In Pictures: Worst data breaches of 2014
We used 1 million records exposed as our floor in creating this list. Starting with a number that big says a lot about the state of data security.
30 Mar | View galleries
As regulator records 36 data breaches in 4 months, historical analysis suggests share prices could suffer a hit
David Braue | 11 Nov | Read more
Enquiries taking longer to resolve as OAIC redoubles support for privacy, FOI objectives
David Braue | 23 Oct | Read more
With volumes of cybersecurity insurance claims surging, businesses need to be more careful than ever about what their policies do and don’t cover, according to an academic who warned that insurers are becoming more mercenary in their interpretations of cyber events.
David Braue | 09 Oct | Read more
Cybercriminals playing on mission-critical nature of the business to extract sizeable ransoms
David Braue | 04 Oct | Read more
Finance breaches up 56 percent but healthcare remains most exposed
David Braue | 28 Aug | Read more
How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.
Kim Lindros and Ed Tittel | 24 Feb | Read more
Many of the big name organisations have recently boosted their security divisions by securing top ranking IT security heads.
Data breaches made big news in 2015 as measured by a variety of criteria that range from the number of records compromised to the types of data stolen to the potential threat to specific groups such as children.
Tim Greene | 02 Dec | Read more
Each day is different because of the variety in our work. This can include strategic discussions, solving customer problems, investing in our great people and of course keeping a careful watch on attacks, threats and our cyber activities.
Upon discovering that someone has illegitimately accessed data on the network, IT managers initially believe (hope, really) that the threat came from outside. But as recent, headline-grabbing data breaches demonstrate, a lapse in internal security — whether accidental or malicious — is often what enabled the attack to succeed, in spite of robust external security. Download this whitepaper to see how to minimize the risk of the internal threat to the availability, confidentiality and integrity of AD.