for less than 1 percent of total records stolen and 23 percent of data breaches, including the University of Maryland’s breach of 287,000 records stolen early this year.
  • Malicious outsiders accounted for 156 (62 percent) of total incidents during the first quarter, with more than 86 million records stolen. Malicious insiders only accounted for 11 percent of total incidents, but they were much more effective, accounting for 52 percent of records stolen. Accidental loss represented 25 percent of total incidents, while “hacktivist” and state-sponsored attacks added up to only 2 percent of the total.
  • There were approximately three breaches and 2.2 million records stolen each day, and more than 92,000 per hour.
  • Additional quarterly breakdowns are available in the BLI Executive Summary.

“The white noise of data breach reporting makes every breach seem just as bad as the last, but this is certainly not the case. Some organizations are handling customer data responsibly, and others are not. Tools like the Breach Level Index can help companies and the public alike understand the actual severity of breaches on a graduated scale and distinguish between these two groups,” said Tsion Gonen, Chief Strategy Officer at SafeNet.  “In differentiating between secure and insecure breaches, it’s important to look at which victims have protected their data with encryption to limit the damage from a breach and render the date unusable to cyber criminals.”

About the Breach Level Index

The BLI provides a centralized, global database of data breaches and calculates their severity based on multiple dimensions, including the type of data and the number of records stolen, the source of the breach and whether or not the data was encrypted. By assigning a severity score to each breach, the BLI provides a comparative list of breaches, distinguishing nuisances from truly impactful mega breaches. Information populating the BLI database is based on publicly available breach disclosure information.

SafeNet first collaborated with industry analyst firm IT-Harvest in 2013 to develop the logarithmic formula used to determine breach severity. When calculating the severity of data breaches, the BLI factors in multiple inputs, including data type, number of records stolen, breach source and if the high-value data remained secure after the breach was discovered. These inputs are then processed through a proprietary algorithm that produces an index number, with 1 being least severe and 10 being most severe.

Note: Information in the Breach Level Index is collected from public sources. SafeNet provides this information “as-is,” makes no representation or guaranties regarding this information and is not liable for any use. A secure breach is categorized as a breach in which strong encryption, key management and authentication solutions protect the data from being accessed during an attack.

Resources

  • The Data Breach Breakdown for Q1 2014 blog post: http://data-protection.safenet-inc.com/2014/04/data-breach-breakdown-report-q1-2014
  • Breach Level Index website: www.breachlevelindex.com
  • Secure the Breach website: www.securethebreach.com
  • Secure the Breach Manifesto: http://www2.safenet-inc.com/securethebreach/downloads/secure_the_breach_manifesto.pdf
  • White Paper: Categorizing Data Breach Severity with a Breach Level Index: http://breachlevelindex.com/pdf/Breach-Level-Index-WP.pdf

About SafeNet, Inc.

Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world and is trusted to protect the most sensitive data for market-leading organizations around the globe.  SafeNet’s data-centric approach focuses on the protection of high-value information throughout its life cycle, from the data center to the cloud.  More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance and secure virtual and cloud environments. Learn more about SafeNet on Twitter, LinkedIn, Facebook, YouTube and Google+.


Previous Post

Who Was Occam? And Why Did He Need a Razor?

Next Post

The 10 Most Important FCPA Internal Controls (Part Two: Other Processes)

Corporate Compliance Insights

Corporate Compliance Insights

Corporate Compliance Insights

Related Posts

You are now registered!

Webinar: What Employee Experience Reveals About Your E&C Program

by Corporate Compliance Insights
May 16, 2025

11 a.m. - 12 p.m. ET Tuesday, June 3 Are your ethics and compliance metrics capturing what really matters? Programs...

LRN 2025 Program Maturity Global Study

2025 Global Study on Ethics & Compliance Program Maturity

by Corporate Compliance Insights
May 16, 2025

How does your ethics and compliance program measure up? Global study Ethics & Compliance Program Maturity What’s in this global...

check engine light

What Gets Measured Gets Managed, but What Actually Matters in Compliance?

by Keshonda Walker
May 16, 2025

Looking beyond standard measurements to identify the quiet signals that help compliance teams address issues before they become crises

call center mentor and caller

Telemarketing Rule Update Demands Faster Action on Consumer Opt-Outs

by Paul St. Clair
May 16, 2025

New requirements reduce opt-out processing time from 30 to 10 days and expand what qualifies as a "reasonable" consumer revocation...

Next Post
The 10 Most Important FCPA Internal Controls (Part Two: Other Processes)

The 10 Most Important FCPA Internal Controls (Part Two: Other Processes)

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights