& cplSiteName &

Verizon Offers Industry-Specific Security Advice

Carol Wilson
4/22/2014
50%
50%

Seven years into publishing its annual analysis of data breach information, Verizon is taking a new approach, combining big data analysis with 10 years of data breach records to produce information specific industries can use to make their networks safer. (See Verizon DBIR Focuses Security by Industry.)

The 2014 Data Breach Investigations Report, known as the DBIR, goes beyond what past reports have delivered, says Verizon Enterprise Solutions 's Marc Spitler, senior analyst and DBIR co-author, to give enterprises more information on which they can act. After analyzing 63,000 incidents and 1,600 confirmed data breaches, Verizon determined that 90% of these fall into one of nine incident patterns. (By the way, you can download a copy of the report here.)

"These incidents patterns are analyzed, and they are mapped to particular industries, because we believe that will make it more actionable to those industries," Spitler says. "We think this is the proper evolution of what we are doing because people want more analysis and more advice on what to do."

By focusing on the type of incidents that most often affect their specific industry segment, enterprises can make more efficient use of the information Verizon is providing. That's particularly important because most industries are hit harder by a limited number of attack types, Spitler says.

What Verizon found is that most industries face the greatest threat from only three of the nine data threat patterns. Those patterns are:

  • Crimeware: malware intended to gain control of systems
  • Insider/privilege misuse
  • Physical theft/loss
  • Cyber-espionage
  • Denial-of-service attacks
  • Web app attacks
  • Point-of-sale intrusions
  • Payment card skimmers
  • Miscellaneous errors such as directing email to the wrong person

That's not to say the 2014 DBIR isn't full of its usual juicy tidbits about trends in cybercrime, because it is. For example, cyber-espionage is up, with the number of incidents reported totaling three times what was reported in 2013, although that is due in part to a greater data set. Many data breaches today happen stealthily and can take a long time to identify, leading to greater damage.

For the first time, the Verizon DBIR chose to address DDOS attacks and found these are getting stronger every year. DDOS attacks compromise network resources and can be either a distraction to the real data breach or an intended disruption of business. Financial services, retail, professional, information, and public sector enterprises all count DDOS attacks among their main threats.

The number one way of getting information remains use of stolen or hacked passwords, and DBIR authors say that makes a strong case for two-factor authentication.

Interestingly, retail point-of-sale attacks, which have been in the news of late, are actually on the wane in terms of volume, the DBIR notes.

Verizon issues its annual DBIR in part to highlight its own Verizon Managed Security Services which delivers, among many other things, two-factor authentication capabilities.

— Carol Wilson, Editor-at-Large, Light Reading

(2)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Carol Wilson
50%
50%
Carol Wilson,
User Rank: Blogger
4/22/2014 | 3:22:35 PM
Re: Social Engineering
One of the DBIR's findings this year is that many data breaches go unnoticed for a substantial period of time. 

Certainly that was the case with many of the retail breaches this year, like the Target and Lord&Taylor incidents. Information gathering can be done over a long period of time, which means the impact of the breach is much greater. 

That puts a premium on not only trying to prevent breaches but on identifying them more quickly, which I think depends more on the ongoing analysis and tracking of LAN and WAN activity. 
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
4/22/2014 | 3:18:32 PM
Social Engineering
Getting stolen or hacked passwords probably comes from phishing attempts. It would seem, in my estimation, one of the easiest ways to procure authentication information. 

Social engineering is a bit different in that oftentimes a user doesn't realize they have been hacked for a long time. This type of intrusion can go unnoticed for a lengthy amount of time, and can reap a treasure trove of information for malicious actors. 
From The Founder
Cisco's Conrad Clemson, recently promoted to head up the company's Service Provider Apps & Platforms developments, talks to Light Reading's Founder and CEO Steve Saunders about how he's bringing cloud video, mobile and virtualization together to empower network operators.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Custom TV
4.5G Evolution: Peter Zhou on Advanced MIMO Technologies & 5G Business Prep

2|25|17   |     |   (0) comments


In the process of service transformation, operators need to catch three major opportunities and start deploying in 4.5G networks, such as video, household broadband access and digital transformation of vertical industries. 5G is coming. Operators don't need to wait for it to happen but should progressively deploy 4.5G networks by introducing 5G-oriented ...
LRTV Custom TV
What WTTX Can Deliver

2|23|17   |     |   (0) comments


Mohamed Madkour explains the benefits of WTTX while Dimitris Mavrakis discusses the challenges of delivering home broadband access.
LRTV Custom TV
Huawei on Mobile Broadband

2|23|17   |     |   (0) comments


Mohamed Madkour shares his vision on MBB for the next three years.
LRTV Custom TV
Analysys Mason Talks About the Future of Digital Operations

