Data is everywhere, and what constitutes sensitive data for organizations today has greatly expanded. Security and privacy pros must align their concerns with actual breach causes, understand what types of data are being compromised, recognize post-breach effects and impact, and benchmark approaches to data security for their cybersecurity programs and privacy compliance. They should use this report to understand trends and modify their programs accordingly.