SlideShare a Scribd company logo
2015
2014
STATISTICS OF
2015 DATA
BREACHES
2015 was a rough year for hotel data security as
numerous major companies reported breaches.
The 2016 “Trustwave global security report” reviewed
data intrusions from around the world in 2015 to locate
trends and identify common weaknesses, sharing the
statistics for corporate data breaches with further
breakdowns by industry.
External detection means the victim
is notified by regulatory bodies, law
enforcement or other third parties.
Source: Trustwave
18%
9%
9%
100%
point of sales corporate/internal network
IT Environments Compromised
Hospitality 75%
25%
45% 55%
Food and
Beverage
e-commerce credit card magnetic strip data
Types of Data Compromised
proprietary data financial credentials
64%
Internal Versus External
Detection of a Breach
Median duration of a data breach until detection (days)
126
External
10
Internal
16815
Median duration between detection and containment (days)
28 External1Internal
Internal detection means victims of
a data breach have the capability to
detect an intrusion on their own or
through a third-party security provider.
Hospitality
Food and
Beverage
illustrations: annamarie hudson
2015
Top method of detection 2014 Regulatory bodies, card brands or merchant banks
Top method of detection 2015 Self-detected

More Related Content

What's hot

ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
Laurent Pacalin
 
IT Trends - Cyber Security
IT Trends - Cyber SecurityIT Trends - Cyber Security
IT Trends - Cyber Security
Datix Consulting
 
AML Penalties Intro Deck
AML Penalties Intro Deck AML Penalties Intro Deck
AML Penalties Intro Deck
ZIGRAM
 
Op tijd klaar voor de naderende gdpr avg privacywet - Janus de Visser
Op tijd klaar voor de naderende gdpr avg privacywet - Janus de VisserOp tijd klaar voor de naderende gdpr avg privacywet - Janus de Visser
Op tijd klaar voor de naderende gdpr avg privacywet - Janus de Visser
Netprofiler
 
AML Penalties Closed Beta 7 June 2021
AML Penalties Closed Beta 7 June 2021AML Penalties Closed Beta 7 June 2021
AML Penalties Closed Beta 7 June 2021
ZIGRAM
 
Affiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Fraud Trends & the Policies Needed in the IndustryAffiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Summit
 
An Introduction to GDPR
An Introduction to GDPRAn Introduction to GDPR
An Introduction to GDPR
Gemma Christie
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
Laurent Pacalin
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
TransUnion
 
Cybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationCybersecurity's Impact on Innovation
Cybersecurity's Impact on Innovation
Silicon Valley Bank
 
2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A
Nick Normile
 
Investing in Cybersecurity, 2020 outlook for Mexico
Investing in Cybersecurity, 2020 outlook for MexicoInvesting in Cybersecurity, 2020 outlook for Mexico
Investing in Cybersecurity, 2020 outlook for Mexico
Whiteboard Venture Partners
 
Fraud infographic - Forrester Report
Fraud infographic - Forrester ReportFraud infographic - Forrester Report
Fraud infographic - Forrester Report
Omer Celep
 
5 startups using machine learning and behavioral biometrics to fight fraud
5 startups using machine learning and behavioral biometrics to fight fraud5 startups using machine learning and behavioral biometrics to fight fraud
5 startups using machine learning and behavioral biometrics to fight fraud
Chee Ming
 
IoT Security RoundTable - March 2018
IoT Security RoundTable - March 2018IoT Security RoundTable - March 2018
IoT Security RoundTable - March 2018
Whiteboard Venture Partners
 
Generali - Fraud Analytics
Generali - Fraud AnalyticsGenerali - Fraud Analytics
Generali - Fraud Analytics
Neo4j
 

What's hot (16)

ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
 
IT Trends - Cyber Security
IT Trends - Cyber SecurityIT Trends - Cyber Security
IT Trends - Cyber Security
 
AML Penalties Intro Deck
AML Penalties Intro Deck AML Penalties Intro Deck
AML Penalties Intro Deck
 
