RECORDS LOST: SINCE 2013


RECENT DATA BREACHES

TOP DATA BREACH INCIDENTS BY SOURCE

Calculate by date range, hover over pie chart to display totals.

-
No data found.

TOP DATA BREACH RECORDS BY INDUSTRY

Calculate by date range, hover over pie chart to display totals.

-
No data found.

CyberVor records not included as affected industries are unknown.


TOP DATA BREACH RECORDS BY LOCATION SINCE 2013

Hover over map points to display total records breached by location.

    BREACH LEVEL INDEX:

    Not all breaches are created equal. Breaches
    are no longer a binary proposition where an organization either has or hasn’t been breached. Instead they are wildly variable—having varying degrees of fallout—from breaches compromising entire global networks of highly sensitive data to others having little to no impact whatsoever.

    The Breach Level Index not only tracks publicly disclosed breaches, but also allows organizations to do their own risk assessment based on a few simple inputs that will calculate their risk score, overall breach severity level, and summarize actions IT can take to reduce the risk score.

    Calculate Your Risk Score  >

    SECURE THE BREACH:

    It's not a question if your network will be breached, the only question is when. With the velocity of business increasing, new technologies constantly being deployed and new and sophisticated attacks regularly being launched, is it not inevitable that it is only a matter of time before your business is hacked.

    This two part video will introduce a new perspective in accepting that a breach will happen; we call this Breach Acceptance. When companies adopt the Secure the Breach mindset, they will fundamentally change the way they protect their organization by securing the real target of attacks -- the data -- rather than securing the vector.


    Watch Part 1 »



    Watch Part 2 »



    Learn More   >

    Breach Database: Top Data Breaches

    WHAT IS THE BREACH LEVEL INDEX?

    The BLI provides a centralized, global database of data breaches and calculates their severity based on multiple dimensions, including the type of data and the number of records stolen, the source of the breach, and whether or not the data was encrypted. By assigning a severity score to each breach, the BLI provides a comparative list of breaches, distinguishing nuisances from truly impactful mega breaches. Information populating the BLI database is based on publicly-available breach disclosure information.

    Learn More »

    DATE RANGE

    FILTER BY

    Reset Filters

    -



    Rank
    Organization
    Breached
    Date
    Breached
    Records
    Breached

    Location

    Industry
    Source
    of Breach
    Type of
    Breach

    Risk Score

    Risk Assessment: What's Your Score

    The Data Breach Risk Assessment Calculator is a simple way to provide your inputs into the Breach Level Index in order to calculate your own risk score—indicating breach severity.

    Calculate Your Risk Score


    Total Number of Records Breached
    The Type of Data in the Records
    Source of the Breach
    How Info Was Used
    Organization's Location
    Organization's Industry
    Calculate Another Risk Score »

    Your Breach Severity Level:

    • A breach with no material effect.
    • Less then one thousand records.
    • Breach notification required, but little damage done.
    • A breach with low long-term business impact.
    • Usually involves the loss of several thousands of records of semi sensitive information.
    • Limited breach notification and financial exposure.
    • A breach with likely short to midterm exposure to business.
    • Legal and/or regulatory impact.
    • Usually tens of thousands of records of moderate sensitive information involved.
    • Some breach notification and financial loss.
    • A breach with significant exposure to business, legal and or regulatory impact.
    • Large amount of sensitive information lost (usually hundreds of thousands to millions of records).
    • Significant notification process costs involved and public image impact.
    • Breach with immense long term impact on breached ogranization, customers and/or partners.
    • Very large amount of highly sensitive information lost (usually 10-100+ million records).
    • Massive notification process.
    • Potentially existential financial loss for breached organization in remediation and related costs.
    • Use of lost sensitive information seen.

    Your Risk Score:

    How to reduce your risk

    The first step in addressing this reality is focusing on the data itself. Since not all data is created equal, this means identifying, encrypting and controlling your most sensitive and high-value data assets.

    The second step is understanding where the data lives, essentially its point of creation. By applying embedded or encrypted protection at this crucial point, you ensure that the data is protected throughout its lifecycle and in all environments—from the data center to the cloud.

    The end result is a Secure Breach environment where perimeter breaches have no actual impact on the encrypted data itself. In other words, data protection that works.

    Visit Safenet Website   >

    Move From Breach Prevention
    To Breach Acceptance

    The very foundation of data security is evolving. It’s no longer about “keeping the bad guys out and letting the good guys in” through breach prevention. This legacy approach isn’t practical given the demands businesses are placing on their data. More and more organizations are accepting the fact that despite their best efforts security breaches are unavoidable.


    Watch Part 1 »
    Watch Part 2 »

    Breach Level Index
    Third Quarter 2014 Recap

    Download PDF »

    Breach Level Index
    Second Quarter 2014 Recap

    Download PDF »

    Breach Level Index
    First Quarter 2014 Recap

    Download PDF »

    Breach Level Index
    2013 Annual Recap

    Download PDF »

    Secure The Breach

    The first step in addressing this reality is focusing on the data itself. Since not all data is created equal, this means identifying, encrypting and controlling your most sensitive and high-value data assets.

    The second step is understanding where the data lives, essentially its point of creation. By applying embedded or encrypted protection at this crucial point, you ensure that the data is protected throughout its lifecycle and in all environments—from the data center to the cloud.

    The end result is a Secure Breach environment where perimeter breaches have no actual impact on the encrypted data itself. In other words, data protection that works.

    Want Details?
    Breach Level Index Overview

    Download PDF »
    The Breach level Index is brought to you by SafeNet, a data protection company. Fill out the form below for a quick response from one of our customer service specialists.

    Visit SafeNet Website »

    Corporate Headquarters

    • 4690 Millennium Drive
      Belcamp, MD 21017
      Tel: +1 410 931 7500
    • Tel: 1 800 533 3958 - Sales
      TTY Users: +1 800 735 2258
      FAX: +1 410 931 7524

    Request Information

    Let us show you the right way to secure your most valuable asset – your data.

    Your request has been submitted.


    First Name*
    Last Name*
    Company*
    Email*
    Phone Number*
    Country*
    State/Province*
    What is the company's industry?*
     

    Report A Breach

    If you noticed a breach that was missing while navigating the Breach Level Index database, please report it now.
    Please make sure to provide the website reference in order for us to verify information, thank you.

    Organization
    Records Breached
    Source of Breach
    Type of Breach
    Date
    Website Reference
    Comments
     
    The Breach level Index is brought to you by SafeNet, a data protection company. Thank you for fill out our form. For more information about data protection, click the link below.

    Visit SafeNet Website »

    Corporate Headquarters

    • 4690 Millennium Drive
      Belcamp, MD 21017
      Tel: +1 410 931 7500
    • Tel: 1 800 533 3958 - Sales
      TTY Users: +1 800 735 2258
      FAX: +1 410 931 7524

    Thank You


    We appreciate you communicating with us. Let us know if you have any other questions.