RECORDS LOST: SINCE 2013


RECENT DATA BREACHES

TOP DATA BREACH INCIDENTS BY SOURCE

Calculate by date range, hover over pie chart to display totals.

-
No data found.

TOP DATA BREACH RECORDS BY INDUSTRY

Calculate by date range, hover over pie chart to display totals.

-
No data found.

BREACH LEVEL INDEX:

Not all breaches are created equal. Breaches
are no longer a binary proposition where an organization either has or hasn’t been breached. Instead they are wildly variable—having varying degrees of fallout—from breaches compromising entire global networks of highly sensitive data to others having little to no impact whatsoever.

The Breach Level Index not only tracks publicly disclosed breaches, but also allows organizations to do their own risk assessment based on a few simple inputs that will calculate their risk score, overall breach severity level, and summarize actions IT can take to reduce the risk score.

Calculate Your Risk Score  >

SECURE THE BREACH:

Part 1

Part 2



Learn More   >

Breach Database: Top Breaches

FILTER BY

-

WHAT IS THE BREACH LEVEL INDEX?

Not all breaches are created equal. They can have varying degrees of fallout with some breaches compromising global networks of highly sensitive data, and others for having little to no impact whatsoever on your company.

Learn More »


Rank
Organization
Breached

Action
Date
Breached
Records
Breached
Source
of Breach
Type of
Breach

Risk Score

Risk Assessment: What's Your Score

The Data Breach Risk Assessment Calculator is a simple way to provide your inputs into the Breach Level Index in order to calculate your own risk score—indicating breach severity.

Calculate Your Risk Score

Total Number of Records Breached
The Type of Data in the Records
Source of the Breach
How Info Was Used
Calculate Another Risk Score »

Your Breach Severity Level:

  • A breach with no material effect.
  • Less then one thousand records.
  • Breach notification required, but little damage done.
  • A breach with low long-term business impact.
  • Usually involves the loss of several thousands of records of semi sensitive information.
  • Limited breach notification and financial exposure.
  • A breach with likely short to midterm exposure to business.
  • Legal and/or regulatory impact.
  • Usually tens of thousands of records of moderate sensitive information involved.
  • Some breach notification and financial loss.
  • A breach with significant exposure to business, legal and or regulatory impact.
  • Large amount of sensitive information lost (usually hundreds of thousands to millions of records).
  • Significant notification process costs involved and public image impact.
  • Breach with immense long term impact on breached ogranization, customers and/or partners.
  • Very large amount of highly sensitive information lost (usually 10-100+ million records).
  • Massive notification process.
  • Potentially existential financial loss for breached organization in remediation and related costs.
  • Use of lost sensitive information seen.

Your Risk Score:

How to reduce your risk

The first step in addressing this reality is focusing on the data itself. Since not all data is created equal, this means identifying, encrypting and controlling your most sensitive and high-value data assets.

The second step is understanding where the data lives, essentially its point of creation. By applying embedded or encrypted protection at this crucial point, you ensure that the data is protected throughout its lifecycle and in all environments—from the data center to the cloud.

The end result is a Secure Breach environment where perimeter breaches have no actual impact on the encrypted data itself. In other words, data protection that works.

Visit Safenet Website   >

Move From Breach Prevention
To Breach Acceptance

The very foundation of data security is evolving. It’s no longer about “keeping the bad guys out and letting the good guys in” through breach prevention. This legacy approach isn’t practical given the demands businesses are placing on their data. More and more organizations are accepting the fact that despite their best efforts security breaches are unavoidable.


Watch Part 1 »
Watch Part 2 »

Breach Level Index
2013 Annual Recap

Download PDF »

Secure The Breach

The first step in addressing this reality is focusing on the data itself. Since not all data is created equal, this means identifying, encrypting and controlling your most sensitive and high-value data assets.

The second step is understanding where the data lives, essentially its point of creation. By applying embedded or encrypted protection at this crucial point, you ensure that the data is protected throughout its lifecycle and in all environments—from the data center to the cloud.

The end result is a Secure Breach environment where perimeter breaches have no actual impact on the encrypted data itself. In other words, data protection that works.

Want Details?
Breach Level Index Overview

Download PDF »


The Breach level Index is brought to you by SafeNet, a data protection company. Fill out the form below for a quick response from one of our customer service specialists.

Visit SafeNet Website »

Corporate Headquarters

  • 4690 Millennium Drive
    Belcamp, MD 21017
    Tel: +1 410 931 7500
  • Tel: 1 800 533 3958 - Sales
    TTY Users: +1 800 735 2258
    FAX: +1 410 931 7524

Request Information

Let us show you the right way to secure your most valuable asset – your data.

Your request has been submitted.


First Name*
Last Name*
Company*
Email*
Phone Number*
Country*
State/Province*
What is the company's industry?*
 

Report A Breach

If you noticed a breach that was missing while navigating the Breach Level Index database, please report it now.
Please make sure to provide the website reference in order for us to verify information, thank you.

Organization
Records Breached
Source of Breach
Type of Breach
Date
Website Reference
Comments
 
The Breach level Index is brought to you by SafeNet, a data protection company. Thank you for fill out our form. For more information about data protection, click the link below.

Visit SafeNet Website »

Corporate Headquarters

  • 4690 Millennium Drive
    Belcamp, MD 21017
    Tel: +1 410 931 7500
  • Tel: 1 800 533 3958 - Sales
    TTY Users: +1 800 735 2258
    FAX: +1 410 931 7524

Thank You


We appreciate you communicating with us. Let us know if you have any other questions.