Op tijd klaar voor de naderende gdpr avg privacywet - Janus de Visser
Op tijd klaar voor de naderende gdpr avg privacywet - Janus de VisserOp tijd klaar voor de naderende gdpr avg privacywet - Janus de Visser
Op tijd klaar voor de naderende gdpr avg privacywet - Janus de Visser
 
AML Penalties Closed Beta 7 June 2021
AML Penalties Closed Beta 7 June 2021AML Penalties Closed Beta 7 June 2021
AML Penalties Closed Beta 7 June 2021
 
Affiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Fraud Trends & the Policies Needed in the IndustryAffiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Fraud Trends & the Policies Needed in the Industry
 
An Introduction to GDPR
An Introduction to GDPRAn Introduction to GDPR
An Introduction to GDPR
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
Cybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationCybersecurity's Impact on Innovation
Cybersecurity's Impact on Innovation
 
2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A
 
Investing in Cybersecurity, 2020 outlook for Mexico
Investing in Cybersecurity, 2020 outlook for MexicoInvesting in Cybersecurity, 2020 outlook for Mexico
Investing in Cybersecurity, 2020 outlook for Mexico
 
Fraud infographic - Forrester Report
Fraud infographic - Forrester ReportFraud infographic - Forrester Report
Fraud infographic - Forrester Report
 
5 startups using machine learning and behavioral biometrics to fight fraud
5 startups using machine learning and behavioral biometrics to fight fraud5 startups using machine learning and behavioral biometrics to fight fraud
5 startups using machine learning and behavioral biometrics to fight fraud
 
IoT Security RoundTable - March 2018
IoT Security RoundTable - March 2018IoT Security RoundTable - March 2018
IoT Security RoundTable - March 2018
 
Generali - Fraud Analytics
Generali - Fraud AnalyticsGenerali - Fraud Analytics
Generali - Fraud Analytics
 

Viewers also liked

Australia part 2
Australia part 2Australia part 2
Australia part 2
denisemjones
 
Austraila part 3
Austraila part 3Austraila part 3
Austraila part 3
denisemjones
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
Core Security
 
sunil_john_sourcing resume (1) (1)
sunil_john_sourcing resume (1) (1)sunil_john_sourcing resume (1) (1)
sunil_john_sourcing resume (1) (1)
sunil john
 
Allwyn-PE-CV
Allwyn-PE-CVAllwyn-PE-CV
Allwyn-PE-CV
Allwyn Stanley
 
Attest1 Håvard Posten
Attest1 Håvard PostenAttest1 Håvard Posten
Attest1 Håvard PostenH Soler
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
Bradford Bach
 
MILAN H. CV 2016-New
MILAN  H.  CV 2016-NewMILAN  H.  CV 2016-New
MILAN H. CV 2016-New
Hajdukovic Milan
 

Viewers also liked (11)

Australia part 2
Australia part 2Australia part 2
Australia part 2
 
Attest GVAC 1
Attest GVAC 1Attest GVAC 1
Attest GVAC 1
 
Austraila part 3
Austraila part 3Austraila part 3
Austraila part 3
 
CareerScope
CareerScopeCareerScope
CareerScope
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
Horn forlag attest
Horn forlag attestHorn forlag attest
Horn forlag attest
 
sunil_john_sourcing resume (1) (1)
sunil_john_sourcing resume (1) (1)sunil_john_sourcing resume (1) (1)
sunil_john_sourcing resume (1) (1)
 
Allwyn-PE-CV
Allwyn-PE-CVAllwyn-PE-CV
Allwyn-PE-CV
 
Attest1 Håvard Posten
Attest1 Håvard PostenAttest1 Håvard Posten
Attest1 Håvard Posten
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
MILAN H. CV 2016-New
MILAN  H.  CV 2016-NewMILAN  H.  CV 2016-New
MILAN H. CV 2016-New
 

