July 27, 2017 By Larry Loeb 2 min read

In the first half of 2017, over 6 billion records were exposed through 2,227 publicly disclosed data breaches, according to a July report from Risk Based Security. The number of records that were exposed in the first half of this year is already higher than the previous all-time high at the end of 2016, and the top 10 breaches exposed 5.6 billion of the 6 billion total compromised records.

Affected Sectors

The business sector accounted for 56.5 percent of the reported breaches, the report found. It was followed by unknown (17 percent), the government (9.1 percent), the medical sector (9 percent) and education (8.4 percent).

These numbers differ from the total records exposed by data breaches. Here, the business sector accounted for 93 percent, followed by government and unknown, which were found to show approximately 3 percent. Medical and education sectors combined were found to account for less than 1 percent of the total records exposed year to date.

By country, SecurityWeek reported that the U.S. had the largest number of data breaches at 1,367. It was followed by the U.K. at 104, Canada at 59, India at 52 and Australia at 34. However, the publication also noted that China accounted for over 48 percent of the records exposed, or 3.8 billion records, even though only 22 known breaches happened within the country.

Inadvertent online disclosures were the highest cause of records compromised so far this year, accounting for 68 percent of records exposed. Interestingly, these compromises only accounted for about 7 percent of the incidents reported so far in 2017, according to the Risk Based Security report.

Tax Data Breaches Threaten Social Security

Attacks on tax data trended upward in the first half of the year. Exposure of confidential W-2 information increased by 25 percent since 2016, with accounting firms and payroll service providers most vulnerable. Another high-profile target in this sector was the Job Link Alliance, which is a workforce development specialist that serves state employment agencies across the U.S. That compromise involved approximately 5.5 million job seekers’ names, addresses, dates of birth and Social Security numbers.

The report also found that incidents impacting Social Security numbers increased from 17.6 percent in 2016 to 26.1 percent in 2017. When coupled with personal information such as name, date of birth or physical address, that information could be particularly dangerous in the hands of cybercriminals.

Overall, Risk Based Security’s report showed how breaches are changing in focus over time, yet they remain as serious as ever. Security professionals should stay informed of annual changes and adjust defenses accordingly.

More from

Evolving red teaming for AI environments

2 min read - As AI becomes more ingrained in businesses and daily life, the importance of security grows more paramount. In fact, according to the IBM Institute for Business Value, 96% of executives say adopting generative AI (GenAI) makes a security breach likely in their organization in the next three years. Whether it’s a model performing unintended actions, generating misleading or harmful responses or revealing sensitive information, in the AI era security can no longer be an afterthought to innovation.AI red teaming is emerging…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today