I love Verizon’s annual Data Breach Investigations Report (DBIR). I have pored over its content every year since its inception in 2008. (Just goes to show how long I have been working on data breaches.) It is always written in language that is easy to understand, not super techy, and provides a great summary of
verizon
Verizon Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities
Verizon recently issued its Protected Health Information (PHI) Data Breach Report, which is always an interesting read. Not surprisingly, Verizon’s report concludes that based upon analysis of 1,360 security incidents involving the health care sector, 58 percent of the incidents were caused by insiders and 42 percent were caused by external threats.
Insider threats can…
Privacy Tip #96 – Consider “Who Has Your Back” as Your Next Summer Read
As you head to the beach or hammock for a bit of R+R this summer, here is one that you might want on the reading list.
The Electronic Frontier Foundation (EFF) has been publishing a report entitled “Who Has Your Back” since 2010. The point of the report is to assess major digital companies’ attitude…
Yahoo Breaches Cost Shareholders $350 Million From Lowered Purchase Price, CEO Forfeits $14 Million in Compensation
Yahoo’s troubles for failing to timely disclose security breaches provides rare insight into quantifying the financial and other costs to a company’s shareholders and leadership when a security breach occurs and is mishandled.
In 2014, more than a billion Yahoo accounts were hacked. Then in 2015 and 2016, more than 500,000 Yahoo user accounts were…
Stolen user credentials account for over half of all data breaches in 2015
Verizon recently released its yearly Data Breach Investigations Report and as always, the report is a very informative read. The report gathered information from more than 64,000 security incidents worldwide in 2015, 2,260 of which were actual data breaches.
One of the report’s most alarming statistics reveals that legitimate user credentials were used in most…