

{"id":1376,"date":"2012-06-23T10:16:19","date_gmt":"2012-06-23T15:16:19","guid":{"rendered":"http:\/\/rud.is\/b\/?p=1376"},"modified":"2017-03-27T09:40:42","modified_gmt":"2017-03-27T14:40:42","slug":"breach-reach-google-insights","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/","title":{"rendered":"Breach Reach : Google Insights"},"content":{"rendered":"<blockquote><p><b>UPDATE<\/b>: <i>I had to remove the Google Insight widgets and replace them with static images. There was inconsistent loading far too often in non-Chrome browsers. Click on the graphs to go to the Google Insights detail pages for more interaction with the data.<\/i><\/p><\/blockquote>\n<p>Information security breaches have been the &#8220;new black&#8221; in the past eighteen months, with the latest fashion-trend being the LinkedIn passwords fiasco. This got me thinking: what <i>is<\/i> the &#8220;half-life&#8221; of a breach? It&#8217;s becoming obvious that users do not see the security of their information as a service differentiator or even a tier one decision point when choosing to use a new social network or online application. (How many of <i>you<\/i> closed out your LinkedIn accounts?) But, just how quickly does their attention wane from a breach event? Pretty quickly, if one formulates a conclusion based on Google Insights search data.<\/p>\n<p><b>Let&#8217;s start with LinkedIn<\/b><\/p>\n<p><center><a href=\"https:\/\/trends.google.com\/trends\/#cat=0&amp;q=linkedin%20password%2Clinkedin%20passwords%2Clinkedin%20hacked&amp;geo=&amp;date=today 1-m&amp;gprop=&amp;cmpt=q\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br1-1.png?w=510&#038;ssl=1\"\/><\/a><\/center><\/p>\n<p>We have a burst that \u2013 if one is generous \u2013\u00a0captures interest for about a week. Even more interesting is that it seems said interest was limited to very specific geographic regions:<\/p>\n<p><center><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1381\" data-permalink=\"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/google-insights-for-search-web-search-interest_-linkedin-password-linkedin-passwords-linkedin-hacked-worldwide-last-30-days\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Google-Insights-for-Search-Web-Search-Interest_-linkedin-password-linkedin-passwords-linkedin-hacked-Worldwide-Last-30-days.png?fit=506%2C314&amp;ssl=1\" data-orig-size=\"506,314\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Google Insights for Search &amp;#8211; Web Search Interest_ linkedin password, linkedin passwords, linkedin hacked &amp;#8211; Worldwide, Last 30 days\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Google-Insights-for-Search-Web-Search-Interest_-linkedin-password-linkedin-passwords-linkedin-hacked-Worldwide-Last-30-days.png?fit=506%2C314&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Google-Insights-for-Search-Web-Search-Interest_-linkedin-password-linkedin-passwords-linkedin-hacked-Worldwide-Last-30-days.png?resize=506%2C314&#038;ssl=1\" alt=\"\" title=\"Google Insights for Search - Web Search Interest_ linkedin password, linkedin passwords, linkedin hacked - Worldwide, Last 30 days\" width=\"506\" height=\"314\" class=\"aligncenter size-full wp-image-1381\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Google-Insights-for-Search-Web-Search-Interest_-linkedin-password-linkedin-passwords-linkedin-hacked-Worldwide-Last-30-days.png?w=506&amp;ssl=1 506w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Google-Insights-for-Search-Web-Search-Interest_-linkedin-password-linkedin-passwords-linkedin-hacked-Worldwide-Last-30-days.png?resize=300%2C186&amp;ssl=1 300w\" sizes=\"auto, (max-width: 506px) 100vw, 506px\" \/><\/center><\/p>\n<p>Plus, the incident continues to help show the lack of impact breaches have on stock price:<\/p>\n<p><center><a href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Linkedin-Corporation_-NYSE_LNKD-quotes-news-Google-Finance.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1383\" data-permalink=\"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/linkedin-corporation_-nyse_lnkd-quotes-news-google-finance\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Linkedin-Corporation_-NYSE_LNKD-quotes-news-Google-Finance.png?fit=650%2C454&amp;ssl=1\" data-orig-size=\"650,454\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Linkedin Corporation_ NYSE_LNKD quotes &amp;#038; news &amp;#8211; Google Finance\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Linkedin-Corporation_-NYSE_LNKD-quotes-news-Google-Finance.png?fit=510%2C356&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Linkedin-Corporation_-NYSE_LNKD-quotes-news-Google-Finance.png?resize=300%2C209&#038;ssl=1\" alt=\"\" title=\"Linkedin Corporation_ NYSE_LNKD quotes &amp; news - Google Finance\" width=\"300\" height=\"209\" class=\"aligncenter size-medium wp-image-1383\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Linkedin-Corporation_-NYSE_LNKD-quotes-news-Google-Finance.png?resize=300%2C209&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Linkedin-Corporation_-NYSE_LNKD-quotes-news-Google-Finance.png?w=650&amp;ssl=1 650w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><\/p>\n<p>But, LinkedIn is not exactly a broad-reaching service (i.e. it&#8217;s no Facebook).