The recent Breach Level Index found that 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 86% compared to 2015 In a blog post last September, I highlighted how data breaches for the first half of 2016 shifted from stolen credit card data and financial information to the theft of something much more personal—identities. Unsurprisingly, this trend continued throughout the remainder of the year.According to the recently released Breach Level Index, 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 86 percent compared to 2015. Once again, identity theft was the leading type of data breach last year, accounting for 59 percent of all data breaches. The second most prevalent type of breach in 2016 is account access-based breaches. While the incidence of this type of data breach decreased by 3 percent, it made up 54 percent of all breached records, which is an increase of 336 percent from the previous year.This is a continuation of the trend I highlighted in September: Cyber criminals are moving from financial information attacks to mining bigger databases with large volumes of personally identifiable information. AdultFriendFinder (exposing a whopping 400 million records), Fling, DailyMotion and 17 Media were all large database attacks that made the short list of top-scoring breaches in 2016. By going after this personal data, cyber criminals can extort victims and/or organizations into paying fees in order to avoid having sensitive information made public. The IoT increases the number of attack vectorsThe emergence of the Internet of Things (IoT) will have a huge impact on the data breach landscape moving forward by increasing the number of attack vectors for these cyber criminals. The more access to more data they have, the more creative the attacks.Some of these will have immediate consequences for individuals and companies, and others will take longer to identify, giving hackers the time to conduct the most drastic breaches like data integrity attacks. Organizations base their decisions on the data they have access to and often rely heavily on its validity. If hackers or governments can modify the integrity of the data, major business decisions can be manipulated, resulting in significant yet still unknown consequences. This transition in the hacking community makes it harder for enterprises to determine the implications of attacks. As I’ve discussed before, it’s important companies take a situational awareness approach to data and identity security by knowing exactly where their data resides, the security categories of the data, and a user’s access rights to each data category. Companies can no longer assume they will be immune to attacks, but prepare a secure breach environment. Related content opinion Lack of confidence in data security can cost you more than you think The majority of companies don’t understand the value of their data, because they aren’t taking the necessary steps to study the information they are gathering from customers. By Jason Hart Jul 16, 2018 4 mins Regulation Data Breach Technology Industry opinion GDPR: Where we were…and where we’re going It’s clear that conventional methods to data security aren’t working anymore, so it’s time to step away from breach prevention and focus on a “secure breach” approach. By Jason Hart Jun 13, 2018 5 mins Regulation Government Technology Industry opinion Let’s get serious about security: 2.6 billion records stolen or compromised in 2017 Gemalto’s 2017 Breach Level Index found 2.6 billion records were compromised in 2017, as well a number of new data breach tactics. Breached or exposed data is not only a headache for security teams. It also impacts brand reputation, customer co By Jason Hart May 16, 2018 4 mins Data Breach Technology Industry Hacking opinion Understanding the challenges of cloud security Stay grounded as cloud security becomes more complicated. By Jason Hart Mar 08, 2018 5 mins Cloud Security Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe