evolution of the verizon data breach investigations report (2008-2016)

14
Evolution of the Verizon Data Breach Investigations Report

Upload: verizon-enterprise-solutions

Post on 16-Apr-2017

111.786 views

Category:

Technology


3 download

TRANSCRIPT

Evolution of the Verizon Data Breach Investigations Report

This document and any attached materials are the sole property of Verizon and are not to be used by you other than to evaluate Verizon’s service.

© 2016 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its a�liates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners.

Proprietary statement.

Evolution of the Verizon Data Breach Investigations Report

Nine Editions:Providing Insight Into Data BreachesThe Verizon Data Breach Investigations Report (DBIR) has given readers key insights into how to manage risk and avoid security failings since 2008.

Here are some of the top highlights from the past nine editions of the DBIR.

2008

of all attacks were not highly di�cult.

of data breaches came from external sources.

83%

73%

2009

records analyzed were compromised in the past year. That’s more than one per adult in the US.

285 million

In 2010, the United States Secret Service contributed to the report for the first time.

2010 They helped expose that

of all data stolen in the pastyear was the work of criminals outside the victim organization.

98

*Percent of all 2010 data breaches

2011

The 2011 DBIR showed that hacking and malware had became an even more significant threat.

</></></></></></></></></></></></>

50 hacking

49malware

2012

The 2012 report covered the period of social uprising including the Occupy movement and the Arab Spring. These events had an impact on data security too.

of all incidents analyzed for the 2012 report were tied to hactivist groups.

58%

2013

of initial compromises took hours or less.

Most cyberattacks are committed by

Spies Criminals Activists

* Based on analysis of over 100,000 incidents from between 2004 and 2013

2014

00

00

00

BANK

Cyber-espionage Miscellaneouserrors

POS intrusions

Payment card skimmers

Denial ofservice

Web appattacks

Physical theft and loss

Crimeware Insider and privilege misuse

92%of security incidents were described by just nine patterns.*

2015

Nine basic patterns make up 96% of security incidents.

security incidents analyzed the past year can be traced to nine basic attack patterns that vary from industry to industry.

The bulk (96%) of nearly

of security incidents involve just three threat patterns.

00

00

0075

80,000

2016

of incidents had a financial motive.

80

Admin

P4$$w0rd

Password

Username

of 2,260 confirmed breaches leveraged weak, default or stolen passwords.

63

Since the 2015 report we’ve analyzed over 100,000 new security incidents. The 2016 DBIR o�ers our latest insight into stopping cyberattacks and protecting your organization.

Get the latest report now:

VerizonEnterprise.com/DBIR2016

Get our latest insightinto security threats

Contact us >

© 2016 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. PTE16739 04/16