What are Some of History's Worst Data Breaches

Worst Data Breaches

Some of the worst data breaches have been revealed. We’ve mentioned before that with all the recent massive hacks on Sony, Microsoft, Home Depot, etc. companies are focusing more and more on the necessity of improved security measures. This recent surge of beefed up security has left some of us in the tech world wondering about some of worst hacks in history.

According to an Infographic from Information is Beautiful: “The Court Ventures hack of 2012 appears to be the biggest hack in history, in terms of number of records stolen.

data-issues

The infographic allows viewers to filter the information. Interestingly enough, some of the biggest breaches of the most sensitive data in history were inside jobs: that of the US Military and Embassy Cables in 2009 and the recent Korea Credit Bureau hack. Perhaps this data might lead to changes in the corporate screening processes for IT applicants. IT professionals are increasingly responsible for the protection of sensitive company and customer data. But what happens when an organization can’t protect itself from its own employees?

So what is the most valuable information that can be hacked?

Reports from Information is Beautiful indicate: “The most valuable hacked data is that of fresh credit cards depending on their credit limit. PayPal accounts are a close second. health credentials are an unexpected third on this list, usually used to illegally buy and sell prescription drugs.”

data-worth

2015 is shaping up to be the year of the cloud and improved, beefed up security. Hopefully companies can keep up with those who want to compromise sensitive customer information. Were there any hacks that they missed?

Expect the next several years to command new growth of information security tools and hosting platforms which focus on the protection of data. We are in a digital age where businesses can’t afford to have their data compromised in any fashion.

By Jason Sander

Shireesh Thota
Here’s How to Position Your Organization for the Era of Data Intensity We live in a data-intensive era. Data is booming. Companies are realizing that data is one of the most important assets and they ...
Drew Firment
Here’s How to Make Sure Your Skills are Cloud Ready This year will be a period of meteoric growth for the cloud industry. Research from Gartner suggests that global spending on public cloud services in ...
Security Breach 10 Useful Cloud Security Tools
Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense of security. Cloud computing has become a business solution for ...
David Loo
The Long-term Costs of Data Debt It’s no secret that many of today’s enterprises are experiencing an extreme state of data overload. With the rapid adoption of new technologies to accommodate pandemic-induced shifts like remote ...
Damian Ng
3 Cloud Modernization Challenges There’s no denying that migrating to the cloud unlocks multiple benefits for organizations looking to modernize their IT infrastructure. However, the journey to truly unlock the benefits of the cloud and ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.