2023 Sees Record Data Compromises Amidst Changing Tactics

Last year saw a nearly 80% surge in data compromises compared to 2022, with 3,205 incidents recorded, according to a report from the Information Theft Resource Center.
Despite the surge in breaches, the number of victims impacted saw a 16% decline from 2022, totaling 353,027,892 individuals.
The ITRC's 2023 Annual Data Breach Report also shed light on significant shifts in cybersecurity threats, revealing a doubling in breach notices lacking specific attack details.
Just 54% of notices provided actionable information, down from nearly 100% in 2018, indicating a decline in transparency surrounding data breaches.
Security experts explained that, with the increasing trend toward opaque breach notices, organizations must enhance their transparency in disclosing data breaches.
Nick France, chief technology officer at Sectigo, said enhancing transparency in disclosing data breaches requires organizations to establish clear policies, provide timely notifications and engage in open communication with stakeholders.
Key findings from the ITRC report also underlined the widespread impact of cybersecurity threats across industries.
Nearly 11% of publicly traded companies fell victim to breaches, with 47% withholding attack information in their notices.
Healthcare, financial services, and transportation sectors experienced more than double the compromises compared to the previous year, with utility companies leading in victim numbers.
Publicly traded companies face specific challenges in maintaining cybersecurity resilience due to their high-profile nature and the scrutiny they face from shareholders, regulators and the public.
France explained these challenges include balancing cybersecurity investments with shareholder expectations, managing complex supply chain risks, vendor consolidation and addressing regulatory compliance requirements.
Collaboration with industry peers and leveraging emerging technologies can also bolster cybersecurity resilience for publicly traded companies.
The report also highlighted evolving attack vectors, with cyberattacks remaining the primary cause of breaches.
While phishing and ransomware attacks saw a slight decline, zero-day exploits surged significantly, posing new challenges for cybersecurity professionals.
Supply chain attacks emerged as a growing concern, impacting a rising number of organizations and individuals.
Since 2018, incidents have skyrocketed by over 2,600%, with victims increasing by 1,400%.
They should look at ways to streamline their investigation and determine the potential materiality of an incident using technologies like data security posture management and data detection and response.
Mandy said they should also be actively and proactively trying to reduce the data at risk from compromises of actionable issues like dormant identities and dormant data and overprivileged accounts to ensure they reduce the frequency of events that trigger the materiality thresholds.
France noted organizations can strengthen their cybersecurity posture through proactive measures.
Establishing incident response plans, collaborating with industry peers and security experts, and staying informed about emerging threats can help mitigate the risk of falling victim to similar attacks in the future.


This Cyber News was published on securityboulevard.com. Publication date: Fri, 09 Feb 2024 14:13:03 +0000


