{"id":61997,"date":"2022-09-23T15:23:56","date_gmt":"2022-09-23T19:23:56","guid":{"rendered":"https:\/\/venngage.com\/blog\/?p=61997"},"modified":"2026-04-10T12:35:25","modified_gmt":"2026-04-10T16:35:25","slug":"data-breach-2022","status":"publish","type":"post","link":"https:\/\/venngage.com\/blog\/data-breach-2022\/","title":{"rendered":"Top Known Data Breaches of 2022 [Timeline + Infographic]"},"content":{"rendered":"<p><a href=\"https:\/\/venngage.com\/templates\/infographics\/timeline\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-62023 size-full\" src=\"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header.png\" alt=\" Top Known Data Breaches of 2022 [Timeline + Infographic]\" width=\"1024\" height=\"576\" srcset=\"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header.png 1024w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header-300x169.png 300w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header-768x432.png 768w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header-730x411.png 730w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n\n\n<p>Increasing cybercrime across the globe has taken a toll on companies and their users. According to the&nbsp;<a href=\"https:\/\/www.idtheftcenter.org\/post\/h1-2022-data-breach-report-shows-decrease-in-compromises-victim-rates\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Identity Theft Resource Center (ITRC)<\/a>\u2019s H1 2022 Data Breach Report, there have been 817 publicly-reported data compromises in the United States this year alone. <\/p>\n\n\n\n<p><meta charset=\"utf-8\"><\/meta>While this represents a 4% decrease compared to 2021, the statistics are staggering <meta charset=\"utf-8\"><\/meta>nonetheless. Ransomware attacks and malware continue to be a main cause of cyber attacks, sounding alarms for everyone to better guard their <a href=\"https:\/\/www.cognism.com\/b2b-data\" target=\"_blank\" rel=\"noreferrer noopener\">company data<\/a>.<\/p>\n\n\n\n<p>To no surprise, tech companies \u2014 often conducting the majority of their operations online \u2014 haven&#8217;t been spared. In 2022, previous data breaches have surfaced that highlight their extent, and real-life impact, on more than 200 million users \u2014 along with <meta charset=\"utf-8\"><\/meta>records of affected data and the damages\/expenses involved with recovering information. These incidents underscore the importance of securing <a href=\"https:\/\/www.motadata.com\/it-infrastructure-monitoring-tool\/\" target=\"_blank\" rel=\"noreferrer noopener\">IT infrastructure<\/a> to minimize vulnerabilities and protect critical systems from future attacks.<\/p>\n\n\n\n<p>Take a look at this <strong>Major Known Data Breaches in Tech 2022<\/strong> infographic created with our easy-to-edit templates:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/venngage.com\/templates\/infographics\/data-breach-2022-template-f44d7b13-751f-4a33-aac4-e4afef6f4180\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/data-breach-2022-template-preview-1024x663.png\" alt=\"Major Known Data Breaches in Tech 2022\" class=\"wp-image-62032\" style=\"box-shadow: 0 1px 4px 0 rgb(0 0 0 \/ 10%), 0 0 6px 0 rgb(0 0 0 \/ 10%), 0 2px 2px -2px rgb(0 0 0 \/ 15%);\" width=\"700\" srcset=\"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/data-breach-2022-template-preview-1024x663.png 1024w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/data-breach-2022-template-preview-300x194.png 300w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/data-breach-2022-template-preview-768x497.png 768w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/data-breach-2022-template-preview-1536x994.png 1536w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/data-breach-2022-template-preview-730x472.png 730w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/data-breach-2022-template-preview.png 1632w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n\n<center><a href=\"https:\/\/venngage.com\/templates\/infographics\/data-breach-2022-template-f44d7b13-751f-4a33-aac4-e4afef6f4180\" target=\"_blank\" rel=\"noopener\">\n<button class=\"btn-cta\"><b>CREATE THIS INFOGRAPHIC TEMPLATE<\/b><\/button><\/a><\/center>&nbsp;\n\n\n\n<h3 class=\"wp-block-heading\" id=\"toc\">Click to jump ahead:<\/h3>\n\n\n\n<ul>\n<li><a href=\"#what\">What is a cybersecurity incident?