Statistics of 2015 Data Breaches

1
2015 2014 STATISTICS OF 2015 DATA BREACHES 2015 was a rough year for hotel data security as numerous major companies reported breaches. The 2016 “Trustwave global security report” reviewed data intrusions from around the world in 2015 to locate trends and identify common weaknesses, sharing the statistics for corporate data breaches with further breakdowns by industry. External detection means the victim is notified by regulatory bodies, law enforcement or other third parties. Source: Trustwave 18% 9% 9% 100% point of sales corporate/internal network IT Environments Compromised Hospitality 75% 25% 45% 55% Food and Beverage e-commerce credit card magnetic strip data Types of Data Compromised proprietary data financial credentials 64% Internal Versus External Detection of a Breach Median duration of a data breach until detection (days) 126 External 10 Internal 168 15 Median duration between detection and containment (days) 28 External 1 Internal Internal detection means victims of a data breach have the capability to detect an intrusion on their own or through a third-party security provider. Hospitality Food and Beverage illustrations: annamarie hudson 2015 Top method of detection 2014 Regulatory bodies, card brands or merchant banks Top method of detection 2015 Self-detected

Transcript of Statistics of 2015 Data Breaches

Page 1: Statistics of 2015 Data Breaches

2015

2014

STATISTICS OF

2015 DATABREACHES

2015 was a rough year for hotel data security as numerous major companies reported breaches. The 2016 “Trustwave global security report” reviewed data intrusions from around the world in 2015 to locate trends and identify common weaknesses, sharing the statistics for corporate data breaches with further breakdowns by industry.

External detection means the victim is notified by regulatory bodies, law enforcement or other third parties.

Source: Trustwave

18%

9%

9%

100%

point of sales corporate/internal network

IT Environments Compromised

Hospitality 75%

25%

45% 55% Food andBeverage

e-commerce credit card magnetic strip data

Types of Data Compromised

proprietary data financial credentials

64%

Internal Versus External Detection of a Breach

Median duration of a data breach until detection (days)

126

External

10

Internal

16815

Median duration between detection and containment (days)

28 External1Internal

Internal detection means victims of a data breach have the capability to detect an intrusion on their own or through a third-party security provider.

Hospitality Food andBeverage

illustrations: annamarie hudson

2015

© 2016 STR, Inc. All Rights Reserved. illustrations: annamarie hudsonSource: STR, data current as of April 2016

Top method of detection 2014 Regulatory bodies, card brands or merchant banks

Top method of detection 2015 Self-detected