H1 2014 Security Breaches

With the first half of the year coming to an end, it's important to reflect on some of the security breaches that have been reported so far in 2014. Fortunately, none were on the scale of last year’s breach at Target, but the number of incidents - and the variety of industries that have been attacked - is concerning.

Here’s a quick summary of some of the activities that have been reported in the first six months of the year.

  • In April, AOL posted a note on its website announcing it was “investigating a security incident that involved unauthorized access to its network and systems.”
  • After an early 2014 cyber attack that compromised consumer data, eBay required 145 million customers to change their passwords.
  • Earlier this month, P.F. Chang’s began investigating a breach involving customer credit and debit card data that were reportedly stolen from a number of their nationwide restaurant locations.
  • In February, eight computers containing unencrypted personal information on 342,000 patients were stolen from Sutherland Healthcare Solutions, a company that handles medical billing and collections for Los Angeles County.
  • On the higher education front, the University of Maryland, Indiana University and Iowa State University have all had to respond to security breaches.
  • In a breach that was discovered on March 13, enterprise software and information solutions provider Deltek notified 80,000 customers that their personal information, including credit card data, had been exposed.

Internationally, there have also been a number of security breaches in 2014 including:

  • KT Corp., a South Korean telecommunications provider, claims a data breach compromised 12 million of its customer records.
  • As the result of an attack that took place in January, French telecom operator, Orange, indicated that data for 800,000 of its customers was exposed.
  • According to Germany’s Federal Office for Information Security, up to 16 million individuals may have had their personal information compromised.

If these examples are any indication, in the second half of the year, we'll certainly see more attacks. Is your company prepared to stay out of the headlines? You can never be too cautious.

Related Posts