<\/a><\/li>\n\n\n\n<li><a href=\"#6\">6 facts you didn&#8217;t know about data breaches<\/a><\/li>\n\n\n\n<li><a href=\"#how\">How can I protect my company from a data breach?<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what\">What is a cybersecurity incident?<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.ncsc.gov.uk\/information\/what-cyber-incident\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">National Cyber Security Center of U.K.<\/a> defines a cybersecurity incident \u2014 or a cyber attack \u2014 as the \u201cbreach of a system&#8217;s security policy in order to affect its integrity or availability.\u201d<\/p>\n\n\n\n<p>There are different types of cyber attacks, and different reasons why an individual or organization would want to break into the security system of another individual, company or organization. Many of these attacks aim to compromise sensitive information, highlighting the importance of <a href=\"https:\/\/www.upwind.io\/glossary\/what-is-cloud-encryption\" target=\"_blank\" rel=\"noreferrer noopener\">securing data in the cl<\/a><a href=\"https:\/\/www.upwind.io\/glossary\/what-is-cloud-encryption\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">o<\/a><a href=\"https:\/\/www.upwind.io\/glossary\/what-is-cloud-encryption\" target=\"_blank\" rel=\"noreferrer noopener\">ud<\/a> as a critical component of modern cybersecurity strategies. Let&#8217;s review:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Data breaches vs. data leaks<\/h3>\n\n\n\n<p>Even though they share similar names, these cyber incidents don\u2019t cover the same risk factors.<\/p>\n\n\n\n<p>A data breach happens when an unauthorized party breaks into a company, individual or organizations system in order to disrupt, steal, control or manipulate private, sensitive or protected information \u2014 organizations facing this threat increasingly adopt <a href=\"https:\/\/sprinto.com\/blog\/compliance-automation-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">compliance automation software<\/a> to streamline audit workflows, track vendor compliance and maintain consistent risk-controls.<\/p>\n\n\n\n<p>In these types of cyber incidents, a company is either forced to pay a ransom, or act involuntarily, so the ransomware releases the hijacked data without revealing it to the public. That&#8217;s why it is important to lean on a <a href=\"https:\/\/www.osano.com\/articles\/eu-u.s.-data-privacy-framework-dpf\" target=\"_blank\" rel=\"noreferrer noopener\">data privacy framework<\/a>.<\/p>\n\n\n\n<p>These ransomware attacks entail a major threat to the data security of many businesses. In 2021 alone, <a href=\"https:\/\/tech.co\/news\/data-breaches-2022-so-far\" target=\"_blank\" rel=\"noreferrer noopener\">5.9 billion accounts were impacted by data breaches<\/a>.<\/p>\n\n\n\n<p>Over time, data breaches have become much more frequent, affecting companies of all sizes and industries. So far this year, one of the industries most impacted by sensitive data breaches is the technology industry, underscoring the need for <a href=\"https:\/\/cymulate.com\/blog\/what-is-continuous-threat-exposure-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">continuous threat exposure management<\/a> to identify and reduce security risks..<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/venngage.com\/templates\/infographics\/data-breach-2022-comparison-template-40f5b5ae-d685-4379-b41e-e48bdea3e7ab\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/40f5b5ae-d685-4379-b41e-e48bdea3e7ab-1-1024x791.png\" alt=\"Data breaches vs. data leaks - comparison infographic\" style=\"box-shadow: 0 1px 4px 0 rgb(0 0 0 \/ 10%), 0 0 6px 0 rgb(0 0 0 \/ 10%), 0 2px 2px -2px rgb(0 0 0 \/ 15%);\" class=\"wp-image-62042\" width=\"700\" srcset=\"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/40f5b5ae-d685-4379-b41e-e48bdea3e7ab-1-1024x791.png 1024w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/40f5b5ae-d685-4379-b41e-e48bdea3e7ab-1-300x232.png 300w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/40f5b5ae-d685-4379-b41e-e48bdea3e7ab-1-768x593.png 