The Most Costly Data Breaches of 2015

Have you lost track of the number of data breaches that have taken place in 2015? Before the year draws to an end, it’s nearly a certainty that there will be more, and that they will be high profile.

Hacks aren’t just a way for criminals to gain attention; they cost organizations a great deal of money. Read on to learn about the costliest data breaches of 2015.

The Anthem Breach

At the beginning of 2015, American health insurer Anthem suffered a data breach. It affected 80 million people.

Hackers stole addresses, Social Security numbers and other identifying information. Analysts expect the attack to cost over $100 million.

The Ashley Madison Affair

The Impact Group’s attack on Ashley Madison was arguably the most sordid hack of 2015. Hackers stole the information of 37 million users who sought affairs.

Although the Ashley Madison saga is still unfolding, it appears as though it will not have a cheap resolution. Two Canadian law firms filed a class action suit against the website that enabled cheating. Lawyers seek $578 million in damages for their clients.

The Great Cyberheist

This data breach actually began in December 2013. The hack didn’t come to an end until February 2015.

Cybercriminals from Eastern Europe infiltrated at least 100 banks in 30 countries. They stole as much as $1 billion over the course of two years.

WinMagic: Your Trusted Source for Encryption Solutions

Do you want to protect your valuable data? Contact WinMagic today at 1-888-879-5879. We’ve been creating award-winning encryption solutions to safeguard digital information since 1997. Our most recent accolade is the 2015 CATAAlliance Outstanding Product Achievement Award.

You don’t have to rely on our awards or nearly two decades of experience in this field. Instead, ask any of our 5 million satisfied customers in over 80 countries. Call now to learn more.

Previous Post
The Worst Advice You’re Currently Getting on Data Security
Next Post
Data Sovereignty, Safe Harbor & Protection Regulation

Related Posts

When virtual environments get too heavy

When Virtual Environments Get Too Heavy

As an encryption security vendor that is working its way into Mobile Device Management (MDM), I’m fascinated and constantly looking at new ways to secure mobile devices and company information. As someone with a background in virtualized environments, I’m even…
Read more

2014 the year of Cyberwar

This year has been a scary year when it comes to cyber-attacks. Almost 9 billion records were compromised so far, and I would not be surprised if there were more. When it comes to these data breaches it is not…

Security Measures to Think About

Everyone is weary of hackers and the damages that they can cause, as seen with the Heartbleed Bug and Shellshock Bash. But hacking attacks can also mean physical security breaches, as hackers do not always have to resort to intricate…

Florida Gets Serious With Data Privacy

July 1st was a big day in Florida if you’re a follower of info security news. That was the day Florida’s new Florida Information Protection Act (FIPA) came into effect and had immediate consequences for anyone that does business in…
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Contact Us

This will close in 0 seconds