The 38 security statistics that matter most

The 38 security statistics that matter most

The 38 security statistics that matter most

Security by the numbers

The 38 cybersecurity stats that matter most
Analyst reports, vendor surveys, and research studies offer a wealth of statistics on the current state of cybersecurity within industry and government. They help organizations get a sense of emerging threats and how their security controls and processes compare against industry best practices and trends. But keeping on top of the topics that really matter can be incredibly hard given the sheer volume and diversity of technology reports and market statistics being churned out these days from myriad sources.

To help you focus on the security  stats that really matter , we pored through data from multiple analyst reports, vendor surveys, and research studies. In going through the reports, we focused on surveys and research that brought fresh insight to topics that have been covered in the past or offered new visibility on emerging and important issues.

When choosing data from a survey, we considered issues such as sample size and methodology, to make sure that any data was representative and accurate to the best extent possible. We focused on the data that really mattered while disregarding the obvious and the previously known. 
Our goal was to get you up to speed on the topics and discussions that are helping shape the cybersecurity narrative at the enterprise and government levels. We have organized the data into ten categories, including data breaches, malware trends, encryption, and the skills issue.

Read Also:
What Happens When You Combine Artificial Intelligence and Satellite Imagery

Here (in no particular order) is a list we have compiled of the 38 cybersecurity stats that matter most.
Data breach stats, by the numbers

223: The total number of publicly reported data breaches in 2015
If the number of breaches that have been disclosed so far in 2016 is added in, the total number of publicly reported breaches since January 2015 increases to 270. That total is actually smaller than the 297 breaches that were publicly reported in 2014 alone, but in terms of scope, 2015’s data breaches were a whole lot bigger.
Source: Chronology of Data Breaches (Privacy Rights Clearinghouse)

159,806,735: The total number of records containing sensitive information that were compromised in 2015
Although the total number of breaches was down, do not let that stat fool you. In terms of scope, 2015's data breaches were bigger and compromised a lot more records. When the first three months of this year are included in the count, the total number of exposed records increases to 160,089,095. That number is well more than double the 67,936,385 records compromised in 2014.
Source:  Chronology of Data Breaches  (Privacy Rights Clearinghouse)

Read Also:
Buyers Beware: Data Visualization is Not Data Analytics

6,025,821: The total number of records containing sensitive information accidentally compromised
The number is several orders of magnitude greater than the 175,004 records that were compromised as the result of accidental disclosure in 2014. But that’s only because a single breach at the Georgia Secretary of State’s Office accounted for 6 million of those records. Accidental data compromises include data being accidentally published on public websites or sent via mail or fax to the wrong recipients.
Source:  Chronology of Data Breaches  (Privacy Rights Clearinghouse)

14: The number of publicly disclosed data breaches involving insider abuse
The total number of records containing sensitive data from these incidents was 96,472 for the period from January 2015 through March 2016. The numbers suggest that insider abuse is not as big a contributor to data breaches as is generally perceived.
Source:  Chronology of Data Breaches  (Privacy Rights Clearinghouse)

98: The average number of days it took for financial companies to detect a data breach in 2015
Retailers took an even longer 197 days to detect a breach, showing that organizations have a long way to go in their ability to detect network intrusions and remediate a breach quickly.

Read Also:
Luggage Tag Code Unlocks Your Flights, Identity to Hackers


Read Also:
Verizon is now competing with Facebook and Google in tracking consumers’ personal data
Read Also:
The role of machine learning in data science and analytics
Read Also:
What Happens When You Combine Artificial Intelligence and Satellite Imagery
Read Also:
Verizon is now competing with Facebook and Google in tracking consumers’ personal data

Leave a Reply

Your email address will not be published. Required fields are marked *