Hello,

We noticed you're browsing in private or incognito mode.

To continue reading this article, please exit incognito mode or log in.

Not a subscriber? Subscribe now for unlimited access to online articles.

Business Report

Breaches and Security, By the Numbers

A look at how companies try—and fail—to defend themselves against data theft.

How is corporate data being stolen? Attacks often employ multiple methods—but remotely hacking a computer isn’t always one of them. Sometimes employees are involved, and some attackers physically break in. The numbers in the chart below total more than 100 percent because more than one method can be used in an attack.

Source: Verizon’s 2011 Data Breach Investigations Report, which analyzed 761 breaches

Given all the ways data breaches can occur, companies need to employ multiple methods of defense. This chart shows the main steps they are taking. Nearly half, for example, are removing data from the network rather than risk having it stolen. Companies often pursue several protective strategies, which is why the percentages total more than 100.

Source: Survey of more than 1,000 senior IT executives worldwide for Underground Economies, a 2011 report by McAfee and Science Applications International Corporation (SAIC)

As this year’s high-profile data breaches have shown, many organizations’ security measures are not proving resilient enough. This chart shows the 12 most common ways for companies to learn they have been breached.

Source: Verizon’s 2011 Data Breach Investigations Report.

Failing to turn the tide against data breaches is proving costlier each year. This chart shows the percentage of IT operating budgets that companies have been devoting to security.

Source: Forrester Research surveys in 2007, 2008, 2009, and 2010

Be there when AI pioneers take center stage at EmTech Digital 2019.

Register now
Next in this Business Report
Securing Data

In June, Business Impact will show why information security isn’t an issue only the IT department needs to worry about. We’ll explore why companies still struggle to secure data—from theft or loss—even after all the attention given to costly data breaches and hacking attacks. We’ll analyze fresh ideas for improving security in the cloud and on mobile devices and explain what smart companies are doing.

Want more award-winning journalism? Subscribe to All Access Digital.
  • All Access Digital {! insider.prices.digital !}*

    {! insider.display.menuOptionsLabel !}

    The digital magazine, plus unlimited site access, our online archive, and The Download delivered to your email in-box each weekday.

    See details+

    12-month subscription

    Unlimited access to all our daily online news and feature stories

    Digital magazine (6 bi-monthly issues)

    Access to entire PDF magazine archive dating back to 1899

    The Download: newsletter delivery each weekday to your inbox

/3
You've read of three free articles this month. for unlimited online access. You've read of three free articles this month. for unlimited online access. This is your last free article this month. for unlimited online access. You've read all your free articles this month. for unlimited online access. You've read of three free articles this month. for more, or for unlimited online access. for two more free articles, or for unlimited online access.