Similar to Statistics of 2015 Data Breaches

wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
Numaan Huq
 
PCI COMPLIANCE REPORT
PCI COMPLIANCE REPORTPCI COMPLIANCE REPORT
PCI COMPLIANCE REPORT
at MicroFocus Italy ❖✔
 
Verizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgVerizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xg
CMR WORLD TECH
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
thinkASG
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
Echoworx
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
Lorena Magee
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
James Sheehan
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
Jeremiah Grossman
 
Transport Security 201507 lin
Transport Security 201507 linTransport Security 201507 lin
Transport Security 201507 lin
Danie Schoeman
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
Numaan Huq
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
FinTech Belgium
 
deloitte-au-privacy-index-2015
deloitte-au-privacy-index-2015deloitte-au-privacy-index-2015
deloitte-au-privacy-index-2015
David Batch
 
Data Breaches Lead to Identity Fraud, according to Javelin
Data Breaches Lead to Identity Fraud, according to JavelinData Breaches Lead to Identity Fraud, according to Javelin
Data Breaches Lead to Identity Fraud, according to Javelin
Nancy Ozawa
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014
- Mark - Fullbright
 
Chaplygin Roman Cybersecurity challanges in an interconnected world
Chaplygin Roman Cybersecurity challanges in an interconnected worldChaplygin Roman Cybersecurity challanges in an interconnected world
Chaplygin Roman Cybersecurity challanges in an interconnected world
East-West Digital News
 
BREACH LEVEL INDEX
BREACH LEVEL INDEXBREACH LEVEL INDEX
BREACH LEVEL INDEX
- Mark - Fullbright
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
Meg Weber
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Brunswick Group
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
Marco Antonio Agnese
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 lin
Danie Schoeman
 

Similar to Statistics of 2015 Data Breaches (20)

wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
PCI COMPLIANCE REPORT
PCI COMPLIANCE REPORTPCI COMPLIANCE REPORT
PCI COMPLIANCE REPORT
 
Verizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgVerizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xg
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
Transport Security 201507 lin
Transport Security 201507 linTransport Security 201507 lin
Transport Security 201507 lin
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
deloitte-au-privacy-index-2015
deloitte-au-privacy-index-2015deloitte-au-privacy-index-2015
deloitte-au-privacy-index-2015
 
Data Breaches Lead to Identity Fraud, according to Javelin
Data Breaches Lead to Identity Fraud, according to JavelinData Breaches Lead to Identity Fraud, according to Javelin
Data Breaches Lead to Identity Fraud, according to Javelin
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014
 
Chaplygin Roman Cybersecurity challanges in an interconnected world
Chaplygin Roman Cybersecurity challanges in an interconnected worldChaplygin Roman Cybersecurity challanges in an interconnected world
Chaplygin Roman Cybersecurity challanges in an interconnected world
 
BREACH LEVEL INDEX
BREACH LEVEL INDEXBREACH LEVEL INDEX
BREACH LEVEL INDEX
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 lin
 

More from HOTEL NEWS NOW (STR)

5 things to know about Easter hotel performance
5 things to know about Easter hotel performance5 things to know about Easter hotel performance
5 things to know about Easter hotel performance
HOTEL NEWS NOW (STR)
 
Consumers Don't Know Much About Cybersecurity
Consumers Don't Know Much About CybersecurityConsumers Don't Know Much About Cybersecurity
Consumers Don't Know Much About Cybersecurity
HOTEL NEWS NOW (STR)
 
The Biggest Hotel Companies by Market Cap
The Biggest Hotel Companies by Market CapThe Biggest Hotel Companies by Market Cap
The Biggest Hotel Companies by Market Cap
HOTEL NEWS NOW (STR)
 
3 Top Tech Trends for 2017
3 Top Tech Trends for 20173 Top Tech Trends for 2017
3 Top Tech Trends for 2017
HOTEL NEWS NOW (STR)
 
The In-Room Tech Guests Really Want
The In-Room Tech Guests Really WantThe In-Room Tech Guests Really Want
The In-Room Tech Guests Really Want
HOTEL NEWS NOW (STR)
 