768w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/40f5b5ae-d685-4379-b41e-e48bdea3e7ab-1-730x564.png 730w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/40f5b5ae-d685-4379-b41e-e48bdea3e7ab-1.png 1056w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n\n<center><a href=\"https:\/\/venngage.com\/templates\/infographics\/data-breach-2022-comparison-template-40f5b5ae-d685-4379-b41e-e48bdea3e7ab\" target=\"_blank\" rel=\"noopener\">\n<button class=\"btn-cta\"><b>CREATE THIS INFOGRAPHIC TEMPLATE<\/b><\/button><\/a><\/center>&nbsp;\n\n\n\n<p>A data leak, on the other hand, happens when sensitive and private information is unknowingly exposed to the public against the victim\u2019s will. This type of cyber incident has historically occurred in many different fields: from leaking pictures of celebrities in new relationships and sharing unreleased album singles, to revealing databases containing projects or even crimes. Because of these data leaks, it is really important to be very careful about your public information. Additionally, in the case of data leaks, you should <a href=\"https:\/\/www.aura.com\/learn\/how-to-remove-your-personal-information-from-the-internet\" target=\"_blank\" rel=\"noreferrer noopener\">consider learning how to remove your personal information from the internet<\/a>.<\/p>\n\n\n\n<p>What&#8217;s more, there are other <a href=\"https:\/\/www.entrust.com\/blog\/2015\/05\/a-guide-to-the-inner-workings-of-different-malicious-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">types of cyber attacks<\/a> that have a purpose not directly linked to the hijacking and exfiltration of data, but instead to the sabotage of a project. These instances slow down or cause an interruption to a website, product or service. <\/p>\n\n\n\n<p>In sum, data breaches have been on the rise for a number of years, with the most impactful cyber attacks happening in the past couple \u2014 especially in terms of the cost of damages involved.<\/p>\n\n\n\n<p><strong><a href=\"#toc\">Return to Table of Contents<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"6\">6 facts you didn\u2019t know about data breaches<\/h2>\n\n\n\n<ol>\n<li>The damage cost of a data breach in 2022 is approximately $4.35 million.<\/li>\n\n\n\n<li>The United States is the country most affected by data breaches, encompassing <a href=\"https:\/\/www.enterpriseappstoday.com\/stats\/data-breach-statistics.html\" target=\"_blank\" rel=\"noreferrer noopener\">57% of data breaches and 97% of data records<\/a> compromised.<\/li>\n\n\n\n<li>It takes almost six months for a company or a firm to find out about a data breach attack.<\/li>\n\n\n\n<li>Approximately 68 documents get compromised every second \u2014 <em>oh, the Internet, what a beautiful place.<\/em><\/li>\n\n\n\n<li>It takes months for a company to recover from a cyber attack <em>\u2014 no, paying a ransom is not the only thing they need to do.<\/em><\/li>\n\n\n\n<li>6.4 million fake emails are in circulation every day<em> \u2014 stop clicking on them, mom.<\/em><\/li>\n<\/ol>\n\n\n\n<p>Now, we don\u2019t want you to be alarmed&#8230;but so far in September alone, a dozen cyber attacks have been confirmed. Below, we\u2019ve compiled a <a href=\"https:\/\/venngage.com\/blog\/timeline-examples\/\" target=\"_blank\" rel=\"noreferrer noopener\">timeline<\/a> of significant <strong>Major Data Breaches<\/strong> that have been reported by the media during September of 2022, up to the 20th of this month.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/venngage.com\/templates\/infographics\/data-breach-2022-timeline-template--4eefe790-82c1-4ab2-b944-76c9974f3295\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data-Breach-2022-Timeline-Template-preview.png\" alt=\"Major Data Breaches September 2022 Timeline Infographic\" style=\"box-shadow: 0 1px 4px 0 rgb(0 0 0 \/ 10%), 0 0 6px 0 rgb(0 0 0 \/ 10%), 0 2px 2px -2px rgb(0 0 0 \/ 15%);\" class=\"wp-image-62034\" width=\"700\" srcset=\"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data-Breach-2022-Timeline-Template-preview.png 816w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data-Breach-2022-Timeline-Template-preview-96x300.png 