Light Reading

Verizon Offers Industry-Specific Security Advice

Carol Wilson
4/22/2014
50%
50%

Seven years into publishing its annual analysis of data breach information, Verizon is taking a new approach, combining big data analysis with 10 years of data breach records to produce information specific industries can use to make their networks safer. (See Verizon DBIR Focuses Security by Industry.)

The 2014 Data Breach Investigations Report, known as the DBIR, goes beyond what past reports have delivered, says Verizon Enterprise Solutions 's Marc Spitler, senior analyst and DBIR co-author, to give enterprises more information on which they can act. After analyzing 63,000 incidents and 1,600 confirmed data breaches, Verizon determined that 90% of these fall into one of nine incident patterns. (By the way, you can download a copy of the report here.)

"These incidents patterns are analyzed, and they are mapped to particular industries, because we believe that will make it more actionable to those industries," Spitler says. "We think this is the proper evolution of what we are doing because people want more analysis and more advice on what to do."

By focusing on the type of incidents that most often affect their specific industry segment, enterprises can make more efficient use of the information Verizon is providing. That's particularly important because most industries are hit harder by a limited number of attack types, Spitler says.

What Verizon found is that most industries face the greatest threat from only three of the nine data threat patterns. Those patterns are:

  • Crimeware: malware intended to gain control of systems
  • Insider/privilege misuse
  • Physical theft/loss
  • Cyber-espionage
  • Denial-of-service attacks
  • Web app attacks
  • Point-of-sale intrusions
  • Payment card skimmers
  • Miscellaneous errors such as directing email to the wrong person

That's not to say the 2014 DBIR isn't full of its usual juicy tidbits about trends in cybercrime, because it is. For example, cyber-espionage is up, with the number of incidents reported totaling three times what was reported in 2013, although that is due in part to a greater data set. Many data breaches today happen stealthily and can take a long time to identify, leading to greater damage.

For the first time, the Verizon DBIR chose to address DDOS attacks and found these are getting stronger every year. DDOS attacks compromise network resources and can be either a distraction to the real data breach or an intended disruption of business. Financial services, retail, professional, information, and public sector enterprises all count DDOS attacks among their main threats.

The number one way of getting information remains use of stolen or hacked passwords, and DBIR authors say that makes a strong case for two-factor authentication.

Interestingly, retail point-of-sale attacks, which have been in the news of late, are actually on the wane in terms of volume, the DBIR notes.

Verizon issues its annual DBIR in part to highlight its own Verizon Managed Security Services which delivers, among many other things, two-factor authentication capabilities.

— Carol Wilson, Editor-at-Large, Light Reading

(2)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Carol Wilson
50%
50%
Carol Wilson,
User Rank: Blogger
4/22/2014 | 3:22:35 PM
Re: Social Engineering
One of the DBIR's findings this year is that many data breaches go unnoticed for a substantial period of time. 

Certainly that was the case with many of the retail breaches this year, like the Target and Lord&Taylor incidents. Information gathering can be done over a long period of time, which means the impact of the breach is much greater. 

That puts a premium on not only trying to prevent breaches but on identifying them more quickly, which I think depends more on the ongoing analysis and tracking of LAN and WAN activity. 
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
4/22/2014 | 3:18:32 PM
Social Engineering
Getting stolen or hacked passwords probably comes from phishing attempts. It would seem, in my estimation, one of the easiest ways to procure authentication information. 

Social engineering is a bit different in that oftentimes a user doesn't realize they have been hacked for a long time. This type of intrusion can go unnoticed for a lengthy amount of time, and can reap a treasure trove of information for malicious actors. 
Educational Resources
sponsor supplied content
Educational Resources Archive
Flash Poll
From The Founder
Anshul Sadana answers questions from Steve Saunders, Light Reading's founder and CEO, about Arista's CloudVision, a global cloud network controller for workload orchestration and workflow automation delivering a turnkey solution for cloud networking.
Live Streaming Video
CLOUD / MANAGED SERVICES: Prepping Ethernet for the Cloud
Moderator: Ray LeMaistre Panelists: Jeremy Bye, Leonard Sheahan
LRTV Custom TV
End-User or Enterprise Benefits to the New IP

7|30|15   |   04:27   |   (1) comment


Andrew Coward discusses what the New IP means to end users or enterprise customers. He explains compelling reasons, including how every customer can get their own network, from the transformation to the New IP.
LRTV Custom TV
Network Visibility & the New IP

7|30|15   |   02:23   |   (0) comments


Mukund Srigopal provides an explanation of what network visibility is and how it is essential as service providers transition to the New IP. In addition, the importance of the network packet broker is discussed.
Between the CEOs
Video Exclusive With Basil Alwan, Alcatel-Lucent

