Data Breach Impacts and Top Prevention Strategies
A look at Forbes Advisor’s comprehensive list of corporate data breaches in the U.S. from 2017-2021
A Look at Forbes Advisor’s Data Findings
Forbes Advisor sifted through data findings collected on June 6, 2022, from the Internet Crime Complaint Center to determine a comprehensive account of corporate data breaches occurring from 2017 to 2021. Every internet complaint made between those five years for all 50 states were combined and further analyzed. After extracting the corporate data breach information from the report, Forbes Advisor grouped the findings together and ranked them from the highest to lowest in each state. In addition, the average financial losses for each data breach were computed and ranked from most expensive to lease expensive.Here are the top five ranking states in terms of security data breaches and financial losses, according to Forbes Advisor:
1. California, with a total corporate victim count of 1,807 breaches, costing the state over $80 million within the past five years
2. Florida, with 956 businesses falling victim to data breaches with nearly $58 million in losses
3. Texas, with a total of 1,587 businesses experiencing data breaches. Even though Texas had more businesses affected by breaches, it ranks lower than Florida with a lesser total of nearly $50 million in business losses.
4. New York, with 705 corporate data breaches and over $38 million in business losses between 2017 and 2021
5. Pennsylvania, with close to $18 million in financial losses and a corporate victim count of 380
Data Breach Impacts and Prevention Strategies
In the past five years, data breaches have affected 11,343 businesses in America alone, with losses totaling at $431,854,725. It is vital for companies to ensure their data is sufficiently protected.Rob Watts, a business editor at Forbes Advisor provides insight on keeping your company’s data safe and secure. He mentions human error as a major cause of data breaches, so it is critical that employees are well-informed and instinctive when it comes to detecting and deterring data threats. Watts also points out that reliable data protection comes from a strategic combination of the following three initiatives:
- The right software tools
- Employee knowledge on cyberthreats
- Established best practices in using company technology
Tagged as:
z/OS / AIX / IBM i / Linux on IBM Z / Linux on POWER / Windows / z/VM / z/VSE / Article / Security / Systems management / Data security
About the author
TechChannel is an independent communications channel designed to educate and inform enterprise and SMB IT professionals.
See more by TechChannel