2013 data breach highlights

8
1 Source: 2013 Data Breach Investigations Report Verizon 2013 Data Breach Investigations Report Highlights

Upload: world-wide-technology

Post on 27-Jan-2015

113 views

Category:

Technology


2 download

DESCRIPTION

A look at the top findings from the Verizon 2013 Data Breach Report. Includes link to full report.

TRANSCRIPT

Page 1: 2013 Data Breach Highlights

1

Source: 2013 Data Breach Investigations Report

Verizon 2013 Data Breach Investigations

Report Highlights

Page 2: 2013 Data Breach Highlights

2

Source: 2013 Data Breach Investigations Report

Some organizations will be a target REGARDLESS of what they do. Most become a target BECAUSE of what they do.

Page 3: 2013 Data Breach Highlights

3

Source: 2013 Data Breach Investigations Report

Analysis of more than 47,000 reported security incidents and 621 con!rmed data breaches from the past year

Breaches affected !nancial organizations

Breaches occurred in retail environments and restaurants

Network intrusions involved manufacturing, transportation, and utilities

Network intrusions hit information and professional services !rms

Breaches impacted larger organizations

27 different countries are represented

Industries Impacted Most

Presented by: wwt.com

Page 4: 2013 Data Breach Highlights

4

Source: 2013 Data Breach Investigations Report

92% OUTSIDERS

14% INSIDERS

1% BUSINESS PARTNERS

7% MULTIPLE PARTIES

19% STATE-AFFILIATED ACTORS

Read the Full Report from Verizon

Who Are the Perpetrators?

Presented by: wwt.com

Page 5: 2013 Data Breach Highlights

5

Source: 2013 Data Breach Investigations Report

Used some form of hacking Network intrusions exploited

weak or stolen credentials

The proportion of breaches incorporating social tactics like phishing was FOUR TIMES HIGHER in 2012.

Incorporated malware

Involved physical attacks

Leveraged social tactics

Resulted from privilege misuse and abuse

Read the Full Report from Verizon

Presented by: wwt.com

How Do Breaches Occur?

Page 6: 2013 Data Breach Highlights

6

Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon

Presented by: wwt.com

Top 10 Threat Actions for All Companies

See the top 20 threat actions broken down by company size in the full report.

Page 7: 2013 Data Breach Highlights

7

Source: 2013 Data Breach Investigations Report

While it may be difficult to detect, positively identify, and respond to an intrusion within seconds or minutes, our ability to do so should ostensibly increase the longer they poke around our internal networks. But unfortunately, we’re not really seeing that improvement.

Figure 42: Percent of breaches that remain undiscovered for months or more

Read the Full Report from Verizon

Presented by: wwt.com

We’re Not Seeing Improvement

Page 8: 2013 Data Breach Highlights

8

Source: 2013 Data Breach Investigations Report

Get the full report and learn more about: Mobile device threats

Most common motives behind the threats

Most common abusers – this may surprise you

What can your organization do

1.

2.

3.

4.

Read the Full Report from Verizon

Presented by: wwt.com