2|23|17   |     |   (0) comments


The future of digital operations has three key aspects: 1. Highly automated operations for both service and network; 2. Highly converged BSS/OSS for business and resources; 3. Highly merged management and control for real-time cloud native operations.
LRTV Interviews
Software Trends in the Telecom Sector

2|23|17   |   03:40   |   (0) comments


Heavy Reading senior analyst James Crawshaw talks with Telecoms.com Editorial Director Scott Bicheno about trends and developments in the telecoms software sector and what to expect at MWC 2017.
LRTV Custom TV
Huawei's Pre-MWC Analyst Briefing 2017 Highlights

2|22|17   |     |   (0) comments


Huawei shares its vision for this year's MWC.
LRTV Interviews
MWC17: 5G, Cloud RAN & More

2|21|17   |   04:35   |   (0) comments


Ovum Senior Analyst Julian Bright talks to Scott Bicheno from Telecoms.com about all things MWC, including Cloud RAN, Huawei's pitch to the industry and the road to 5G.
LRTV Interviews
MWC 2017's Key 2-Letter Terms

2|20|17   |   08:29   |   (1) comment


5G, AI, VR... these are just some of the two-letter terms that will dominate show-floor chat at MWC 2017 in Barcelona, according to these two blow-hards (a.k.a. Scott Bicheno of Telecoms.com and Light Reading's Ray Le Maistre). And then there's PB...
LRTV Interviews
Key Trends for Mobile Operators in Developing Markets

2|20|17   |   06:37   |   (0) comments


Ovum's Matthew Reed talks to Scott Bicheno from Telecoms.com about the challenges and opportunities facing mobile operators in the developing markets of Africa and the Middle East.
LRTV Documentaries
YouTube Takes on Facebook Live-Streaming

2|17|17   |     |   (0) comments


Popular 'YouTubers' will be the first to get the new service on their smartphones. You have been warned.
LRTV Custom TV
Open Source NFV/SDN Automation

2|17|17   |   05:54   |   (0) comments


AT&T ECOMP (Enhanced Control, Orchestration, Management and Policy) code is transitioning into the Linux Foundation for placement into open source. In this video, Carol Wilson provides an update on the maturation of open source ECOMP and meets with industry leaders from AT&T, Bell Canada, Orange, Linux Foundation and Amdocs to discuss what this means for the ...
LRTV Documentaries
Uber & NASA Collaborate on Flying Car Project

2|16|17   |     |   (0) comments


Is Uber for real? Well, it's hired NASA engineer Mark Moore to lead the project, and he wouldn't come cheap.
Upcoming Live Events
March 21-22, 2017, The Curtis Hotel, Denver, CO
March 22, 2017, The Curtis Hotel, Denver, CO
March 22, 2017, The Curtis Hotel, Denver, CO
May 15-17, 2017, Austin Convention Center, Austin, TX
May 15, 2017, Austin Convention Center - Austin, TX
June 6, 2017, The Joule Hotel, Dallas, TX
All Upcoming Live Events
Infographics
With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
Hot Topics
Uber's HR Nightmare: Company Investigates Sexual Harassment Claims
Sarah Thomas, Director, Women in Comms, 2/21/2017
Broadband Has a Problem on the Pole
Mari Silbey, Senior Editor, Cable/Video, 2/21/2017
Verizon to Start Fixed 5G Customer Trials in April
Dan Jones, Mobile Editor, 2/22/2017
Sprint to Go Gigabit Crazy at MWC!
Dan Jones, Mobile Editor, 2/22/2017
MANO Marriage: ECOMP, Open-O Converge as ONAP
Carol Wilson, Editor-at-large, 2/23/2017
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Light Reading founder and CEO Steve Saunders chats with Sportlogiq CEO Craig Buntin about sports data analysis.
Eyal Waldman, CEO of Mellanox Technologies, speaks to Steve Saunders, CEO of Light Reading, for an exclusive interview about the 100 GB cable challenge, cybersecurity and much more.
Animals with Phones
No One Likes This Click Here
Take a hint!
Live Digital Audio

Playing it safe can only get you so far. Sometimes the biggest bets have the biggest payouts, and that is true in your career as well. For this radio show, Caroline Chan, general manager of the 5G Infrastructure Division of the Network Platform Group at Intel, will share her own personal story of how she successfully took big bets to build a successful career, as well as offer advice on how you can do the same. We’ll cover everything from how to overcome fear and manage risk, how to be prepared for where technology is going in the future and how to structure your career in a way to ensure you keep progressing. Chan, a seasoned telecom veteran and effective risk taker herself, will also leave plenty of time to answer all your questions live on the air.