96w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data-Breach-2022-Timeline-Template-preview-328x1024.png 328w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data-Breach-2022-Timeline-Template-preview-768x2400.png 768w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data-Breach-2022-Timeline-Template-preview-655x2048.png 655w, https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data-Breach-2022-Timeline-Template-preview-730x2281.png 730w\" sizes=\"(max-width: 816px) 100vw, 816px\" \/><\/a><\/figure><\/div>\n\n\n\n<center><a href=\"https:\/\/venngage.com\/templates\/infographics\/data-breach-2022-timeline-template--4eefe790-82c1-4ab2-b944-76c9974f3295\" target=\"_blank\" rel=\"noopener\">\n<button class=\"btn-cta\"><b>CREATE THIS INFOGRAPHIC TEMPLATE<\/b><\/button><\/a><\/center>&nbsp;\n\n\n\n<p><strong><a href=\"#toc\">Return to Table of Contents<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how\">How can I protect my company from a data breach?<\/h2>\n\n\n\n<p>We know you don\u2019t have a single new password left in you, but cybersecurity is a never-ending battle. Meaning, if you keep being loyal to that password you created when you were 12\u2026 you\u2019ll lose. Adopting <a href=\"https:\/\/www.threatlocker.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">enterprise cybersecurity solutions<\/a> alongside basic security practices can significantly strengthen your defense.<\/p>\n\n\n\n<p>Here are some simple steps you can take to protect your data \u2014 for you and your company:<\/p>\n\n\n\n<ul>\n<li>Instead of using the notes on your phone, <strong>invest in a password manager<\/strong> for you and your team \u2014 this will allow you to create strong passwords for each important account, and store them all in a safe place.<\/li>\n\n\n\n<li>Whenever possible, <strong>activate 2-Factor authentication<\/strong> to create a second shield of protection for your valuable data. Additionally, implementing a robust Privileged Access Management (PAM) strategy early in your security planning helps in controlling and monitoring the elevated access that is essential to your network\u2019s security.<\/li>\n\n\n\n<li>Provide your employees with training materials. This process is seamless as there are online platforms like ExamSnap that provide comprehensive training material. This helps them identify suspicious activities or cyber incidents promptly and increases their digital identity security.<\/li>\n\n\n\n<li>Implement a continuous threat exposure management approach to identify, assess and <a href=\"https:\/\/pentest-tools.com\/alltools\" target=\"_blank\" rel=\"noreferrer noopener\">remediate potential vulnerabilities<\/a> before they can be exploited. This proactive security posture helps organizations stay ahead of emerging threats rather than simply reacting to breaches after they occur.<\/li>\n\n\n\n<li>Penetration Testing: Conduct regular <a href=\"https:\/\/www.vikingcloud.com\/blog\/what-is-penetration-testing\" target=\"_blank\" rel=\"noreferrer noopener\">penetration testing<\/a> periodically and after significant changes to your IT infrastructure or applications to ensure ongoing security resilience. This proactive approach helps in fortifying your company&#8217;s defenses and reducing the risk of data breaches.<\/li>\n<\/ul>\n\n\n\n<p>Every day, different job roles enter a more remote and digital environment. Even if you&#8217;re not part of a tech company, there&#8217;s no doubt defending the information we store on the Internet is extremely important \u2014 regardless of company size or sector.&nbsp;Something as simple as <a href=\"https:\/\/www.expressvpn.com\/vpn-download\/vpn-windows\" target=\"_blank\" rel=\"noreferrer noopener\">installing a Windows VPN<\/a> can be of great help in defending information.<\/p>\n\n\n\n<p>One simple step is regularly auditing the links your team shares publicly or internally. Using a link checker can help you detect broken or malicious links that could expose your business to phishing attempts or reputational risks \u2014 especially when links are embedded in emails, documents, or <a href=\"https:\/\/venngage.com\/blog\/landing-page-examples\/\" target=\"_blank\" rel=\"noreferrer noopener\">landing pages<\/a>.