Jan Freitag’s 5 things to Know U.S. January Performance Data
Jan Freitag’s 5 things to Know U.S. January Performance DataJan Freitag’s 5 things to Know U.S. January Performance Data
Jan Freitag’s 5 things to Know U.S. January Performance Data
HOTEL NEWS NOW (STR)
 
The World's Largest
The World's LargestThe World's Largest
The World's Largest
HOTEL NEWS NOW (STR)
 
Some guests will share data for rewards
Some guests will share data for rewardsSome guests will share data for rewards
Some guests will share data for rewards
HOTEL NEWS NOW (STR)
 
Jan Freitag’s 5 things to Know U.S. December Performance Data
Jan Freitag’s 5 things to Know U.S. December Performance DataJan Freitag’s 5 things to Know U.S. December Performance Data
Jan Freitag’s 5 things to Know U.S. December Performance Data
HOTEL NEWS NOW (STR)
 
New Year's Eve cocktails from around the world
New Year's Eve cocktails from around the worldNew Year's Eve cocktails from around the world
New Year's Eve cocktails from around the world
HOTEL NEWS NOW (STR)
 
How Corporate Travelers Use Mobile
How Corporate Travelers Use MobileHow Corporate Travelers Use Mobile
How Corporate Travelers Use Mobile
HOTEL NEWS NOW (STR)
 
Jan Freitag’s 5 things to Know U.S. October Performance Data
Jan Freitag’s 5 things to Know U.S. October Performance DataJan Freitag’s 5 things to Know U.S. October Performance Data
Jan Freitag’s 5 things to Know U.S. October Performance Data
HOTEL NEWS NOW (STR)
 
5 things to know about Thanksgiving Travel
5 things to know about Thanksgiving Travel5 things to know about Thanksgiving Travel
5 things to know about Thanksgiving Travel
HOTEL NEWS NOW (STR)
 
Defend against these types of data breaches
Defend against these types of data breachesDefend against these types of data breaches
Defend against these types of data breaches
HOTEL NEWS NOW (STR)
 
The State of Chip and Pin Technology
The State of Chip and Pin TechnologyThe State of Chip and Pin Technology
The State of Chip and Pin Technology
HOTEL NEWS NOW (STR)
 
Jan Freitag’s 5 things to Know U.S. August Performance Data
Jan Freitag’s 5 things to Know U.S. August Performance DataJan Freitag’s 5 things to Know U.S. August Performance Data
Jan Freitag’s 5 things to Know U.S. August Performance Data
HOTEL NEWS NOW (STR)
 
Marriott & Starwood by the numbers
Marriott & Starwood by the numbersMarriott & Starwood by the numbers
Marriott & Starwood by the numbers
HOTEL NEWS NOW (STR)
 
Expectations for mobile
Expectations for mobileExpectations for mobile
Expectations for mobile
HOTEL NEWS NOW (STR)
 
Mobile is Everywhere for Hotel Guests
Mobile is Everywhere for Hotel GuestsMobile is Everywhere for Hotel Guests
Mobile is Everywhere for Hotel Guests
HOTEL NEWS NOW (STR)
 
Utilities & Labor Costs at a glance
Utilities & Labor Costs at a glanceUtilities & Labor Costs at a glance
Utilities & Labor Costs at a glance
HOTEL NEWS NOW (STR)
 

More from HOTEL NEWS NOW (STR) (20)

5 things to know about Easter hotel performance
5 things to know about Easter hotel performance5 things to know about Easter hotel performance
5 things to know about Easter hotel performance
 
Consumers Don't Know Much About Cybersecurity
Consumers Don't Know Much About CybersecurityConsumers Don't Know Much About Cybersecurity
Consumers Don't Know Much About Cybersecurity
 
The Biggest Hotel Companies by Market Cap
The Biggest Hotel Companies by Market CapThe Biggest Hotel Companies by Market Cap
The Biggest Hotel Companies by Market Cap
 
3 Top Tech Trends for 2017
3 Top Tech Trends for 20173 Top Tech Trends for 2017
3 Top Tech Trends for 2017
 
The In-Room Tech Guests Really Want
The In-Room Tech Guests Really WantThe In-Room Tech Guests Really Want
The In-Room Tech Guests Really Want
 