7|24|15   |   26:44   |   (5) comments


Basil Alwan, President of IP Routing & Transport at Alcatel-Lucent, discusses virtualization, cultural challenges, the capex crunch and more with Light Reading founder and CEO Steve Saunders.
LRTV Custom TV
VDF: Enable the Financial With Mobile Money

7|20|15   |   06:53   |   (0) comments


Ian Ravenscroft discusses how operators can expand to occupy the entire digital services value chain through service innovation.
LRTV Custom TV
Telefónica on OSS Transformation

7|20|15   |   06:01   |   (0) comments


Jose Gonzales discusses the details of Telefónica's operation transformation program.
LRTV Custom TV
Judi Achmadi on Huawei's Cloud Storage Solution

7|20|15   |   03:33   |   (0) comments


Judi discusses the key business goals of TelekomSigma's public cloud service and how Huawei's solution helps them address challenges.
LRTV Custom TV
KPN Enlightening Digital Business & IT Transformation

7|20|15   |   06:19   |   (0) comments


Rob de Beer discusses the changes that operators need to make with service innovation now coming from the Internet world.
LRTV Custom TV
Stratus Telco-Grade Cloud Solutions & NFV

7|20|15   |   07:34   |   (0) comments


Ali Kafel from Stratus Technologies addresses high-availability concerns within the telco industry with a solution that enables telcos to provide high-availability and stateful fault-tolerance using a software-based approach.
LRTV Documentaries
The Six Million Dollar Business Man

7|20|15   |   01:52   |   (0) comments


Steve Saunders, publisher. A man barely alive after an acquisition malfunction imploded the company he founded. Gentlemen, we can rebuild Light Reading. Better, faster, stronger.
Between the CEOs
CEO Chat With Anukool Lakhina, Guavus

7|20|15   |   38:51   |   (1) comment


Guavus CEO Anukool Lakhina talks to Light Reading founder and CEO Steve Saunders about the role of operational analytics in the communications services and networking sectors, particularly in relation to IoT.
LRTV Custom TV
IBM's Flash Storage With Intel QuickAssist

7|20|15   |   03:18   |   (0) comments


Intel's Bev Crair and IBM's Eric Herzog discuss how IBM's V9000 Flash Storage System has helped customers around the world. Featuring real-time compression powered by Intel QuickAssist Technology, the V9000 is a next-gen flash storage solution.
LRTV Huawei Video Resource Center
Thailand's AIS: Transforming to an FMC Operator

7|17|15   |   4:53   |   (0) comments


Saran Phaloprakarn, Senior VP of Fixed Broadband Business Management of Thailand's AIS, was a keynote speaker at the first Asia-Pacific Ultra Broadband Summit in Bangkok. In this video, he talks to Heavy Reading about transforming into an FMC (FBB+MBB+Content) operator.
Upcoming Live Events
September 16-17, 2015, The Westin Galleria Dallas, Dallas, TX
September 16, 2015, The Westin Galleria Dallas, Dallas, TX
September 16, 2015, The Westin Galleria Dallas, Dallas, TX
September 29-30, 2015, The Westin Grand Müchen, Munich, Germany
October 14-15, 2015, New Orleans Ernest N. Morial Convention Center, New Orleans, LA
November 5, 2015, Hilton Santa Clara, Santa Clara, CA
November 17, 2015, Santa Clara, California
December 1, 2015, The Westin Times Square, New York City
All Upcoming Live Events
Infographics
Network operators start seeing savings from NFV in the first year, according to a study by Affirmed Networks and ACG.
Hot Topics
Robbins Succeeds Chambers as Cisco Changes CEOs
Mitch Wagner, West Coast Bureau Chief, Light Reading, 7/27/2015
Cable Feuds With Senate Dems Over STBs
Alan Breznick, Cable/Video Practice Leader, 7/31/2015
RJio to Launch Its Own 4G Devices Brand
Gagandeep Kaur, Contributing Editor, 7/27/2015
Easing the Tech Pains for the Homeless
Carol Wilson, Editor-at-large, 7/28/2015
Like Us on Facebook
Twitter Feed
September 22, 2015
Media Begins With “Me”
Webinar Archive
BETWEEN THE CEOs - Executive Interviews
Basil Alwan, President of IP Routing & Transport at Alcatel-Lucent, discusses virtualization, cultural challenges, the capex crunch and more with Light Reading founder and CEO Steve Saunders.
Guavus CEO Anukool Lakhina talks to Light Reading founder and CEO Steve Saunders about the role of operational analytics in the communications services and networking sectors, particularly in relation to IoT.
Cats with Phones
Comes With Free Phone Stand Click Here
Who says cats don't have any skills?