Infographic: Is Security Spending Proportional to the Data Breach Problem?
Contact Us | |
Free Demo | |
Chat | |
Einstein famously defined insanity as "doing the same thing over and over again and expecting different results." So why do companies continue to follow the same archaic security strategies while data breaches are at an all-time high?
We decided to take a closer look at this issue and did some research to compare data breach trends with security technology spending. What did we find? Companies continue to invest heavily in network and device security while allocating just 1% of their security budgets toward protecting cyber criminals' top target: data. In fact, a recent Impact Report from 451 Research sums this point up nicely:
"… it's better to focus scarce resources on securing the data itself rather than spending ever-higher sums erecting tighter boundaries around it. The logic is sound: despite the billions of dollars spent each year on perimeter and endpoint security, the bad guys keep finding new ways in, and the data breach parade rolls on without a hiccup."
This interactive infographic shows security spending and data breach trends over the past five years - click an orb to launch a whole year's worth of threats and get a breakdown of how companies invested in security as well as the top breaches and threats for that year.
Click to View FullscreenNumber of Data Breaches Per Year
Year | Number of Data Breaches |
2010 | 761 |
2011 | 855 |
2012 | 621 |
2013 | 1367 |
2014 | 2122 |
Source: Verizon Data Breach Investigations Report, 2011-2015
Number of Records Exposed by Data Breaches, Per Year
Year | Number of Records Exposed |
2010 | 3.8 million |
2011 | 174 million |
2012 | 44 million |
2013 | 822 million |
2014 | 700 million |
Source: Verizon Data Breach Investigations Report, 2011-2015; 2013 total from RBS
Top Threat Actions by Year
Year | Threat Actions |
2010 | Physical Tampering, Spyware, Data-exporting Malware |
2011 | Brute Force, Spyware, Use of Stolen Credentials |
2012 | Spyware, Backdoor Exploitation, Use of Stolen Credentials |
2013 | Use of Stolen Credentials, Data-exporting Malware, Phishing |
2014 | Use of Stolen Credentials, RAM-scaping Malware, Spyware |
Source: Verizon Data Breach Investigations Report, 2011-2015
Top 5 Data Breaches by Year, By Records Exposed
Year | Data Breach and Number of Records Exposed |
2010 |
|
2011 |
|
2012 |
|
2013 |
|
2014 |
|
Source: Information is Beautiful
Annual Security Technology Spending Breakdown
Year | Security Spending by Technology Layer |
2010 |
|
2011 |
|
2012 |
|
2013 |
|
2014 |
|
Sources:
Total Annual Security Spending Figures from Gartner Forecast: Information Security, Worldwide, 2010-2018
By-Layer Security Spending Percentages from Forrester Research, Content Security Predictions: 2011 and Beyond, Content Security: 2012 Budget and Planning Guide, Understand The State Of Network Security: 2012 To 2013, Understand The State Of Data Security And Privacy: 2013 To 2014, Understand The State Of Data Security And Privacy: 2014 To 2015
Recommended Resources
The Definitive Guide to DLP
- The seven trends that have made DLP hot again
- How to determine the right approach for your organization
- Making the business case to executives
The Definitive Guide to Data Classification
- Why Data Classification is Foundational
- How to Classify Your Data
- Selling Data Classification to the Business