SlideShare a Scribd company logo
1 of 18
15 Most Outrageous Data Loss Incidents of all Time
15. British Home Office loses data on all English & Wales prisoners Data on 84,000 prisonerswas lost British Home Officer ‘misplaced’ a thumb drive Employee thought it was a good idea to download all England & Wales prisoners’ data from secure servers to a thumb drive! This was ‘okayed’ as long as this person didn’t lose it…
14. Ma.gnolia Meltdown Ma.gnolia went down in January 2009  Data was lost forever in the cloud Database failed No backup Noeffectiverecovery solution Users turned to Delicious Data corruption and loss can be redeemed but faith in cloud servicesis irreparable
13. Daily Mail loses employee data Daily Mail was a company that pointed out fallacies of government when it lost data, slipped up, or jeopardized security.  Daily Mail met some karma in 2008 when one of their laptops was stolen Contained personal information on thousands of the organization’s staff – including bank account numbers
12. Department of Veteran Affairs Stolen Laptop Employee took a laptop home and it ‘mysteriously’ disappeared  Data & info on 27 million veterans and GI’s were on laptop 2 months later and 4 miles away, the laptop was being sold Hard drive appeared to not have been touched Sheer luck that no one accessed the data
11. British Royal Navy data stolen Lost information on everyone who applied to join the armed forces for past ten years Royal Navy Officer left laptop in his car – it was soon stolen Lesson learned: lock your car door (or better yet, don’t leave an unattended laptop in your car!)
10. Microsoft Loses Sidekick user data Microsoft acquired T-Mobile’s Sidekick phone Every user’s data was lost promptly after the acquisition Loss was result of server failure at either Microsoft or Danger, former owner of Sidekick Data was eventually recovered for most users
9. Virginia loses prescription drug records Man hacked into Virginia State Government’s Prescription Monitoring Program  Downloaded 8.3 million health records  He then issued random statement “I don’t know what all this [expletive] is worth or who would pay for it, but I’m bettin’ someone will.” The Government did pay, unclear if hacker was ever identified
8. Health Net Insurance Loses Data on 1.5 Million Customers Portable hard drive was lost 1.5 million patients’ data was lost Attorney General promised an investigation Lesson learned: that much information should NOT be portable
7. VeriSign: Not as secure as you thought VeriSign is a security confirmation company for online websites to reassure customers that their data is safe when making a purchase Data loss occurred when laptop was lost  Contained private information on all Verisign employees including SSN’s, telephone numbers, salaries, etc.
6. Courier Service Loses Data on 25 Million People Government department copied info on 25 million people onto a pair of CDs sent them by courier from HM Revenue and Customs to the National Audit Office Discs never showed up Even worse, this isn’t the first time this has happened to this government agency!
5. Los Alamos Computers Go Missing The Los Alamos nuclear weapons facility deals with highly sensitive data Did not take special precautions to protect it Laptops go missing periodically As of 2008, 80 laptops had gone missing Lesson learned: Tighten security if this is a recurring problem!
4. Bank of America loses data on 1.2 million government employees BoA lost a backup tape containing personal data from 1.2 million government employees If BoA is responsible for securing billions of dollars, how can they lose a backup tape? One employee whose data was compromised: Senator Patrick Leahy (D-VT)
3. CardSystems Gets Hacked CardSystem manages credit and debit cards Hackers hacked into CardSystems, compromising 40 million people’s information Security breach occurred at a third-party processor of payment card transactions  100,000 Visa accounts and 30,000 other card brand accounts were hacked Culprit: CardSystems failed to secure their network although certified in 2004
2. National Archive and Records Loses 76 million social security numbers NARA, which keeps records for U.S. military, sent a broken hard drive for repair They failed to erase the information of 76 million military individuals as well as Secret Service and White House operations procedures Single largest release of personal information by the government ever No breach of data occurred but incident itself is significant
1. Heartland Payment System Hacking Exposes 130 million Albert Gonzalez and his cronies hacked Heartland Payment Systems, 6th largest credit card processor in the country Through an SQL injection, they managed to plant scripts that siphoned credit card and personal data of 130 million users Largest data breach of 2009, and possibly of all time
Lessons Learned Companies are not taking data security seriously Double think where you store data Set data security policies within your organization Be careful where you send your data and how it is handled Never leave sensitive data out in the open
Protect Your Online Data If banks, government agencies, and credit card companies can’t secure your data, who can you trust with your data? Only a redundant backup will ensure your data will never be lost Protect your data with a Backupify free or premium social media backup account

