What are Some of History’s Worst Data Breaches

Advertise on CloudTweaks

Worst Data Breaches

Some of the worst data breaches have been revealed. We’ve mentioned before that with all the recent massive hacks on Sony, Microsoft, Home Depot, etc. companies are focusing more and more on the necessity of improved security measures. This recent surge of beefed up security has left some of us in the tech world wondering about some of worst hacks in history.

According to an Infographic from Information is Beautiful: “The Court Ventures hack of 2012 appears to be the biggest hack in history, in terms of number of records stolen.

data-issues

The infographic allows viewers to filter the information. Interestingly enough, some of the biggest breaches of the most sensitive data in history were inside jobs: that of the US Military and Embassy Cables in 2009 and the recent Korea Credit Bureau hack. Perhaps this data might lead to changes in the corporate screening processes for IT applicants. IT professionals are increasingly responsible for the protection of sensitive company and customer data. But what happens when an organization can’t protect itself from its own employees?

So what is the most valuable information that can be hacked?

Reports from Information is Beautiful indicate: “The most valuable hacked data is that of fresh credit cards depending on their credit limit. PayPal accounts are a close second. Health credentials are an unexpected third on this list, usually used to illegally buy and sell prescription drugs.”

data-worth

2015 is shaping up to be the year of the cloud and improved, beefed up security. Hopefully companies can keep up with those who want to compromise sensitive customer information. Were there any hacks that they missed?

Expect the next several years to command new growth of information security tools and hosting platforms which focus on the protection of data. We are in a digital age where businesses can’t afford to have their data comprisied in any fashion.

By Jason Sander

Jason Sander

Jason is a versatile and driven writer with 10 years of experience. He engages your audience and gets them to act - or just think, if that's your goal. Jason's expertise in website content, entrepreneurship, sales copy, journalism and creative direction sets him apart from the rest.

CONTRIBUTORS

Will Chatbots Finally Make Mobile Payments Popular?

Will Chatbots Finally Make Mobile Payments Popular?

The Future of Chatbots We’ve profiled several digital wallet platforms that aim to change how we make payments. Apple, Samsung, ...
10 Companies To Watch In 2017

10 Companies To Watch In 2017

Companies To Watch We are sure 2017, much like 2016, is going to be another amazing year for technology and ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
Cloud Access Security Broker and the Cloud-based Business Role

Cloud Access Security Broker and the Cloud-based Business Role

Cloud Access Security Broker (CASB) Cloud is the new address for businesses nowadays. The number of applications, hosted on the ...
Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in ...
The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just ...
What Is Really Driving Cloud Adoption?

What Is Really Driving Cloud Adoption?

Driving Cloud Adoption Cloud adoption is growing at an astounding rate, with companies big and small undergoing digital transformation towards ...
Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information ...

NEWS

CIOs Cutting Through the Hype and Delivering Real Value from Machine Learning, Survey Shows 

CIOs Cutting Through the Hype and Delivering Real Value from Machine Learning, Survey Shows 

New survey reveals progressive CIOs tap machine learning to solve everyday work problems SANTA CLARA, Calif. – October 17, 2017– A ...
Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Top Threats to Cloud Computing SEATTLE, Oct. 20, 2017 /PRNewswire/ -- The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining ...
IBM’s cloud, cybersecurity and data analytics business rose 11 percent to $8.8 billion in the quarter

IBM’s cloud, cybersecurity and data analytics business rose 11 percent to $8.8 billion in the quarter

Big Blue back on the attack, analysts cautious (Reuters) - IBM shares surged 5 percent on Wednesday after the world’s ...

CloudTweaks CONTRIBUTOR PROGRAM

The CloudTweaks thought leadership profile building program is free to join but requires a commitment of atleast 3 articles over a 12-month period. Articles must be vendor-neutral in nature, related to connected cloud technologies and written by an executive level business representative to be considered.

You can also contact us to hear more about our on-demand content and lead generation programs for 2018