SlideShare a Scribd company logo
45%of all incidents
Popular hacking approaches include:
Payment card skimmers were used in 94%
of ATM-related data breaches+
Stolen passwords were used in 31% of POS
intrusions+ where a data breach occurred
POS environments were affected in 22%^
of
all security incidents
The average selling prices** for stolen PCI
payment card numbers with CCV2 details are:
Malware Under the Microscope
Data: A Valuable Commodity
Hacking
* IBM X-Force Research, 2016 Cyber Security Intelligence Index, April 2016
+ Verizon 2016 Data Breach Investigations Report, May 2016
^ 2016 Trustwave Global Security Report
** The Hidden Data Economy, McAfee Labs, Fall 2015
There were 64% more security incidents*
in the last year and the most frequently
occurring types were:
Unauthorized
access
The POS malware families
Trustwave^ encountered
most frequently this
year were:
Types of malware^
noted included:
29%of all incidents
Malicious
code
16%of all incidents
Sustained
probe/scan
Hacking
Use of stolen
credentials
Use of
backdoor or C2
Brute force
Malware Social Error
When it comes to data breaches, Verizon+ notes
that the actors are predominantly external.
Their recent report found the most common
types of breaches are:
RawPOS
Project Hook
Variants
GamaPos
Chery
Picker
Punkey
PoSeidon
- Memory Scraper
- RATs, Backdoors and
other Remote Access
- Downloader/Dropper
- Hacking Tool
- Config File/Dump
File/Data
- Keylogger
- Persistence/
Installer/Cleaner
- Adware/Potentially
Unwanted Programs
- Web Shell
- Rootkit
- Ransomware/Worm
/Exploit
- Bitcoin Miner
Remote Access
Malicious Insider
Misconfiguration
Other
59%
28%
8%
8%
Payment card data
60%
Other
8%
Personally
identifiable
information
4%
Financial credentials
7%
Destroy or damage data
10%
Proprietary information
11%
Intrusions affecting
POS environments^
involved:
$25 - $30
$21 - $25
$20 - $25
$20 - $25
$5 - $8
European Union
Australia
United Kingdom
Canada
United States
Primary types
of data targeted^:
1234 1234 1234 ****
Data breaches continue to hit the headlines globally. This infographic looks
at how data breaches have evolved over the last year and the threat they
pose to organizations globally.
DATA BREACHES STILL
MAJOR THREAT
One Connection - A World of Opportunities

More Related Content

Viewers also liked

TNS Data Breach Facts Infographic - French
TNS Data Breach Facts Infographic - FrenchTNS Data Breach Facts Infographic - French
TNS Data Breach Facts Infographic - FrenchTNSIMarketing
 
Roaming Financial Clearing Made Easier
Roaming Financial Clearing Made EasierRoaming Financial Clearing Made Easier
Roaming Financial Clearing Made EasierTNSIMarketing
 
TNS Data Breach Insider Risk Infographic - French
TNS Data Breach Insider Risk Infographic - FrenchTNS Data Breach Insider Risk Infographic - French
TNS Data Breach Insider Risk Infographic - FrenchTNSIMarketing
 
TNS Connects with Telecom Industry
TNS Connects with Telecom IndustryTNS Connects with Telecom Industry
TNS Connects with Telecom IndustryTNSIMarketing
 
TNS Pioneer Cellular Case Study December 2016
TNS Pioneer Cellular Case Study December 2016TNS Pioneer Cellular Case Study December 2016
TNS Pioneer Cellular Case Study December 2016TNSIMarketing
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Viewers also liked (6)

TNS Data Breach Facts Infographic - French
TNS Data Breach Facts Infographic - FrenchTNS Data Breach Facts Infographic - French
TNS Data Breach Facts Infographic - French
 
Roaming Financial Clearing Made Easier
Roaming Financial Clearing Made EasierRoaming Financial Clearing Made Easier
Roaming Financial Clearing Made Easier
 