More Related Content

Viewers also liked

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 
5 Reasons to Backup Twitter
5 Reasons to Backup Twitter5 Reasons to Backup Twitter
5 Reasons to Backup Twitter
Datto
 
Anorexia nerviosa
Anorexia nerviosaAnorexia nerviosa
Anorexia nerviosa
fresia016
 
Influence of cochlear implantation on peripheral vestibular receptor
Influence of cochlear implantation on peripheral vestibular receptorInfluence of cochlear implantation on peripheral vestibular receptor
Influence of cochlear implantation on peripheral vestibular receptor
Karl Daniel, M.D.
 

Viewers also liked (20)

Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
CHIOMA
CHIOMACHIOMA
CHIOMA
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
The 2017 data center: Clouds, containers and IoT data
The 2017 data center: Clouds, containers and IoT dataThe 2017 data center: Clouds, containers and IoT data
The 2017 data center: Clouds, containers and IoT data
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
The Outlook for Data 2017: A Snapshot Into the Evolving Role of Audience Insight
The Outlook for Data 2017: A Snapshot Into the Evolving Role of Audience InsightThe Outlook for Data 2017: A Snapshot Into the Evolving Role of Audience Insight
The Outlook for Data 2017: A Snapshot Into the Evolving Role of Audience Insight
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
5 Reasons to Backup Twitter
5 Reasons to Backup Twitter5 Reasons to Backup Twitter
5 Reasons to Backup Twitter
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Horse trail2
Horse trail2Horse trail2
Horse trail2
 
간지Ppt
간지Ppt간지Ppt
간지Ppt
 
Autorretratos
AutorretratosAutorretratos
Autorretratos
 
Racce presentation
Racce presentationRacce presentation
Racce presentation
 
Anorexia nerviosa
Anorexia nerviosaAnorexia nerviosa
Anorexia nerviosa
 
Influence of cochlear implantation on peripheral vestibular receptor
Influence of cochlear implantation on peripheral vestibular receptorInfluence of cochlear implantation on peripheral vestibular receptor
Influence of cochlear implantation on peripheral vestibular receptor
 

Similar to 15 Most Outrageous Data Loss Incidents

Data Theft Restrospective
Data Theft RestrospectiveData Theft Restrospective
Data Theft Restrospective
olambel
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxThis assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
christalgrieg
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
Donna Koger
 

Similar to 15 Most Outrageous Data Loss Incidents (20)

Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
Data Theft Restrospective
Data Theft RestrospectiveData Theft Restrospective
Data Theft Restrospective
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Report
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 
NIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government ContractorsNIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government Contractors
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxThis assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
 
INT 1010 07-4.pdf
INT 1010 07-4.pdfINT 1010 07-4.pdf
INT 1010 07-4.pdf
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
 
The State of Identity Theft in 2013
The State of Identity Theft in 2013The State of Identity Theft in 2013
The State of Identity Theft in 2013
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 

More from Datto

CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
Datto
 

More from Datto (20)

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. Public
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security Success
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS Backup
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 Presentation
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild West
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

