Three Quarters of a Billion Records breached
Legacy signals
Legacy popularity: 845 legacy views
Last year, says the security firm Gemalto, over 700 million records were breached. Or, to put it another way, this translates to two million stolen or lost records every day.

2015 Breach Level Report
- 1,673 hacking incidents
- 398 were triggered from the inside of the attacked company: employees and even IT staff who were tricked (social engineering) by hackers into clicking on malicious links or attachments
- Government agencies suffered the greatest data leaks.
- Following that were nation states and healthcare enterprises (remember the big Anthem breach?)
Gemalto also says that the U.S. is the leading target of cyber attacks, with the UK, Canada and Australia following behind in that order. But don't let Australia's fourth place standing fool you. It reports only 42 publically reported incidents, while the U.S. has reportedly had 1,222.
How can you tell your computer has been compromised by an attack?
- Your computer is running slowly; you're not simply being impatient—the device really is moving at a crawl. This is a possible sign the computer is infected.
- Another possible sign of infection: Programs open up without you making them, as though they have a mind of their own.
Protecting Your Computer
- First and foremost, businesses need to rigorously put their employees through training. This includes staged phishing attacks to see if any employees can be tricked into revealing sensitive company information. Training for workers must be ongoing, not just some annual seminar. A company could have the best security software and smartest IT staff, but all it takes is one less-than-mindful employee to let in the Trojan horse.
- If you receive an e-mail with a link or attachment, never rush to open them. Pause. Take a few breaths. Count to 10. No matter what the subject line says, there is always plenty of time to make sure an e-mail is from a legitimate sender before opening any attachments or clicking any links.
- Use firewall and anti-virus software and keep them updated.
- Use a virtual private network to scramble your online activities when you're using public Wi-Fi so that cyber snoopers see only scrambling.
- Use the most recent version of your OS and browser.
- Regularly back up your data.
Article author
About the Author
Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.
Further reading
Further Reading
Article
The Seven Steps to Forgiveness
An Excerpt from The Feeling Soul - A Roadmap to Healing and Living By Mark Linden O’Meara Available at Amazon.com Seven Steps to Forgiveness Much has been written about forgiveness. Everywhere you turn people are saying you have to forgive, yet few people likely understand the process of ...
Related piece
Article
Book Review: Stand Up for Your Life: A Practical Step-by-Step Plan to Build Inner Confidence and Personal Power
Amazon.com Review: \ Oprah life makeover maven Cheryl Richardson wants you to start rocking the boat. Stand Up for Your Life urges readers to stop playing it safe by putting their needs and priorities aside. Her premise: by spending less time listening to others and more time strengthening your ... Amazon.com Revi
Related piece
Website
Cheryl Richardson's Official Site
Access practical tools, challenging ideas, resources, and helpful information that will support you in living a life that honors your soul.
Related piece
Article
Learning the Language of Feelings
Learning the Language of Feelings An excerpt from The Feeling Soul – A Roadmap to Healing and Living Mark Linden O’Meara, Soul Care Publishing ISBN: 0-968045928 Available at Amazon.com Part of self growth and developing self-knowledge involves learning to express the feelings, ideas and ...
Related piece