TNS Data Breach Insider Risk Infographic - French
TNS Data Breach Insider Risk Infographic - FrenchTNS Data Breach Insider Risk Infographic - French
TNS Data Breach Insider Risk Infographic - French
 
TNS Connects with Telecom Industry
TNS Connects with Telecom IndustryTNS Connects with Telecom Industry
TNS Connects with Telecom Industry
 
TNS Pioneer Cellular Case Study December 2016
TNS Pioneer Cellular Case Study December 2016TNS Pioneer Cellular Case Study December 2016
TNS Pioneer Cellular Case Study December 2016
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar to Data Breaches Still Major Threat - Infographic from TNS August 2016

Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentInternet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentSSLRenewals
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat FireEye, Inc.
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
TNS Infographic - Data Breach Targets Revealed
TNS Infographic - Data Breach Targets RevealedTNS Infographic - Data Breach Targets Revealed
TNS Infographic - Data Breach Targets RevealedTNSIMarketing
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecSoluciona Facil
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22CheapSSLsecurity
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
PhishThreat.pptx
PhishThreat.pptxPhishThreat.pptx
PhishThreat.pptxJorgeRosa46
 
Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Valerie Lanzone
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence ReportDImension Data
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecurityIRJET Journal
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017Dryden Geary
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 

Similar to Data Breaches Still Major Threat - Infographic from TNS August 2016 (20)

Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentInternet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) Government
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
TNS Infographic - Data Breach Targets Revealed
TNS Infographic - Data Breach Targets RevealedTNS Infographic - Data Breach Targets Revealed
TNS Infographic - Data Breach Targets Revealed
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
Trick or threat
Trick or threatTrick or threat
Trick or threat
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
PhishThreat.pptx
PhishThreat.pptxPhishThreat.pptx
PhishThreat.pptx
 
Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform EngineeringJemma Hussein Allen
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Data Breaches Still Major Threat - Infographic from TNS August 2016

  • 1. 45%of all incidents Popular hacking approaches include: Payment card skimmers were used in 94% of ATM-related data breaches+ Stolen passwords were used in 31% of POS intrusions+ where a data breach occurred POS environments were affected in 22%^ of all security incidents The average selling prices** for stolen PCI payment card numbers with CCV2 details are: Malware Under the Microscope Data: A Valuable Commodity Hacking * IBM X-Force Research, 2016 Cyber Security Intelligence Index, April 2016 + Verizon 2016 Data Breach Investigations Report, May 2016 ^ 2016 Trustwave Global Security Report ** The Hidden Data Economy, McAfee Labs, Fall 2015 There were 64% more security incidents* in the last year and the most frequently occurring types were: Unauthorized access The POS malware families Trustwave^ encountered most frequently this year were: Types of malware^ noted included: 29%of all incidents Malicious code 16%of all incidents Sustained probe/scan Hacking Use of stolen credentials Use of backdoor or C2 Brute force Malware Social Error When it comes to data breaches, Verizon+ notes that the actors are predominantly external. Their recent report found the most common types of breaches are: RawPOS Project Hook Variants GamaPos Chery Picker Punkey PoSeidon - Memory Scraper - RATs, Backdoors and other Remote Access - Downloader/Dropper - Hacking Tool - Config File/Dump File/Data - Keylogger - Persistence/ Installer/Cleaner - Adware/Potentially Unwanted Programs - Web Shell - Rootkit - Ransomware/Worm /Exploit - Bitcoin Miner Remote Access Malicious Insider Misconfiguration Other 59% 28% 8% 8% Payment card data 60% Other 8% Personally identifiable information 4% Financial credentials 7% Destroy or damage data 10% Proprietary information 11% Intrusions affecting POS environments^ involved: $25 - $30 $21 - $25 $20 - $25 $20 - $25 $5 - $8 European Union Australia United Kingdom Canada United States Primary types of data targeted^: 1234 1234 1234 **** Data breaches continue to hit the headlines globally. This infographic looks at how data breaches have evolved over the last year and the threat they pose to organizations globally. DATA BREACHES STILL MAJOR THREAT One Connection - A World of Opportunities