<\/p>\n\n\n\n<p>Data breach statistics reveal 43% of small businesses also fall for cyber attacks that result in the loss of sensitive information, resources and money. Always remember to update your security systems <a href=\"https:\/\/www.atera.com\/glossary\/patch-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">through patch management<\/a> to protect your company from suffering a data breach. <\/p>\n\n\n\n<p>Also, invest in a&nbsp;<a href=\"https:\/\/www.strongdm.com\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">privileged access management system<\/a>&nbsp;to secure your network and enhance visibility while reducing operational complexity. <\/p>\n\n\n\n<p>Additionally, following a <a href=\"https:\/\/nordlayer.com\/blog\/cyber-essentials-101-cost-benefits-and-checklist\/\" target=\"_blank\" rel=\"noreferrer noopener\">cyber essential checklist<\/a> can provide a structured approach to ensure all critical aspects of cybersecurity are addressed<\/p>\n\n\n\n<p>Alternatively, installing a VPN can also be beneficial as it can help ensure that your network is secure and trackable by hackers or similar cybersecurity threats. You can also install a <a href=\"https:\/\/blog.internxt.com\/best-vpn-extensions\/\" target=\"_blank\" rel=\"noreferrer noopener\">VPN extenstion<\/a> as simple way to make a quick VPN connection. For more detailed guidance on protecting your personal data online, consider learning about removing personal data from search sites.<\/p>\n\n\n\n<p><strong><a href=\"#toc\">Return to Table of Contents<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"make\">Make your own timeline infographic with Venngage<\/h2>\n\n\n\n<p>Found these <a href=\"https:\/\/venngage.com\/templates\/infographics\/timeline\" target=\"_blank\" rel=\"noreferrer noopener\">timeline templates<\/a> interesting? Have some data you&#8217;d like to visualize?  <\/p>\n\n\n\n<p>With Venngage&#8217;s templates and user-friendly visual editor, you can create your own timeline infographic in under an hour. <\/p>\n\n\n\n<p>To get started,&nbsp;<a href=\"https:\/\/infograph.venngage.com\/signup\" target=\"_blank\" rel=\"noreferrer noopener\">sign up for a free account<\/a>, pick a template from our library of professionally-designed timelines \u2014 including the data breach 2022 infographic featured above \u2014 swap in your content and you\u2019re ready to go.<\/p>\n\n\n\n<center><a href=\"https:\/\/venngage.com\/templates\/infographics\/timeline\" target=\"_blank\" rel=\"noopener\">\n<button class=\"btn-cta\"><b>START CREATING FOR FREE<\/b><\/button><\/a><\/center>&nbsp;\n","protected":false},"excerpt":{"rendered":"<p>Increasing cybercrime across the globe has taken a toll on companies and their users. According to the&nbsp;Identity Theft Resource Center (ITRC)\u2019s H1 2022 Data Breach Report, there have been 817 publicly-reported data compromises in the United States this year alone. While this represents a 4% decrease compared to 2021, the statistics are staggering nonetheless. Ransomware [&hellip;]<\/p>\n","protected":false},"author":138,"featured_media":62023,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false},"categories":[95,607],"tags":[243,297],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Cybercrime has taken a toll across the globe. Take a look at this infographic of the top known data breaches in 2022 to see the effects...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/venngage.com\/blog\/data-breach-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Known Data Breaches of 2022 [Timeline + Infographic]\" \/>\n<meta property=\"og:description\" content=\"Cybercrime has taken a toll across the globe. Take a look at this infographic of the top known data breaches in 2022 to see the effects...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/venngage.com\/blog\/data-breach-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Venngage\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Venngage\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-23T19:23:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T16:35:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Top Known Data Breaches of 2022 [Timeline + Infographic]\" \/>\n<meta name=\"twitter:description\" content=\"Cybercrime has taken a toll across the globe. Take a look at this infographic of the top known data breaches in 2022 to see the effects...