{"id":1602,"date":"2015-05-01T04:29:17","date_gmt":"2015-05-01T04:29:17","guid":{"rendered":"http:\/\/www.abstracta.us\/?p=1602"},"modified":"2025-05-05T21:21:45","modified_gmt":"2025-05-05T21:21:45","slug":"2015-year-super-mega-breach","status":"publish","type":"post","link":"https:\/\/abstracta.us\/blog\/software-testing\/2015-year-super-mega-breach\/","title":{"rendered":"2015: The Year of the Super Mega Breach"},"content":{"rendered":"<p><!-- Go to www.addthis.com\/dashboard to customize your tools --><script src=\"\/\/s7.addthis.com\/js\/300\/addthis_widget.js#pubid=ra-58d80a50fc4f926d\" type=\"text\/javascript\"><\/script><\/p>\n<h1><span style=\"font-weight: 400; color: #333333;\">No need to be a visionary to see that 2015 will be the &#8216;Year of the Super Mega Breach&#8217;<\/span><\/h1>\n<p><span style=\"font-weight: 400; color: #333333;\">&#8220;2014 was yet another reminder that we are losing this contest.\u201d\u00a0<\/span><span style=\"font-weight: 400; color: #333333;\">Those were the words used by the RSA President Amit Yoran in his opening keynote at RSA Conference Conference in San Francisco last week.<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333333;\">The past year has seen a procession of high-profile data breaches against organizations as well-known and diverse as Target, Home Depot, PF Chang, Sony Pictures Entertainment, JPMorgan Chase and Anthem. These attacks have targeted data ranging from customer records to intellectual property and personal communications.\u00a0<\/span><span style=\"font-weight: 400; color: #333333;\">Some people say that these kinds of things only happen to the big companies, but is this true? <\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_Are_the_Odds_Your_Company_Will_Suffer_a_Data_Breach_This_Year\"><\/span>What Are the Odds Your Company Will Suffer a Data Breach This Year?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400; color: #333333;\">To better understand the potential risk to an organization\u2019s sensitive and confidential information, we thought it would be helpful to know the probability that an organization will have a data breach.<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333333;\">The statistics show that the probability of a data breach over the next two years involving a minimum of 10,000 records is nearly <b>19%<\/b>. In addition, we find that the probability or likelihood of data breach varies considerably by industry.<br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333333;\">Public sector organizations have the highest estimated probability of occurrence at 23.8%, while energy and utilities have the lowest rate of occurrence at only 7.5%.<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333333;\">So, assuming you are going to have a data breach in the future, <b>how much is it going to cost you?<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333333;\">According to 2014 benchmark findings, data breaches cost companies an average of $201 per compromised record.<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333333;\">Specifically, heavily regulated industries such as healthcare, transportation, education, energy, financial services, communications, pharmaceuticals and industrial companies tend to have a per record data breach cost substantially higher. In contrast, retailers, hospitality companies and public sector organizations have a per capita cost well below the overall mean value. <\/span><\/p>\n<p>So what are the main causes of super breaches?<\/p>\n<p><span style=\"font-weight: 400; color: #333333;\">44% of incidents involved a malicious or criminal attack, 31% concerned negligent employees, and 25% involved system glitches that include both IT and business process failures.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_Can_I_Prevent_Data_Breaches\"><\/span>How Can I Prevent Data Breaches?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400; color: #333333;\">Security Testing is the best approach to start a strong security program Security Testing helps to diagnose your system from a security perspective and answer these kinds of questions:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400; color: #333333;\">Am I protected from the most critical security flaws?<br \/>\n<\/span><\/li>\n<li><span style=\"font-weight: 400; color: #333333;\">How fast can an attacker obtain confidential information from my system?<br \/>\n<\/span><\/li>\n<li><span style=\"font-weight: 400; color: #333333;\">Does my system meet security standards?<br \/>\n<\/span><\/li>\n<li><span style=\"font-weight: 400; color: #333333;\">How can I improve the security of my application?<br \/>\n<\/span><\/li>\n<\/ul>\n<p class=\"p3\"><span class=\"s1\"><span style=\"color: #333333;\">Check out what Amit Yoran has to say on this topic from his Keynote at the RSA Conference <a href=\"http:\/\/www.rsaconference.com\/media\/escaping-securitys-dark-ages\">here<\/a>.<\/span><\/span><\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Recommended_for_You\"><\/span>Recommended for You<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"http:\/\/abstracta.us\/blog\/software-testing\/the-software-testing-wheel\/\">The Software Testing Wheel<\/a><br \/>\n<a href=\"http:\/\/abstracta.us\/blog\/tools\/ultimate-list-100-software-testing-quotes\/\">The Ultimate List of 100 Software Testing Quotes<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No need to be a visionary to see that 2015 will be the &#8216;Year of the Super Mega Breach&#8217; &#8220;2014 was yet another reminder that we are losing this contest.