Data Breaches Visualized

On: October 3, 2013
If you're in the information security field, you've been exposed to a lot statistics about data breaches, security fails, and personal data losses.

If you’re in the information security field, you’ve been exposed to a lot statistics about data breaches, security fails, and personal data losses.

But the linked visualization “World’s Biggest Data Breaches (Selected losses greater than 30,000 records)” brings a lot of clarity to the information, and shows just how many people, and how many companies, fall prey to the kinds of careless mistakes that can be solved by quality information security awareness training, with dedicated reinforcement practices. (And I’m happy to say that none of our clients are on the data breach list!)

This visualization tools lets you filter by organization, method of leak, number of records stolen, data sensitivity, and year. This tool provides not only a bubble chart, but each circle, when clicked shows the details of the data breach incident.

Kudos to creators David McCandless, Tom Evans, and their research team: Miriam Quick, Ella Hollowood, Christian Miles, and Dan Hampson.

Click through to view, below.

Share this Article

Related Articles

Don't waste time and money on an awareness program that doesn't yield real results. Download our white paper for tips on improving your awareness program.
White Paper: 5 Strategies for Improving the Effectiveness of Your Awareness Program
The annual Verizon Data Breach Investigations Report serves up as many learning moments as it does troubling InfoSec statistics this year.
The More You Know: 5 Lessons from the 2016 Verizon Data Breach Report
A new report shows just how big a role the human factor plays in cybersecurity concerns. (Hint, it's pretty big).
Human Factor Report: Social Engineering Ranks As Top Attack Technique
Find out the results of our 2016 State of Privacy and Security Awareness Report with this infographic, and take the awareness survey yourself.
Infographic: 2016 State of Privacy and Security Awareness