The Most Comprehensive Data Protection Solution
Discover, classify, and protect your data from all threats with the only Gartner Magic Quadrant DLP and Forrester Wave EDR Leader.
First and Only Solution to Converge:
- Data Loss Prevention
- Endpoint Detection and Response
- User and Entity Behavior Analytics
DATAINSIDER
Digital Guardian's Blog
Infographic: Is Security Spending Proportional to the Data Breach Problem?
Einstein famously defined insanity as "doing the same thing over and over again and expecting different results." So why do companies continue to follow the same archaic security strategies while data breaches are at an all-time high?
We decided to take a closer look at this issue and did some research to compare data breach trends with security technology spending. What did we find? Companies continue to invest heavily in network and device security while allocating just 1% of their security budgets toward protecting cyber criminals' top target: data. In fact, a recent Impact Report from 451 Research sums this point up nicely:
"… it's better to focus scarce resources on securing the data itself rather than spending ever-higher sums erecting tighter boundaries around it. The logic is sound: despite the billions of dollars spent each year on perimeter and endpoint security, the bad guys keep finding new ways in, and the data breach parade rolls on without a hiccup."
This interactive infographic shows security spending and data breach trends over the past five years - click an orb to launch a whole year's worth of threats and get a breakdown of how companies invested in security as well as the top breaches and threats for that year.
Click to View FullscreenNumber of Data Breaches Per Year
| Year | Number of Data Breaches |
| 2010 | 761 |
| 2011 | 855 |
| 2012 | 621 |
| 2013 | 1367 |
| 2014 | 2122 |
Source: Verizon Data Breach Investigations Report, 2011-2015
Number of Records Exposed by Data Breaches, Per Year
| Year | Number of Records Exposed |
| 2010 | 3.8 million |
| 2011 | 174 million |
| 2012 | 44 million |
| 2013 | 822 million |
| 2014 | 700 million |
Source: Verizon Data Breach Investigations Report, 2011-2015; 2013 total from RBS
Top Threat Actions by Year
| Year | Threat Actions |
| 2010 | Physical Tampering, Spyware, Data-exporting Malware |
| 2011 | Brute Force, Spyware, Use of Stolen Credentials |
| 2012 | Spyware, Backdoor Exploitation, Use of Stolen Credentials |
| 2013 | Use of Stolen Credentials, Data-exporting Malware, Phishing |
| 2014 | Use of Stolen Credentials, RAM-scaping Malware, Spyware |
Source: Verizon Data Breach Investigations Report, 2011-2015
Top 5 Data Breaches by Year, By Records Exposed
| Year | Data Breach and Number of Records Exposed |
| 2010 |
|
| 2011 |
|
| 2012 |
|
| 2013 |
|
| 2014 |
|
Source: Information is Beautiful
Annual Security Technology Spending Breakdown
| Year | Security Spending by Technology Layer |
| 2010 |
|
| 2011 |
|
| 2012 |
|
| 2013 |
|
| 2014 |
|
Sources:
Total Annual Security Spending Figures from Gartner Forecast: Information Security, Worldwide, 2010-2018
By-Layer Security Spending Percentages from Forrester Research, Content Security Predictions: 2011 and Beyond, Content Security: 2012 Budget and Planning Guide, Understand The State Of Network Security: 2012 To 2013, Understand The State Of Data Security And Privacy: 2013 To 2014, Understand The State Of Data Security And Privacy: 2014 To 2015
SUBSCRIBE
Get email updates with the latestfrom the Digital Guardian Blog
Thank you for subscribing!

WHITEPAPERS
Data Protection Vendor Evaluation Toolkit