Jan Freitag’s 5 things to Know U.S. January Performance Data
Jan Freitag’s 5 things to Know U.S. January Performance DataJan Freitag’s 5 things to Know U.S. January Performance Data
Jan Freitag’s 5 things to Know U.S. January Performance Data
 
The World's Largest
The World's LargestThe World's Largest
The World's Largest
 
Some guests will share data for rewards
Some guests will share data for rewardsSome guests will share data for rewards
Some guests will share data for rewards
 
Jan Freitag’s 5 things to Know U.S. December Performance Data
Jan Freitag’s 5 things to Know U.S. December Performance DataJan Freitag’s 5 things to Know U.S. December Performance Data
Jan Freitag’s 5 things to Know U.S. December Performance Data
 
New Year's Eve cocktails from around the world
New Year's Eve cocktails from around the worldNew Year's Eve cocktails from around the world
New Year's Eve cocktails from around the world
 
How Corporate Travelers Use Mobile
How Corporate Travelers Use MobileHow Corporate Travelers Use Mobile
How Corporate Travelers Use Mobile
 
Jan Freitag’s 5 things to Know U.S. October Performance Data
Jan Freitag’s 5 things to Know U.S. October Performance DataJan Freitag’s 5 things to Know U.S. October Performance Data
Jan Freitag’s 5 things to Know U.S. October Performance Data
 
5 things to know about Thanksgiving Travel
5 things to know about Thanksgiving Travel5 things to know about Thanksgiving Travel
5 things to know about Thanksgiving Travel
 
Defend against these types of data breaches
Defend against these types of data breachesDefend against these types of data breaches
Defend against these types of data breaches
 
The State of Chip and Pin Technology
The State of Chip and Pin TechnologyThe State of Chip and Pin Technology
The State of Chip and Pin Technology
 
Jan Freitag’s 5 things to Know U.S. August Performance Data
Jan Freitag’s 5 things to Know U.S. August Performance DataJan Freitag’s 5 things to Know U.S. August Performance Data
Jan Freitag’s 5 things to Know U.S. August Performance Data
 
Marriott & Starwood by the numbers
Marriott & Starwood by the numbersMarriott & Starwood by the numbers
Marriott & Starwood by the numbers
 
Expectations for mobile
Expectations for mobileExpectations for mobile
Expectations for mobile
 
Mobile is Everywhere for Hotel Guests
Mobile is Everywhere for Hotel GuestsMobile is Everywhere for Hotel Guests
Mobile is Everywhere for Hotel Guests
 
Utilities & Labor Costs at a glance
Utilities & Labor Costs at a glanceUtilities & Labor Costs at a glance
Utilities & Labor Costs at a glance
 

Recently uploaded

一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
nyfuhyz
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
aqzctr7x
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
u86oixdj
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
GetInData
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 

Recently uploaded (20)

一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 

Statistics of 2015 Data Breaches

  • 1. 2015 2014 STATISTICS OF 2015 DATA BREACHES 2015 was a rough year for hotel data security as numerous major companies reported breaches. The 2016 “Trustwave global security report” reviewed data intrusions from around the world in 2015 to locate trends and identify common weaknesses, sharing the statistics for corporate data breaches with further breakdowns by industry. External detection means the victim is notified by regulatory bodies, law enforcement or other third parties. Source: Trustwave 18% 9% 9% 100% point of sales corporate/internal network IT Environments Compromised Hospitality 75% 25% 45% 55% Food and Beverage e-commerce credit card magnetic strip data Types of Data Compromised proprietary data financial credentials 64% Internal Versus External Detection of a Breach Median duration of a data breach until detection (days) 126 External 10 Internal 16815 Median duration between detection and containment (days) 28 External1Internal Internal detection means victims of a data breach have the capability to detect an intrusion on their own or through a third-party security provider. Hospitality Food and Beverage illustrations: annamarie hudson 2015 Top method of detection 2014 Regulatory bodies, card brands or merchant banks Top method of detection 2015 Self-detected