Internet Security and Facts

  • Security & Internet
  • 05/22/2016 01:12 PM
  • Comments: 0
  • Share it:

outta-the-cloud-secured-real-time-connection

Since 2005 there have been 4,890 data breaches tabulated, involving 670 million exposed records costing both companies and consumers "Billions of dollars" in revenue.

  • In 2012, Hackers attacked the South Carolina Department of Revenue. They hacked 3.6 million accounts. $5.2 billion dollars were lost making this breach one of the costliest ever.
  • In 2013, Adobe Systems were compromised in a serious attack. The attackers disclosed 152 million records, including customer names, IDs, encrypted passwords and debit/credit card numbers with expiration dates, source code, and other information relating to customer orders.
  • Facebook Inc - Inadvertently exposed 6 million users’ personal data to unauthorized viewers over the past year. Facebook blamed the data leaks, which began in 2012, on a technical glitch in its massive archive of contact information collected from its 1.1 billion users worldwide.

Data Center Facts

  • Facebook - spent $900 million on servers, storage, network gear and data centers in 2011; however, Facebook made about $1 billion in profits on revenue of more than $3.7 billion.
  • Google - spent $951 million on its data center operations in just the fourth quarter of 2011.
  • Microsoft data center - With a count of 1 billion users and 100,000 servers, Microsoft has so far spent around $23 billion on its data centers.
  • Hardware sales related to corporate-data projects are expected to more than double to $15.7 billion in 2017 from $7.16 billion in 2013.

This Post is currently closed for comments

Related Articles
Security & Internet

05/21/2016 12:53 PM
Security & Internet

According to the Cloud Security Alliance (CSA), Data Breaches and Cloud Service's Abuse Rank among the Greatest Cloud Security Threats. Data Breaches, Data Loss, Account Traffic Hijacking, Insecure Interfaces and APIs, Denial of Service, Malicious Insiders, Insufficient Due Diligence, Shared Technology Vulnerabilities.

Browse Topics