{"id":2540,"date":"2017-07-26T08:00:50","date_gmt":"2017-07-26T08:00:50","guid":{"rendered":"https:\/\/tsisupport.com\/?p=2540"},"modified":"2021-08-09T05:55:09","modified_gmt":"2021-08-09T09:55:09","slug":"data-breaches-29-percent-last-year","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=2540","title":{"rendered":"Network Security Threats: Data Breaches Up 29 Percent Over Last Year"},"content":{"rendered":"<p>Data breaches are running 29% above last year, according to a report released by the Identity Theft Resource Center and Cyberscout.\u00a0 Hacking was the leading cause of data breaches nationwide, more than 790 so far this year.<\/p>\n<p>More than 12 million records have been exposed, although two-thirds of data breach notifications or public notices did not report the number of records compromised. \u201cOnly 33 percent of data breaches reported this year have made the number of records exposed publicly available,\u201d said Karen A. Barney, director of research and publications at Identity Theft Resource Center, an increase of 13 percent over 2016 mid-year numbers.<\/p>\n<p>The resource center tracks breaches in the categories of financial, health care and medical, government and military, education and business.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8581\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Infographic-3.fw_.png\" alt=\"\" width=\"500\" height=\"515\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Infographic-3.fw_.png 500w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Infographic-3.fw_-291x300.png 291w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #800000;\">Source: <a href=\"http:\/\/www.idtheftcenter.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Identity Theft Resource Center<\/a><\/span><\/p>\n<p>More than half of all beaches this year have occurred in business, followed by health care and medical. Breaches in the medical and health-care industry are most likely to include the number of records involved. More than 80 percent of breaches in 2017 that were reported to Health &amp; Human Services included the number of records. 28 percent of data breaches\u00a0<a href=\"https:\/\/blog.knowbe4.com\/bid\/252486\/28-percent-of-data-breaches-lead-to-fraud\" target=\"_blank\" rel=\"noopener noreferrer\">lead to fraud<\/a>.<\/p>\n<p><span style=\"color: #800000;\"><strong>Learn More<\/strong><\/span><\/p>\n<p>You can read more about the report at the <a href=\"http:\/\/www.sandiegouniontribune.com\/news\/data-watch\/sd-me-g-data-breaches-20170619-story.html\" target=\"_blank\" rel=\"noopener noreferrer\">San Diego Union Tribune<\/a>. To learn how we can help your organization protect against potential data breaches, <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">Contact Us<\/a> today!<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Data breaches are running 29% above last year, according to a report released by the Identity Theft Resource Center and Cyberscout.\u00a0 Hacking was the leading cause of data breaches nationwide, more than 790 so far this year. More than 12 million records have been exposed, although two-thirds of data breach notifications or public notices did&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8580,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[347,348,211,349,350,129,351,21],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network Security Threats | Cyber Security Threats 2017 | TSI<\/title>\n<meta name=\"description\" content=\"Find out more about the latest network security threats plaguing businesses in 2017. Learn how to protect your data by understanding recent attacks.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Security Threats | Cyber Security Threats 2017 | TSI\" \/>\n<meta property=\"og:description\" content=\"Find out more about the latest network security threats plaguing businesses in 2017. Learn how to protect your data by understanding recent attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=2540\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-26T08:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-09T09:55:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Header-2-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2540\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2540\",\"name\":\"Network Security Threats | Cyber Security Threats 2017 | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2540#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2540#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Header-2-1140x380-1.png\",\"datePublished\":\"2017-07-26T08:00:50+00:00\",\"dateModified\":\"2021-08-09T09:55:09+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Find out more about the latest network security threats plaguing businesses in 2017. Learn how to protect your data by understanding recent attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2540#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=2540\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2540#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Header-2-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Header-2-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2540#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Security Threats: Data Breaches Up 29 Percent Over Last Year\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Security Threats | Cyber Security Threats 2017 | TSI","description":"Find out more about the latest network security threats plaguing businesses in 2017. Learn how to protect your data by understanding recent attacks.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Network Security Threats | Cyber Security Threats 2017 | TSI","og_description":"Find out more about the latest network security threats plaguing businesses in 2017. Learn how to protect your data by understanding recent attacks.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=2540","og_site_name":"TSI Support","article_published_time":"2017-07-26T08:00:50+00:00","article_modified_time":"2021-08-09T09:55:09+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Header-2-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2540","url":"https:\/\/tsisupport.com\/tsistaging\/?p=2540","name":"Network Security Threats | Cyber Security Threats 2017 | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2540#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2540#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Header-2-1140x380-1.png","datePublished":"2017-07-26T08:00:50+00:00","dateModified":"2021-08-09T09:55:09+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Find out more about the latest network security threats plaguing businesses in 2017. Learn how to protect your data by understanding recent attacks.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2540#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=2540"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2540#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Header-2-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Header-2-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2540#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Network Security Threats: Data Breaches Up 29 Percent Over Last Year"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2540"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2540"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2540\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8580"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}