Passwords, Email Addresses, Were Most Stolen Data In 2015
A tally of reported data breach incidents worldwide in 2015 shows that user credentials are one of the hottest commodities bad hackers crave: some 50% of all incidents exposed passwords and email addresses.
Risk Based Security in new report also found that of the nearly 4,000 reported incidents, which exposed some 736 million data records, 40.5% occurred in US organizations, accounting for nearly 65% of the breached data for the year.
Most of the stolen data records -- some 238 million -- came from just four data breaches. Some 55% of the attacks victimized between 1 and 1,000 data records, according to Risk Based Security, which tracks reported data breaches via its proprietary application that crawls breach reports and also manually gathers information via the Open Security Foundation.
Oil companies as well as convenience stores landed in the Top 12 of companies suffering multiple incidents last year, including Shell Oil, 7-Eleven, Exxon Mobil, Circle K Convenience Stores, and Sunoco. Some of that trend had to do with a resurgence in skimming attacks on gas pumps.
Government agencies reported some 37 multiple incidents; retail, 32; and education, 27. “A staggering 142 organizations reported multiple data breaches in 2015 alone, setting another dubious record,” says Barry Kouns, CEO of Risk Based Security.
For a great satire on email, please see the following:
Good Netiquette And A Green Internet To All!
Special Bulletin - My just released book,
is now on sales at Amazon.comGreat Reasons for Purchasing Netiquette IQ
· Get more email opens. Improve 100% or more.
· Receive more responses, interviews, appointments, prospects and sales.
· Be better understood.
· Eliminate indecision.
· Avoid being spammed 100% or more.
· Have recipient finish reading your email content.
· Save time by reducing questions.
· Increase your level of clarity.
· Improve you time management with your email.
· Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.
=================================**Important note** - contact our company for very powerful solutions for IP
management (IPv4 and IPv6, security, firewall and APT solutions:
Another Special Announcement - Tune in to my radio interview, on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
In addition to this blog, I maintain a radio show on BlogtalkRadio online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahooa member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services. Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me firstname.lastname@example.org.