In-depth

Top 10 most embarrassing data breaches

Inspired by a notable security gaffe at BP, we give our rundown of the most embarrassing data breaches in recent memory.

Every data breach brings the risk of embarrassing not only the company involved but also those whose information is compromised.

All too often we see breaches where truly sensitive data, such as medical information, is leaked, harming the organisation's reputation and infringing people's privacy simultaneously.

As a case in point, this week BP was guilty of losing a laptop containing personal data on around 13,000 claimants from the disastrous Deepwater Horizon oil spill of 2010.

Given the furore surrounding the oil spill, that particular loss was made all the more embarrassing for the firm.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Inspired by such epic gaffes, we've drawn together the 10 most mortifying breaches in recent memory.

10. First ICO fines

There have been far worse breaches than those that occurred at Hertfordshire County Council and employment services company A4e last year.

The reason why these two have been included in the list (making it a top 11 really) is that they were the first to be punished with an Information Commisioner's Office fine.

The anticipation in the lead up to the ICO's first monetary punishments meant whoever was forced to pay up would be left blushing.

Admittedly, their errors were fairly shaming in themselves. The council was reprimanded for two serious incidents when employees faxed highly sensitive personal information to the wrong recipients.

Advertisement - Article continues below

A4e had an unencrypted laptop stolen, which contained personal data on 24,000 people who had used community legal advice centres in Hull and Leicester.

If and when the ICO hands out the maximum 500,000 fine, the guilty organisation can expect to be even more shamefaced.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020