Light Reading
Using its annual Data Breach Investigative Report, Verizon tells 18 different industries what they most need to fear - and protect against.

Verizon Offers Industry-Specific Security Advice

Carol Wilson
4/22/2014
50%
50%

Seven years into publishing its annual analysis of data breach information, Verizon is taking a new approach, combining big data analysis with 10 years of data breach records to produce information specific industries can use to make their networks safer. (See Verizon DBIR Focuses Security by Industry.)

The 2014 Data Breach Investigations Report, known as the DBIR, goes beyond what past reports have delivered, says Verizon Enterprise Solutions 's Marc Spitler, senior analyst and DBIR co-author, to give enterprises more information on which they can act. After analyzing 63,000 incidents and 1,600 confirmed data breaches, Verizon determined that 90% of these fall into one of nine incident patterns. (By the way, you can download a copy of the report here.)

"These incidents patterns are analyzed, and they are mapped to particular industries, because we believe that will make it more actionable to those industries," Spitler says. "We think this is the proper evolution of what we are doing because people want more analysis and more advice on what to do."

By focusing on the type of incidents that most often affect their specific industry segment, enterprises can make more efficient use of the information Verizon is providing. That's particularly important because most industries are hit harder by a limited number of attack types, Spitler says.

What Verizon found is that most industries face the greatest threat from only three of the nine data threat patterns. Those patterns are:

  • Crimeware: malware intended to gain control of systems
  • Insider/privilege misuse
  • Physical theft/loss
  • Cyber-espionage
  • Denial-of-service attacks
  • Web app attacks
  • Point-of-sale intrusions
  • Payment card skimmers
  • Miscellaneous errors such as directing email to the wrong person

That's not to say the 2014 DBIR isn't full of its usual juicy tidbits about trends in cybercrime, because it is. For example, cyber-espionage is up, with the number of incidents reported totaling three times what was reported in 2013, although that is due in part to a greater data set. Many data breaches today happen stealthily and can take a long time to identify, leading to greater damage.

For the first time, the Verizon DBIR chose to address DDOS attacks and found these are getting stronger every year. DDOS attacks compromise network resources and can be either a distraction to the real data breach or an intended disruption of business. Financial services, retail, professional, information, and public sector enterprises all count DDOS attacks among their main threats.

The number one way of getting information remains use of stolen or hacked passwords, and DBIR authors say that makes a strong case for two-factor authentication.

Interestingly, retail point-of-sale attacks, which have been in the news of late, are actually on the wane in terms of volume, the DBIR notes.

Verizon issues its annual DBIR in part to highlight its own Verizon Managed Security Services which delivers, among many other things, two-factor authentication capabilities.

— Carol Wilson, Editor-at-Large, Light Reading

(2)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
Carol Wilson
50%
50%
Carol Wilson,
User Rank: Blogger
4/22/2014 | 3:22:35 PM
Re: Social Engineering
One of the DBIR's findings this year is that many data breaches go unnoticed for a substantial period of time. 

Certainly that was the case with many of the retail breaches this year, like the Target and Lord&Taylor incidents. Information gathering can be done over a long period of time, which means the impact of the breach is much greater. 

That puts a premium on not only trying to prevent breaches but on identifying them more quickly, which I think depends more on the ongoing analysis and tracking of LAN and WAN activity. 
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
4/22/2014 | 3:18:32 PM
Social Engineering
Getting stolen or hacked passwords probably comes from phishing attempts. It would seem, in my estimation, one of the easiest ways to procure authentication information. 

Social engineering is a bit different in that oftentimes a user doesn't realize they have been hacked for a long time. This type of intrusion can go unnoticed for a lengthy amount of time, and can reap a treasure trove of information for malicious actors. 
Educational Resources
sponsor supplied content
Educational Resources Archive
Flash Poll
From The Founder
It's clear to me that the communications industry is divided into two types of people, and only one is living in the real world.
LRTV Huawei Video Resource Center
Dr. Dong Sun Talks About Carriers' Digital Transformation & Huawei’s Telco OS

1|29|15   |   6:28   |   (0) comments


Dr. Dong Sun, Chief Architect of Digital Transformation Solutions at Huawei, discusses how telecom operators can become digital ecosystem enablers and deliver optimal user experiences that are in real-time, on-demand, all-online, DIY and social (ROADS).
LRTV Huawei Video Resource Center
Huawei's Chief Network Architect Talks about Network Experience & Operators’ Strategies

1|29|15   |   3:39   |   (0) comments


In the digital age, network experience has become the primary productivity especially for telecom operators. In this video, Wenshuan Dang, Huawei’s Chief Network Architect, discusses how carriers can tackle the challenge of infrastructure complexity in order to enhance business agility and improve user experience.
LRTV Documentaries
The Rise of Virtual CPE

1|27|15   |   01:38   |   (4) comments


As NFV strategies evolve from tests and trials to production telco networks, expect to hear a lot about virtual CPE (customer premises equipment) rollouts during 2015.
LRTV Documentaries
Optical Is Hot in 2015