\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header.png\" \/>\n<meta name=\"twitter:creator\" content=\"@venngage\" \/>\n<meta name=\"twitter:site\" content=\"@venngage\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camila Feij\u00f3o\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/venngage.com\/blog\/#website\",\"url\":\"https:\/\/venngage.com\/blog\/\",\"name\":\"Venngage\",\"description\":\"Learn to Communicate with Data\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/venngage.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/venngage.com\/blog\/data-breach-2022\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header.png\",\"contentUrl\":\"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header.png\",\"width\":1024,\"height\":576,\"caption\":\"Top Known Data Breaches of 2022 [Timeline + Infographic]\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/venngage.com\/blog\/data-breach-2022\/#webpage\",\"url\":\"https:\/\/venngage.com\/blog\/data-breach-2022\/\",\"name\":\"Top Known Data Breaches of 2022 [Timeline + Infographic] - Venngage\",\"isPartOf\":{\"@id\":\"https:\/\/venngage.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/venngage.com\/blog\/data-breach-2022\/#primaryimage\"},\"datePublished\":\"2022-09-23T19:23:56+00:00\",\"dateModified\":\"2026-04-10T16:35:25+00:00\",\"author\":{\"@id\":\"https:\/\/venngage.com\/blog\/#\/schema\/person\/6ba9808e3fbda76e7301fd72706c1e7b\"},\"description\":\"Cybercrime has taken a toll across the globe. Take a look at this infographic of the top known data breaches in 2022 to see the effects...\",\"breadcrumb\":{\"@id\":\"https:\/\/venngage.com\/blog\/data-breach-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/venngage.com\/blog\/data-breach-2022\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/venngage.com\/blog\/data-breach-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/venngage.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Visualization\",\"item\":\"https:\/\/venngage.com\/blog\/category\/data-visualization\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Top Known Data Breaches of 2022 [Timeline + Infographic]\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/venngage.com\/blog\/#\/schema\/person\/6ba9808e3fbda76e7301fd72706c1e7b\",\"name\":\"Camila Feij\\u00f3o\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/venngage.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8c5bf96ca99eddc75e16d79995de2779?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8c5bf96ca99eddc75e16d79995de2779?s=96&d=mm&r=g\",\"caption\":\"Camila Feij\\u00f3o\"},\"description\":\"Camila is a Marketing Specialist at Venngage. She has a background in content management, audiovisuals and advertising; which has given her the opportunity to work with valuable brands and projects around the world. She\\u2019s full of movie references, music industry facts and tech hacks. She loves a good em dash \\u2014 and she doesn't like to talk about herself in the third person.\",\"url\":\"https:\/\/venngage.com\/blog\/author\/camilavenngage-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Cybercrime has taken a toll across the globe. Take a look at this infographic of the top known data breaches in 2022 to see the effects...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/venngage.com\/blog\/data-breach-2022\/","og_locale":"en_US","og_type":"article","og_title":"Top Known Data Breaches of 2022 [Timeline + Infographic]","og_description":"Cybercrime has taken a toll across the globe. Take a look at this infographic of the top known data breaches in 2022 to see the effects...","og_url":"https:\/\/venngage.com\/blog\/data-breach-2022\/","og_site_name":"Venngage","article_publisher":"https:\/\/www.facebook.com\/Venngage","article_published_time":"2022-09-23T19:23:56+00:00","article_modified_time":"2026-04-10T16:35:25+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Top Known Data Breaches of 2022 [Timeline + Infographic]","twitter_description":"Cybercrime has taken a toll across the globe. Take a look at this infographic of the top known data breaches in 2022 to see the effects...","twitter_image":"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header.png","twitter_creator":"@venngage","twitter_site":"@venngage","twitter_misc":{"Written by":"Camila Feij\u00f3o","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/venngage.com\/blog\/#website","url":"https:\/\/venngage.com\/blog\/","name":"Venngage","description":"Learn to Communicate with Data","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/venngage.