<\/p>\n<p><b>Breaches Don&#8217;t Stop The Shopping<\/b><\/p>\n<p>Investor exuberance notwithstanding, LinkedIn <b>is<\/b> kinda boring since folks use it to actually publish personal data to the world. While it has some private messaging and may hold some financial account information, it&#8217;s not like Zappos which has payment information and shopping history, and who was also breached this year. How long did they get attention?<\/p>\n<p><center><a href=\"https:\/\/trends.google.com\/trends\/#cat=0&amp;q=zappos%20hacked%2Czappos%20hack%2Czappos%20password%2Czappos%20passwords%2Czappos%20breach&amp;geo=&amp;date=today 12-m&amp;gprop=&amp;cmpt=q\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br2-1.png?w=510&#038;ssl=1\"\/><\/a><\/center><\/p>\n<p>While there is a longer, flat tail, attention is still about seven days (you can interact with the chart and zoom in to verify that claim) and Zappos&#8217; overall consumer interest does not seem to have waned:<\/p>\n<p><center><a href=\"https:\/\/trends.google.com\/trends\/#cat=0&amp;q=zappos&amp;geo=&amp;date=today 12-m&amp;gprop=&amp;cmpt=q\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br3-1.png?w=510&#038;ssl=1\"\/><\/a><\/center><\/p>\n<p><b>Sownage Revisited<\/b><\/p>\n<p>The word &#8220;Sony&#8221; is now almost synonymous with &#8220;breach&#8221; in the minds of most information security folk. It&#8217;s our &#8220;go to&#8221; example when talking with executives and application teams. Unfortunately, for the purposes of comparative analysis, it wasn&#8217;t just one breach. So, while the chart shows closer to a ten week interest period, that makes sense when one considers there were over ten news stories (one for each new breach):<\/p>\n<p><center><a href=\"https:\/\/trends.google.com\/trends\/#cat=0&amp;q=sony%20breach&amp;geo=&amp;date=today 18-m&amp;gprop=&amp;cmpt=q\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br4-1.png?w=510&#038;ssl=1\"\/><\/a><\/center><\/p>\n<p>I won&#8217;t go into the details as to why including a stock price chart has little efficacy in determining breach effect for Sony (it&#8217;s been analyzed to death), but a comparative look at &#8220;PlayStation&#8221; (with an added factor for &#8220;iPad&#8221;) shows (to me) that the breaches had far less impact on interest in the PlayStation (one of the main breach targets) than the iPad had:<\/p>\n<p><center><a href=\"https:\/\/trends.google.com\/trends\/#cat=0&amp;q=playstation%2Cipad&amp;geo=&amp;date=today 12-m&amp;gprop=&amp;cmpt=q\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br5-1.png?w=510&#038;ssl=1\"\/><\/a><\/center><\/p>\n<p><b>Breaches Spook The Spooks<\/b><\/p>\n<p>So, if breaches are of little interest to the consumer, they must have greater impact on the community that has some skin in the game, right? <i>Kinda<\/i>. If we look at the RSA &#038; Lockheed breaches:<\/p>\n<p><center><a href=\"https:\/\/trends.google.com\/trends\/#cat=0&amp;q=lockheed%20breach%2Clockheed%20hacked&amp;geo=&amp;date=today 18-m&amp;gprop=&amp;cmpt=q\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br6-1.png?w=510&#038;ssl=1\"\/><\/a><\/center><\/p>\n<p><center><a href=\"https:\/\/trends.google.com\/trends\/#cat=0&amp;q=rsa%20breach&amp;geo=&amp;date=today 18-m&amp;gprop=&amp;cmpt=q\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br7-1.png?w=510&#038;ssl=1\"\/><\/a><\/center><\/p>\n<p>We see that the Lockheed breach kept attention from mid-April to about mid-July (12 weeks) and RSA spiked twice for about four weeks each time. Both of them were intertwined in the news and RSA had numerous (to be blunt) PR-events that helped keep focus on both.<\/p>\n<p>RSA is part of EMC, so a stock view analysis has many other complexities that make it less than ideal, but both companies (EMC &#038; Lockheed) did not seem to suffer from the extended initial breach interest:<\/p>\n<p><center><a href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Lockheed-Martin-Corporation_-NYSE_LMT-quotes-news-Google-Finance.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1389\" data-permalink=\"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/lockheed-martin-corporation_-nyse_lmt-quotes-news-google-finance\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Lockheed-Martin-Corporation_-NYSE_LMT-quotes-news-Google-Finance.png?fit=649%2C452&amp;ssl=1\" data-orig-size=\"649,452\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Lockheed Martin Corporation_ NYSE_LMT quotes &amp;#038; news &amp;#8211; Google Finance\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Lockheed-Martin-Corporation_-NYSE_LMT-quotes-news-Google-Finance.png?fit=510%2C355&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Lockheed-Martin-Corporation_-NYSE_LMT-quotes-news-Google-Finance.png?resize=300%2C208&#038;ssl=1\" alt=\"\" title=\"Lockheed Martin Corporation_ NYSE_LMT quotes &amp; news - Google Finance\" width=\"300\" height=\"208\" class=\"aligncenter size-medium wp-image-1389\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Lockheed-Martin-Corporation_-NYSE_LMT-quotes-news-Google-Finance.png?resize=300%2C208&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Lockheed-Martin-Corporation_-NYSE_LMT-quotes-news-Google-Finance.png?w=649&amp;ssl=1 649w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><\/p>\n<p><center><a href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/EMC-Corporation_-NYSE_EMC-quotes-news-Google-Finance.