1|23|15   |   01:56   |   (2) comments


Optical comms technology underpins the whole communications sector and there are some really hot trends set for 2015.
LRTV Custom TV
Policy Control in the Fast Lane

1|22|15   |   2:57   |   (0) comments


What's making policy control strategic in 2015 and beyond? Amdocs talks with Heavy Reading's Graham Finnie about the key factors driving change in the data services landscape. Find out what his policy management research reveals about the road ahead for policy control – and sign up for
LRTV Documentaries
Highlights From the 2020 Vision Executive Summit

1|21|15   |   4:33   |   (2) comments


In December 2014, Light Reading brought together telecom executives in Reykjavik, Iceland to discuss their vision for high-capacity networks through the end of the decade. The intimate, interactive meeting was set against the backdrop of Iceland's spectacular natural beauty. As one of the event's founding sponsors, Cisco's Doug Webster shared his company's ...
LRTV Huawei Video Resource Center
Huawei Pay-TV Partner Harmonic, Helping Carriers Accelerate 4K Video Deployment with Huawei

1|20|15   |   5:42   |   (1) comment


At IBC, Peter Alexander, Senior Vice President & CMO at Harmonic, speaks about the growing interest in pay-TV service and its branching into multiple devices.
LRTV Huawei Video Resource Center
Sony Marketing Director Olivier Bovis Discusses the Outlook for 4K and Cooperation With Huawei at IBC 2014

1|20|15   |   6:50   |   (0) comments


At IBC, Olivier Bovis, Marketing Director of Sony, speaks about the coming of the 4K era.
LRTV Huawei Video Resource Center
Huawei Pay-TV Partner Envivio, Helping Carriers Accelerate 4K Video Deployment

1|20|15   |   2:57   |   (0) comments


At IBC, Olivier Bovis, Marketing Director of Sony, speaks about the coming of the 4K era.
LRTV Huawei Video Resource Center
Pay-TV's Networked Future

1|20|15   |   6:29   |   (0) comments


At IBC, Jeff Heynen, Principal Analyst at Infonetics, speaks about the future of the pay-TV industry and its transition.
LRTV Huawei Video Resource Center
Jeff Heynen: Distributed Access Will Help MSOs Compete in the Future

1|20|15   |   2:26   |   (0) comments


At IBC, Jeff Heynen, Principal Analyst at Infonetics, speaks about moving to distributed access and the future trend of cable business.
LRTV Interviews
Cisco Talks Transformation

1|20|15   |   13:02   |   (0) comments


In December 2014, Steve Saunders sat down with Cisco VP of Products & Solutions Marketing Doug Webster at Light Reading's 2020 Vision executive summit in Reykjavik, Iceland. They spoke about Cisco's approach to network virtualization as well as how service providers can begin to monetize high-capacity networks through the end of the decade.
Upcoming Live Events
February 5, 2015, Washington, DC
February 19, 2015, The Fairmont San Jose, San Jose, CA
March 17, 2015, The Cable Center, Denver, CO
April 14, 2015, The Westin Times Square, New York City, NY
May 12, 2015, Grand Hyatt, Denver, CO
May 13-14, 2015, The Westin Peachtree, Atlanta, GA
June 8, 2015, Chicago, IL
June 9-10, 2015, Chicago, IL
June 9, 2015, Chicago, IL
September 9-10, 2015, The Westin Galleria Dallas, Dallas, TX
September 29-30, 2015, The Westin Grand Müchen, Munich, Germany
November 11-12, 2015, The Westin Peachtree Plaza, Atlanta, GA
December 1, 2015, The Westin Times Square, New York City
December 2-3, 2015, The Westin Times Square, New York City
Infographics
Hot Topics
Google Continues Gigabit Expansion
Jason Meyers, Senior Editor, Gigabit Cities/IoT, 1/27/2015
Cablevision's New WiFi Try – Freewheeling Enough?
Mari Silbey, Independent Technology Editor, 1/26/2015
LightSpeed Looks to Plug the Gigabit Gap
Jason Meyers, Senior Editor, Gigabit Cities/IoT, 1/23/2015
Overture Builds on NFV Foundation
Mitch Wagner, West Coast Bureau Chief, Light Reading, 1/27/2015
NTT DoCoMo Takes on Retail Broadband
Robert Clark, 1/29/2015
Like Us on Facebook
Twitter Feed
Webinar Archive
BETWEEN THE CEOs - Weekly Executive Interview
Join us live for Light Reading's interview with Jay Samit, the newly appointed CEO of publicly traded SeaChange International Inc. With a resume that includes Sony, EMI, Universal, Intel and Microsoft, Samit brings a reputation as an entrepreneur and a disruptor to his new role at the video solutions company. Hear what he has to say about the opportunities in video, as well as the outlook for cable, telco, OTT and mobile service providers.