2013 data breach highlights
DESCRIPTION
A look at the top findings from the Verizon 2013 Data Breach Report. Includes link to full report.TRANSCRIPT
1
Source: 2013 Data Breach Investigations Report
Verizon 2013 Data Breach Investigations
Report Highlights
2
Source: 2013 Data Breach Investigations Report
Some organizations will be a target REGARDLESS of what they do. Most become a target BECAUSE of what they do.
3
Source: 2013 Data Breach Investigations Report
Analysis of more than 47,000 reported security incidents and 621 con!rmed data breaches from the past year
Breaches affected !nancial organizations
Breaches occurred in retail environments and restaurants
Network intrusions involved manufacturing, transportation, and utilities
Network intrusions hit information and professional services !rms
Breaches impacted larger organizations
27 different countries are represented
Industries Impacted Most
Presented by: wwt.com
4
Source: 2013 Data Breach Investigations Report
92% OUTSIDERS
14% INSIDERS
1% BUSINESS PARTNERS
7% MULTIPLE PARTIES
19% STATE-AFFILIATED ACTORS
Read the Full Report from Verizon
Who Are the Perpetrators?
Presented by: wwt.com
5
Source: 2013 Data Breach Investigations Report
Used some form of hacking Network intrusions exploited
weak or stolen credentials
The proportion of breaches incorporating social tactics like phishing was FOUR TIMES HIGHER in 2012.
Incorporated malware
Involved physical attacks
Leveraged social tactics
Resulted from privilege misuse and abuse
Read the Full Report from Verizon
Presented by: wwt.com
How Do Breaches Occur?
6
Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon
Presented by: wwt.com
Top 10 Threat Actions for All Companies
See the top 20 threat actions broken down by company size in the full report.
7
Source: 2013 Data Breach Investigations Report
While it may be difficult to detect, positively identify, and respond to an intrusion within seconds or minutes, our ability to do so should ostensibly increase the longer they poke around our internal networks. But unfortunately, we’re not really seeing that improvement.
Figure 42: Percent of breaches that remain undiscovered for months or more
Read the Full Report from Verizon
Presented by: wwt.com
We’re Not Seeing Improvement
8
Source: 2013 Data Breach Investigations Report
Get the full report and learn more about: Mobile device threats
Most common motives behind the threats
Most common abusers – this may surprise you
What can your organization do
1.
2.
3.
4.
Read the Full Report from Verizon
Presented by: wwt.com