15 Most Outrageous Data Loss Incidents

  • 1. 15 Most Outrageous Data Loss Incidents of all Time
  • 2. 15. British Home Office loses data on all English & Wales prisoners Data on 84,000 prisonerswas lost British Home Officer ‘misplaced’ a thumb drive Employee thought it was a good idea to download all England & Wales prisoners’ data from secure servers to a thumb drive! This was ‘okayed’ as long as this person didn’t lose it…
  • 3. 14. Ma.gnolia Meltdown Ma.gnolia went down in January 2009 Data was lost forever in the cloud Database failed No backup Noeffectiverecovery solution Users turned to Delicious Data corruption and loss can be redeemed but faith in cloud servicesis irreparable
  • 4. 13. Daily Mail loses employee data Daily Mail was a company that pointed out fallacies of government when it lost data, slipped up, or jeopardized security. Daily Mail met some karma in 2008 when one of their laptops was stolen Contained personal information on thousands of the organization’s staff – including bank account numbers
  • 5. 12. Department of Veteran Affairs Stolen Laptop Employee took a laptop home and it ‘mysteriously’ disappeared Data & info on 27 million veterans and GI’s were on laptop 2 months later and 4 miles away, the laptop was being sold Hard drive appeared to not have been touched Sheer luck that no one accessed the data
  • 6. 11. British Royal Navy data stolen Lost information on everyone who applied to join the armed forces for past ten years Royal Navy Officer left laptop in his car – it was soon stolen Lesson learned: lock your car door (or better yet, don’t leave an unattended laptop in your car!)
  • 7. 10. Microsoft Loses Sidekick user data Microsoft acquired T-Mobile’s Sidekick phone Every user’s data was lost promptly after the acquisition Loss was result of server failure at either Microsoft or Danger, former owner of Sidekick Data was eventually recovered for most users
  • 8. 9. Virginia loses prescription drug records Man hacked into Virginia State Government’s Prescription Monitoring Program Downloaded 8.3 million health records He then issued random statement “I don’t know what all this [expletive] is worth or who would pay for it, but I’m bettin’ someone will.” The Government did pay, unclear if hacker was ever identified
  • 9. 8. Health Net Insurance Loses Data on 1.5 Million Customers Portable hard drive was lost 1.5 million patients’ data was lost Attorney General promised an investigation Lesson learned: that much information should NOT be portable
  • 10. 7. VeriSign: Not as secure as you thought VeriSign is a security confirmation company for online websites to reassure customers that their data is safe when making a purchase Data loss occurred when laptop was lost Contained private information on all Verisign employees including SSN’s, telephone numbers, salaries, etc.
  • 11. 6. Courier Service Loses Data on 25 Million People Government department copied info on 25 million people onto a pair of CDs sent them by courier from HM Revenue and Customs to the National Audit Office Discs never showed up Even worse, this isn’t the first time this has happened to this government agency!
  • 12. 5. Los Alamos Computers Go Missing The Los Alamos nuclear weapons facility deals with highly sensitive data Did not take special precautions to protect it Laptops go missing periodically As of 2008, 80 laptops had gone missing Lesson learned: Tighten security if this is a recurring problem!
  • 13. 4. Bank of America loses data on 1.2 million government employees BoA lost a backup tape containing personal data from 1.2 million government employees If BoA is responsible for securing billions of dollars, how can they lose a backup tape? One employee whose data was compromised: Senator Patrick Leahy (D-VT)
  • 14. 3. CardSystems Gets Hacked CardSystem manages credit and debit cards Hackers hacked into CardSystems, compromising 40 million people’s information Security breach occurred at a third-party processor of payment card transactions 100,000 Visa accounts and 30,000 other card brand accounts were hacked Culprit: CardSystems failed to secure their network although certified in 2004
  • 15. 2. National Archive and Records Loses 76 million social security numbers NARA, which keeps records for U.S. military, sent a broken hard drive for repair They failed to erase the information of 76 million military individuals as well as Secret Service and White House operations procedures Single largest release of personal information by the government ever No breach of data occurred but incident itself is significant
  • 16. 1. Heartland Payment System Hacking Exposes 130 million Albert Gonzalez and his cronies hacked Heartland Payment Systems, 6th largest credit card processor in the country Through an SQL injection, they managed to plant scripts that siphoned credit card and personal data of 130 million users Largest data breach of 2009, and possibly of all time
  • 17. Lessons Learned Companies are not taking data security seriously Double think where you store data Set data security policies within your organization Be careful where you send your data and how it is handled Never leave sensitive data out in the open
  • 18. Protect Your Online Data If banks, government agencies, and credit card companies can’t secure your data, who can you trust with your data? Only a redundant backup will ensure your data will never be lost Protect your data with a Backupify free or premium social media backup account