Home Resources Blog Breach Activity Declines, Number of Compromised Records Remains High

Breach Activity Declines, Number of Compromised Records Remains High

Admin Globaldots
11.05.2018
image 1 Min read

After year over year increases in the number of reported data breaches, Risk Based Security has released the results of their Q1 2018 Data Breach QuickView Report, showing the number of breaches disclosed in the first three months of the year fell to 686 compared to 1,444 breaches reported in Q1 2017. The number of records compromised in the quarter remained high, with over 1.4 billion records exposed.

Shifting tactics also appears to have played a role in the decrease. Cryptomining malware and cryptojacking has been a part of the threat landscape since early 2017. However the spike in the value of cryptocurrencies that took place in January fueled a rapid expansion into the theft of computing resources.

Beyond the number of breaches reported, many of the trends observed throughout 2017 continued to be evident in the first three months of 2018. For example, the top 5 breach types that dominated recent reports – hacking, skimming, inadvertent disclosure on the Internet, phishing and malware – all remained the top breach types into 2018.

Image Source

Read more: Help Net Security

Learn More

Streamline Your Alert Management with Groupings
Monitoring, Logging & Observability
Admin Globaldots 02.02.23

Alerting is crucial for avoiding outages, not just responding to them. That’s why GlobalDots is adopting an innovation that revolutionizes the way alerts are processed, enabling teams to achieve their goals proactively and resolve issues quickly. Handling alerts on a large scale can be difficult, especially when dealing with hundreds or even thousands of alerts. […]

Read more
You’ll Need Zero Trust, But You Won’t Get It with a VPN
SD-WAN and SASE
Eyal Webber Zvik, Cato Networks 12.01.23

Properly implemented, a zero trust architecture provides much more granular and effective security than legacy security models. However, this is only true if a zero trust initiative is supported with the right tools. Legacy solutions, such as virtual private networks (VPNs), lack the capabilities necessary to implement a zero trust security strategy. Zero Trust Security is […]

Read more
4 Ways Where Remote Access VPNs Fall Short
SD-WAN and SASE
Eyal Webber Zvik, Cato Networks 09.01.23

The Global Content Delivery Network (CDN) market is expected to grow by $42.4 billion between now and 2032.

Read more
Unlock Your Cloud Potential
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Book a Demo