Cyber News related to 2023 Sees Record Data Compromises Amidst Changing Tactics

2023 Sees Record Data Compromises Amidst Changing Tactics - Last year saw a nearly 80% surge in data compromises compared to 2022, with 3,205 incidents recorded, according to a report from the Information Theft Resource Center. Despite the surge in breaches, the number of victims impacted saw a 16% decline ...
4 months ago Securityboulevard.com
Data Governance: MDM and RDM - Data governance is a framework that is developed through the collaboration of individuals with various roles and responsibilities. These goals may include providing reliable data for business operations, developing accurate analytics to assess ...
6 months ago Feeds.dzone.com
Chinese APT 'Earth Krahang' Compromises 48 Gov't Orgs on 5 Continents - A previously unidentified Chinese espionage group has managed to breach at least 70 organizations across 23 countries, including 48 in the government space, despite using rather standard-fare tactics, techniques, and procedures. Fitting such a ...
3 months ago Darkreading.com
'Sex life data' stolen from UK government among record number of ransomware attacks - Data on the sex lives of up to 10,000 people was stolen from a British government department in one of the record number of ransomware attacks to have hit Westminster in the first half of this year. It is not known which department the information ...
7 months ago Therecord.media
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
3 months ago Feeds.dzone.com
CVE-2021-46989 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
3 months ago Venturebeat.com
New Microsoft Purview features use AI to help secure and govern all your data - More than 90% of organizations use multiple cloud infrastructures, platforms, and services to run their business, adding complexity to securing all data.1Microsoft Purview can help you secure and govern your entire data estate in this complex and ...
6 months ago Microsoft.com
Developing Software Applications Under the Guidance of Data-Driven Decision-Making Principles - To architect and cultivate an application that yields precise outputs in alignment with business requirements, paramount emphasis must be given to the foundational data and the pertinent data scenarios shaping the application. Software application ...
4 months ago Feeds.dzone.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
6 months ago Helpnetsecurity.com
When a Data Mesh Doesn't Make Sense - The data mesh is a thoughtful decentralized approach that facilitates the creation of domain-driven, self-service data products. Data mesh-including data mesh governance-requires the right mix of process, tooling, and internal resources to be ...
3 months ago Feeds.dzone.com
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
1 year ago Tripwire.com
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
6 months ago Securityboulevard.com
Unlocking the Secrets of Data Privacy - Data masking, or obfuscation involves hiding original data with random characters or data. Data masking is commonly used in software development and testing, where developers must work with realistic data sets without accessing sensitive information. ...
5 months ago Feeds.dzone.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
6 months ago Securityzap.com
How Data Fabric Architecture Helps Enhance Security Governance - Essentially, data fabric is an approach to managing and integrating data, aimed at enabling access to information across the enterprise in a versatile, iterable, and augmented way. The data fabric concept can translate into an architecture that ...
1 month ago Cybersecurity-insiders.com
Data Privacy and Security - Organizations are gradually becoming concerned regarding data security in several instances, such as collecting and retaining sensitive information and processing personal information in external environments, which include information sharing and ...
7 months ago Feeds.dzone.com
How To Implement Data Management Into Your AI Strategy - While an AI strategy has different components, including infrastructure, technology stack, organizational changes, and more, the most important is the data strategy. A well-defined data strategy is the foundation for successful AI implementation. AI ...
6 months ago Feeds.dzone.com
Protect Your Data: Why Data Is More Valuable Than You Realize - Data is more valuable than you realize, and protecting it should always be a top priority. Data privacy has never been more important, and organizations need to understand the risks of data exposure and implement measures to protect against data ...
1 year ago Welivesecurity.com
Data Loss Prevention for Business: Strategies and Tools - Data Loss Prevention has become crucial in today's data-driven business landscape to protect sensitive information. This discussion aims to provide valuable insights into DLP strategies and tools for business, helping mitigate data loss risks ...
5 months ago Securityzap.com
Real-Time Data Warehousing Based on Apache Doris - This is a whole-journey guide for Apache Doris users, especially those from the financial sector, which requires a high level of data security and availability. If you don't know how to build a real-time data pipeline and make the most of the Apache ...
5 months ago Feeds.dzone.com
Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity - COMMENTARY. Global data privacy laws were created to address growing consumer concerns about individual privacy. These laws include several best practices for businesses about storing and using consumers' personal data so that the exposure of ...
7 months ago Darkreading.com
Business Data Privacy Laws: Compliance and Beyond - Governments worldwide have implemented strict data privacy laws to protect individuals' information in the face of increasing cyber threats and data breaches. Let's dive into the world of business data privacy laws as we navigate the complexities of ...
5 months ago Securityzap.com
Edge Computing: Data and Connectivity - Edge computing is a distributed computing model that brings processing capabilities closer to the data source, be it IoT devices, sensors, or end-user devices, rather than relying on centralized data centers. By decentralizing data processing, edge ...
6 months ago Feeds.dzone.com
Strategies for Securing Student Data in Cloud Services - This article addresses the strategies that educational organizations can employ to ensure the protection and confidentiality of student data in cloud services. Implementing strong access controls is crucial for ensuring the security of student data ...
6 months ago Securityzap.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)