\u201d\u00a0Those were the words used by the RSA President Amit Yoran in his opening keynote at&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.0.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Year of the Super Mega Breach | Abstracta<\/title>\n<meta name=\"description\" content=\"You don\u2019t have to be much of a visionary to see that 2015 will become the &quot;Year of the Super Mega Breach.&quot; Read on to find out why we think so!\" \/>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abstracta.us\/blog\/software-testing\/2015-year-super-mega-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Year of the Super Mega Breach | Abstracta\" \/>\n<meta property=\"og:description\" content=\"You don\u2019t have to be much of a visionary to see that 2015 will become the &quot;Year of the Super Mega Breach.&quot; Read on to find out why we think so!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abstracta.us\/blog\/software-testing\/2015-year-super-mega-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog about AI-powered quality engineering for teams building complex software | Abstracta\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AbstractaQA\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-05-01T04:29:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-05T21:21:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abstracta.us\/wp-content\/uploads\/2016\/07\/super_mega_breach-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"420\" \/>\n\t<meta property=\"og:image:height\" content=\"236\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AbstractaUS\" \/>\n<meta name=\"twitter:site\" content=\"@AbstractaUS\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/abstracta.us\/blog\/#website\",\"url\":\"https:\/\/abstracta.us\/blog\/\",\"name\":\"Blog about AI-powered quality engineering for teams building complex software | Abstracta\",\"description\":\"AI-powered quality engineering\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/abstracta.us\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/abstracta.us\/blog\/software-testing\/2015-year-super-mega-breach\/#webpage\",\"url\":\"https:\/\/abstracta.us\/blog\/software-testing\/2015-year-super-mega-breach\/\",\"name\":\"The Year of the Super Mega Breach | Abstracta\",\"isPartOf\":{\"@id\":\"https:\/\/abstracta.us\/blog\/#website\"},\"datePublished\":\"2015-05-01T04:29:17+00:00\",\"dateModified\":\"2025-05-05T21:21:45+00:00\",\"author\":{\"@id\":\"https:\/\/abstracta.us\/blog\/#\/schema\/person\/78cd0dcae50ce820b25e86d3330e9762\"},\"description\":\"You don\\u2019t have to be much of a visionary to see that 2015 will become the \\\"Year of the Super Mega Breach.\\\" Read on to find out why we think so!\",\"breadcrumb\":{\"@id\":\"https:\/\/abstracta.us\/blog\/software-testing\/2015-year-super-mega-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/abstracta.us\/blog\/software-testing\/2015-year-super-mega-breach\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/abstracta.us\/blog\/software-testing\/2015-year-super-mega-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/abstracta.us\/blog\/\",\"url\":\"https:\/\/abstracta.us\/blog\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/abstracta.us\/blog\/software-testing\/\",\"url\":\"https:\/\/abstracta.us\/blog\/software-testing\/\",\"name\":\"Software Testing\"}},{\"@type\":\"ListItem\",\"position\":3,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/abstracta.us\/blog\/software-testing\/2015-year-super-mega-breach\/\",\"url\":\"https:\/\/abstracta.us\/blog\/software-testing\/2015-year-super-mega-breach\/\",\"name\":\"2015: The Year of the Super Mega Breach\"}}]},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/abstracta.us\/blog\/#\/schema\/person\/78cd0dcae50ce820b25e86d3330e9762\",\"name\":\"Sof\\u00eda Palamarchuk, Co-CEO at Abstracta\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/abstracta.us\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/222e8b1136482564fe25acc4de2b9b7a?s=96&d=blank&r=g\",\"caption\":\"Sof\\u00eda Palamarchuk, Co-CEO at Abstracta\"},\"description\":\"Co-Chief Executive Officer at Abstracta\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/abstracta.us\/blog\/wp-json\/wp\/v2\/posts\/1602"}],"collection":[{"href":"https:\/\/abstracta.us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abstracta.us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abstracta.us\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/abstracta.us\/blog\/wp-json\/wp\/v2\/comments?post=1602"}],"version-history":[{"count":15,"href":"https:\/\/abstracta.us\/blog\/wp-json\/wp\/v2\/posts\/1602\/revisions"}],"predecessor-version":[{"id":11992,"href":"https:\/\/abstracta.us\/blog\/wp-json\/wp\/v2\/posts\/1602\/revisions\/11992"}],"wp:attachment":[{"href":"https:\/\/abstracta.us\/blog\/wp-json\/wp\/v2\/media?parent=1602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abstracta.us\/blog\/wp-json\/wp\/v2\/categories?post=1602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abstracta.us\/blog\/wp-json\/wp\/v2\/tags?post=1602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}