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/venngage.com\/blog\/data-breach-2022\/#primaryimage","inLanguage":"en-US","url":"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header.png","contentUrl":"https:\/\/venngage-wordpress.s3.amazonaws.com\/uploads\/2022\/09\/Data_Breach_2022_Blog_Header.png","width":1024,"height":576,"caption":"Top Known Data Breaches of 2022 [Timeline + Infographic]"},{"@type":"WebPage","@id":"https:\/\/venngage.com\/blog\/data-breach-2022\/#webpage","url":"https:\/\/venngage.com\/blog\/data-breach-2022\/","name":"Top Known Data Breaches of 2022 [Timeline + Infographic] - Venngage","isPartOf":{"@id":"https:\/\/venngage.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/venngage.com\/blog\/data-breach-2022\/#primaryimage"},"datePublished":"2022-09-23T19:23:56+00:00","dateModified":"2026-04-10T16:35:25+00:00","author":{"@id":"https:\/\/venngage.com\/blog\/#\/schema\/person\/6ba9808e3fbda76e7301fd72706c1e7b"},"description":"Cybercrime has taken a toll across the globe. Take a look at this infographic of the top known data breaches in 2022 to see the effects...","breadcrumb":{"@id":"https:\/\/venngage.com\/blog\/data-breach-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/venngage.com\/blog\/data-breach-2022\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/venngage.com\/blog\/data-breach-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/venngage.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Visualization","item":"https:\/\/venngage.com\/blog\/category\/data-visualization\/"},{"@type":"ListItem","position":3,"name":"Top Known Data Breaches of 2022 [Timeline + Infographic]"}]},{"@type":"Person","@id":"https:\/\/venngage.com\/blog\/#\/schema\/person\/6ba9808e3fbda76e7301fd72706c1e7b","name":"Camila Feij\u00f3o","image":{"@type":"ImageObject","@id":"https:\/\/venngage.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8c5bf96ca99eddc75e16d79995de2779?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8c5bf96ca99eddc75e16d79995de2779?s=96&d=mm&r=g","caption":"Camila Feij\u00f3o"},"description":"Camila is a Marketing Specialist at Venngage. She has a background in content management, audiovisuals and advertising; which has given her the opportunity to work with valuable brands and projects around the world. She\u2019s full of movie references, music industry facts and tech hacks. She loves a good em dash \u2014 and she doesn't like to talk about herself in the third person.","url":"https:\/\/venngage.com\/blog\/author\/camilavenngage-com\/"}]}},"_links":{"self":[{"href":"https:\/\/venngage.com\/blog\/wp-json\/wp\/v2\/posts\/61997"}],"collection":[{"href":"https:\/\/venngage.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/venngage.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/venngage.com\/blog\/wp-json\/wp\/v2\/users\/138"}],"replies":[{"embeddable":true,"href":"https:\/\/venngage.com\/blog\/wp-json\/wp\/v2\/comments?post=61997"}],"version-history":[{"count":53,"href":"https:\/\/venngage.com\/blog\/wp-json\/wp\/v2\/posts\/61997\/revisions"}],"predecessor-version":[{"id":111570,"href":"https:\/\/venngage.com\/blog\/wp-json\/wp\/v2\/posts\/61997\/revisions\/111570"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/venngage.com\/blog\/wp-json\/wp\/v2\/media\/62023"}],"wp:attachment":[{"href":"https:\/\/venngage.com\/blog\/wp-json\/wp\/v2\/media?parent=61997"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/venngage.com\/blog\/wp-json\/wp\/v2\/categories?post=61997"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/venngage.com\/blog\/wp-json\/wp\/v2\/tags?post=61997"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}