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1390\" data-permalink=\"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/emc-corporation_-nyse_emc-quotes-news-google-finance\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/EMC-Corporation_-NYSE_EMC-quotes-news-Google-Finance.png?fit=650%2C451&amp;ssl=1\" data-orig-size=\"650,451\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"EMC Corporation_ NYSE_EMC quotes &amp;#038; news &amp;#8211; Google Finance\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/EMC-Corporation_-NYSE_EMC-quotes-news-Google-Finance.png?fit=510%2C354&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/EMC-Corporation_-NYSE_EMC-quotes-news-Google-Finance.png?resize=300%2C208&#038;ssl=1\" alt=\"\" title=\"EMC Corporation_ NYSE_EMC quotes &amp; news - Google Finance\" width=\"300\" height=\"208\" class=\"aligncenter size-medium wp-image-1390\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/EMC-Corporation_-NYSE_EMC-quotes-news-Google-Finance.png?resize=300%2C208&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/EMC-Corporation_-NYSE_EMC-quotes-news-Google-Finance.png?w=650&amp;ssl=1 650w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><\/p>\n<p><b>Only One View<\/b><\/p>\n<p>I mentioned at the beginning of the post that this was intended to be a single-factor analysis, limited to what insights Google gleans from what folks are searching for. It doesn&#8217;t provide a view into enterprise contractual agreements, service usage patterns or even blogger\/social media sentiment analysis. Yet, folks search for what they are interested in and when I add a few parameters to the LinkedIn chart:<\/p>\n<p><center><a href=\"https:\/\/trends.google.com\/trends\/#cat=0&amp;q=linkedin%20passwords%2Csnookie%2Cjohansson%2Cgas%20prices&amp;geo=&amp;date=today 1-m&amp;gprop=&amp;cmpt=q\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br8-1.png?w=510&#038;ssl=1\"\/><\/a><\/center><\/p>\n<p>we see that people are far more interested in Scarlett Johansson, gas prices and even <i>Snookie<\/i> than they are in LinkedIn insecurity. Perhaps breaches just aren&#8217;t sexy enough or personally impacting enough to truly matter\u2026even to security professionals.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>UPDATE: I had to remove the Google Insight widgets and replace them with static images. There was inconsistent loading far too often in non-Chrome browsers. Click on the graphs to go to the Google Insights detail pages for more interaction with the data. Information security breaches have been the &#8220;new black&#8221; in the past eighteen [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[61,24,3],"tags":[],"class_list":["post-1376","post","type-post","status-publish","format-standard","hentry","category-breach","category-charts-graphs","category-information-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Breach Reach : Google Insights - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Breach Reach : Google Insights - rud.is\" \/>\n<meta property=\"og:description\" content=\"UPDATE: I had to remove the Google Insight widgets and replace them with static images. There was inconsistent loading far too often in non-Chrome browsers. Click on the graphs to go to the Google Insights detail pages for more interaction with the data. Information security breaches have been the &#8220;new black&#8221; in the past eighteen [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-23T15:16:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-27T14:40:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br1-1.png\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Breach Reach : Google Insights\",\"datePublished\":\"2012-06-23T15:16:19+00:00\",\"dateModified\":\"2017-03-27T14:40:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/\"},\"wordCount\":690,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/06\\\/br1-1.png\",\"articleSection\":[\"Breach\",\"Charts &amp; Graphs\",\"Information Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/\",\"name\":\"Breach Reach : Google Insights - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/06\\\/br1-1.png\",\"datePublished\":\"2012-06-23T15:16:19+00:00\",\"dateModified\":\"2017-03-27T14:40:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/06\\\/br1-1.png?fit=514%2C363&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/06\\\/br1-1.png?fit=514%2C363&ssl=1\",\"width\":\"514\",\"height\":\"363\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/23\\\/breach-reach-google-insights\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Breach Reach : Google Insights\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Breach Reach : Google Insights - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/","og_locale":"en_US","og_type":"article","og_title":"Breach Reach : Google Insights - rud.is","og_description":"UPDATE: I had to remove the Google Insight widgets and replace them with static images. There was inconsistent loading far too often in non-Chrome browsers. Click on the graphs to go to the Google Insights detail pages for more interaction with the data. Information security breaches have been the &#8220;new black&#8221; in the past eighteen [&hellip;]","og_url":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/","og_site_name":"rud.is","article_published_time":"2012-06-23T15:16:19+00:00","article_modified_time":"2017-03-27T14:40:42+00:00","og_image":[{"url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br1-1.png","type":"","width":"","height":""}],"author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Breach Reach : Google Insights","datePublished":"2012-06-23T15:16:19+00:00","dateModified":"2017-03-27T14:40:42+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/"},"wordCount":690,"commentCount":1,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br1-1.png","articleSection":["Breach","Charts &amp; Graphs","Information Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/","url":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/","name":"Breach Reach : Google Insights - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/#primaryimage"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br1-1.png","datePublished":"2012-06-23T15:16:19+00:00","dateModified":"2017-03-27T14:40:42+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/#primaryimage","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br1-1.png?fit=514%2C363&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/br1-1.png?fit=514%2C363&ssl=1","width":"514","height":"363"},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Breach Reach : Google Insights"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-mc","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1033,"url":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/","url_meta":{"origin":1376,"position":0},"title":"Off By One : The Importance Of Fact Checking Breach Reports","author":"hrbrmstr","date":"2012-05-10","format":false,"excerpt":"I didn't read through the Massachusetts 2011 Report on Data Breach Notifications\u00a0[PDF] until recently, but once I went through the report my brain kept telling me \"something is wrong\". Not something earth shattering, but more of a \"something is off\" signal. This happens more than I'd like as I tend\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1948,"url":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/","url_meta":{"origin":1376,"position":1},"title":"Once More Into The [PRC Aggregated] Breaches","author":"hrbrmstr","date":"2013-01-27","format":false,"excerpt":"If you're not on the SecurityMetrics.org mailing list you missed an interaction about the Privacy Rights Clearinghouse Chronology of Data Breaches data source started by Lance Spitzner (@lspitzner). You'll need to subscribe to the list see the thread, but one innocent question put me down the path to taking a\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1300,"url":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/","url_meta":{"origin":1376,"position":2},"title":"WEIS 2012 :: Best of the Best","author":"hrbrmstr","date":"2012-06-16","format":false,"excerpt":"Sadly, I could not make it to this year's Workshop on the Economics of Information Security. However, the intrepid conference organizers were quick to post the papers that were presented, and I had a chance to sift through them to pick out what I believe to be the best of\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":754,"url":"https:\/\/rud.is\/b\/2012\/01\/03\/businessweek-infographic-illustrates-the-pounding-we-took-in-2011\/","url_meta":{"origin":1376,"position":3},"title":"Businessweek Infographic Illustrates The Pounding We Took In 2011","author":"hrbrmstr","date":"2012-01-03","format":false,"excerpt":"Another #spiffy tip from @MetricsHulk: Evan Applegate put together a great & simple infographic for Businessweek that illustrates the number and size of 2011 data breaches pretty well. (Click for larger version) The summary data (below the timeline bubble chart) shows there was a 37.4% increase in reported incidents and\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":727,"url":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/","url_meta":{"origin":1376,"position":4},"title":"Three Resolutions For Web Developers","author":"hrbrmstr","date":"2011-12-30","format":false,"excerpt":"I'm on a \"three things\" motif for 2012, as it's really difficult for most folks to focus on more than three core elements well. This is especially true for web developers as they have so much to contend with on a daily basis, whether it be new features, bug reports,\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":416,"url":"https:\/\/rud.is\/b\/2011\/03\/26\/checkboxes-fail-to-defend-maine-department-of-conservation-against-attacks\/","url_meta":{"origin":1376,"position":5},"title":"Checkboxes Fail To Defend Maine Department of Conservation Against Attacks","author":"hrbrmstr","date":"2011-03-26","format":false,"excerpt":"I tweeted a quick note about the 2010 Maine Department of Conservation state park pass ordering system breach. The brief AP story indicated that the breach itself was caused by a malware infection on systems at their SasS provider InfoSpherix. While the article claims notices were sent to ~1,000 impacted\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=1376"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1376\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=1376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=1376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=1376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}