What happened after the world's biggest data breach occured?

breach 1.PNGRecently there was a great infographic that I got from CISSP newsletter on the World's Biggest Data Breaches. This infographic  showed that the world's largest data breaches occurred where over 30,000 records were stolen. This is an interactive inforgraphic, and while I was playing with various filters I hapened  to see a pattern. I went to our internal CRM database and I surprised to see that more than half of all these large companies that were breached, reached out to us right after the breach occured.

 

In many cases, we were the first responders to these companies. Most CIOs, CSOs, and leaders in the IT team know about HP's security and IT management tools and we have 44,000 customers that we have helped o over the last 25+ years.

 

Typically when companies get breached, they call us out for help. We have a team that can fly to any part of the world from China to Washington, D.C with our security software and appliances, and most companies have started seeing the sources and data transfers within the first hour. 

 

breached.PNG

 

If you look at this list of companies, approximately 50 percent of them have called us after they were breached. The picture on the right shows all the data breaches due to hacking and cyber-threats that could have been prevented through simple controls and inexpensive tools.

 

HP Enterprise security group offers best-of-breed technologies that are all in leaders quadrant of Gartner's magic quadrant. We can help with:

  •  Information security
  • Application security
  • Network security
  • Log management
  • Identity management

This all leads to security with ease.  

 So, now you have a friend when you have a security breach... Feel free to reach us here.

 

Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Comments
Google Tools(anon) | ‎02-22-2014 01:03 AM
I feel that you can do with
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation