Attacks/Breaches
1/4/2011
12:41 PM
50%
50%

Hackers, Insiders Behind Most Identity Theft

Malicious activity topped human error as a cause of the 662 data breaches recorded in 2010 by the Identity Theft Resource Center.

Top 10 Security Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Security Stories Of 2010
Data breaches continue to plague businesses. According to the Identity Theft Resource Center (ITRC), in 2010, there were at least 662 data breaches, exposing more than 16 million records. Nearly two-thirds of breaches exposed people's social security numbers, and 26% of breaches involved credit or debit card data.

According to the ITRC's analysis, more attacks result from malicious intent than human error. The leading malicious causes of data breaches were hacking attacks (17.1%) and insider theft (15.4%). "Data on the move -- taking information from the workplace unprotected -- was 16.6% and accidental exposure on Web/Internet was 11%," said Linda Foley, founder and chairman of the ITRC. "Both are totally preventable and should be 0%."

While the above statistics provide insights into the scale and extent of data breaches, the ITRC also cautioned that it's only a partial picture. That's because 49% of organizations that suffered a breach didn't detail the number of potentially exposed records. In addition, many organizations simply don't disclose data breaches.

What counts as a data breach? The ITRC said it defines a breach as any event that puts a person's name, as well as some piece of unencrypted, sensitive information -- a person's social security number, driver's license number, financial details, or medical records -- at risk.

Not all data breaches are digital. In fact, according to the ITRC, "paper breaches account for nearly 20% of known breaches and typically go unnoticed until a consumer reports the problem to local media." In general, it said, companies have no legal requirement to disclose when their paper records have been breached.

In 2010, organizations that revealed they'd suffered a data breach included Educational Credit Management (3.3 million records), AvMed Health Plans (1.2 million), Lincoln National Financial Securities (1.2 million), South Shore Hospital in Massachusetts (800,000), and Ohio State University (760,000).

Other organizations, such as Experian and Home Depot, also experienced data breaches, but didn't disclose the number of people or records affected. As that suggests, legally speaking, data breach notification often remains a gray territory.

Some states, but not all, have data breach notification laws, which require any organization that suffers a breach to notify that state's affected residents. Interestingly, the ITRC found that information about 29% of the 662 reported breaches for 2010 could be credited to authorities in those states. "This is a clear argument for mandatory reporting to achieve transparency for the public," said the ITRC.

The organization also renewed its call for a single, nationwide clearinghouse of data breach information. "It should be comprehensive enough to allow readers to find out what happened, what information was compromised, and why the breach happened," said the ITRC. "This would also allow law enforcement to better address this type of crime."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.