What are Some of History's Worst Data Breaches

Worst Data Breaches

Some of the worst data breaches have been revealed. We’ve mentioned before that with all the recent massive hacks on Sony, Microsoft, Home Depot, etc. companies are focusing more and more on the necessity of improved security measures. This recent surge of beefed up security has left some of us in the tech world wondering about some of worst hacks in history.

According to an Infographic from Information is Beautiful: “The Court Ventures hack of 2012 appears to be the biggest hack in history, in terms of number of records stolen.

data-issues

The infographic allows viewers to filter the information. Interestingly enough, some of the biggest breaches of the most sensitive data in history were inside jobs: that of the US Military and Embassy Cables in 2009 and the recent Korea Credit Bureau hack. Perhaps this data might lead to changes in the corporate screening processes for IT applicants. IT professionals are increasingly responsible for the protection of sensitive company and customer data. But what happens when an organization can’t protect itself from its own employees?

So what is the most valuable information that can be hacked?

Reports from Information is Beautiful indicate: “The most valuable hacked data is that of fresh credit cards depending on their credit limit. PayPal accounts are a close second. health credentials are an unexpected third on this list, usually used to illegally buy and sell prescription drugs.”

data-worth

2015 is shaping up to be the year of the cloud and improved, beefed up security. Hopefully companies can keep up with those who want to compromise sensitive customer information. Were there any hacks that they missed?

Expect the next several years to command new growth of information security tools and hosting platforms which focus on the protection of data. We are in a digital age where businesses can’t afford to have their data compromised in any fashion.

By Jason Sander

Juan Pablo Perez Etchegoyen

7 Security and Compliance Considerations for Cloud-Based Business Applications  

Security and Compliance Considerations There’s no doubt on-premises deployments of mission-critical business applications provide more control over data as it resides within the four walls of an organization’s network infrastructure. However, businesses can no longer ...
Lauren Brunson

The Growing Need to Consolidate Multi-Tenant Environments

Consolidate Multi-Tenant Environments Over the past four months, countless businesses and universities have scrambled to the cloud to enable their employees and students to work remotely during the global coronavirus pandemic. Managed service providers (MSPs) ...
Anita Raj

A Winning Data Strategy Series Part 4: Are Your Data-driven Insights Driving Business Results?

Are your data-driven insights driving business results? This is the fourth piece of a 5-part series on plugging the obvious but overlooked gaps in achieving digital success through a refined data strategy. How would you ...
Ramanan GV

Establishing a Unified Governance Model for the Digital Workforce

Increase visual control and reduce OPEX by 30% The Digital Service Providers (DSPs) are riding an automation wave. Painful manual tasks, which burdened staffs for ages, can now be easily handled by the software bots ...
Chris Collins

Why Cloud Technology is a Smart Business Move for Higher Education

Higher Education Technology Cloud technology is not just for the world of big business. A growing number of higher education institutions are also embracing the cloud’s many advantages, especially for its data gathering and analytics ...
Chris Collins

How The Cloud Put Customers First During COVID-19

Tech’s True Value in a Crisis One of the cloud’s biggest assets has always been crisis preparedness—because when disaster strikes, you don’t have to worry about the viability of on-premise servers or the availability of ...