Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities

U.S. data compromises hit record high in 2021

  • Atlas VPN
  • February 22, 2022
Courtesy: Brett Sayles
Courtesy: Brett Sayles
Total
0
Shares
0
0
0
0

Every year brings new data breach victims. According to the data presented by the Atlas VPN team, the volume of publicly reported data compromises in the United States reached a record-high of 1,862 in 2021, affecting 293.9 million victims.

While the number of compromises soared by 68% compared to 2020, the number of victims actually fell by 5%.

This data is based on the 2021 in Review Annual Data Breach Report by the Identity Theft Resource Center.

U.S. compromises and victims by year.
Courtesy: AtlasVPN

Even with the record number of data breaches taking place last year, the number of victims was the lowest in the past seven years, since 2015. This downward trend may be caused by a decrease in mass data breaches.

Names were the most commonly exposed personal information. They were leaked in 1,603 data breaches. Full social security numbers were revealed in 1,136 compromises, while dates of birth were exposed in 686. Other commonly exposed personal data included current home addresses (681) and medical history (464).

Overall, the leak of sensitive records increased by an alarming 75%, from 882 in 2020 to 1,543 in 2021. Fraudsters who get their hands on such sensitive information can use it to commit a variety of crimes, from scams to full-fledged identity theft.

The manufacturing and utilities sector suffered the most from data compromises

All major economic sectors suffered from data compromises in 2021. However, some were affected more than others.

The most impacted industry in terms of the number of victims was manufacturing and utilities, with 49.8 million breached accounts — a whopping 1,618% increase from last year. The number of data compromises affecting the sector also grew more than threefold from 70 in 2021 to 222 in 2021.

Number of U.S. data compromise victims by industry
Courtesy: AtlasVPN

Next up is the technology sector with 44 million victims. Despite the high victim count, it suffered significantly less, with just 79 attacks.

The health care sector occupies the third spot on the list, with 28 million victims. It was affected by 330 data compromises, more than any other sector.

Professional and financial services round out the top five with 22.7 million and 19.7 million victims, respectively. The professional service sector had 184 data compromise incidents, while the financial sector had 279.

Other highly affected sectors include retail (7.1 million), government (3.2 million), nonprofit (2.3 million), education (1.7 million) and transportation (534,280).

Overall, cyberattacks were the root cause of 1,613 or 87% of data compromises, with phishing, smishing and business email compromise (BEC) attacks being the reason for 537 breaches. Furthermore, 179 breaches occurred due to human and system errors, while 51 were due to physical attacks.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Atlas VPN

Related Topics
  • CFE Content
  • Featured
Previous Article
Courtesy: Brett Sayles
  • Regulations

What is ISASecure certification?

  • H-ON Consulting
  • February 21, 2022
Read More
Next Article
Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
  • IT/OT

Operational technology risk assessments and security reviews

  • Mark Gauvreau
  • February 23, 2022
Read More
You May Also Like
Read More

How a desert water utility helped protect critical infrastructure

A robot powered by OSARO’s machine learning system picks consumer goods. Courtesy: A3/OSARO
Read More

Industrial robot utilization requires cybersecurity strategy

Courtesy: Brett Sayles
Read More

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

Read More

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

Courtesy: CFE Media and Technology
Read More

Lack of qualified cybersecurity personnel for critical infrastructure

Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
Read More

Cybersecurity-centered systems and fundamentals

Read More

Port and maritime cybersecurity vulnerabilities are getting more focus

Figure 1: For smaller organizations with limited network resources, it can be tempting to plug your machine directly into the business network. Courtesy: DMC
Read More

Securing your facility

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT