Light Reading
Using its annual Data Breach Investigative Report, Verizon tells 18 different industries what they most need to fear - and protect against.

Verizon Offers Industry-Specific Security Advice

Carol Wilson
4/22/2014
50%
50%

Seven years into publishing its annual analysis of data breach information, Verizon is taking a new approach, combining big data analysis with 10 years of data breach records to produce information specific industries can use to make their networks safer. (See Verizon DBIR Focuses Security by Industry.)

The 2014 Data Breach Investigations Report, known as the DBIR, goes beyond what past reports have delivered, says Verizon Enterprise Solutions 's Marc Spitler, senior analyst and DBIR co-author, to give enterprises more information on which they can act. After analyzing 63,000 incidents and 1,600 confirmed data breaches, Verizon determined that 90% of these fall into one of nine incident patterns. (By the way, you can download a copy of the report here.)

"These incidents patterns are analyzed, and they are mapped to particular industries, because we believe that will make it more actionable to those industries," Spitler says. "We think this is the proper evolution of what we are doing because people want more analysis and more advice on what to do."

By focusing on the type of incidents that most often affect their specific industry segment, enterprises can make more efficient use of the information Verizon is providing. That's particularly important because most industries are hit harder by a limited number of attack types, Spitler says.

What Verizon found is that most industries face the greatest threat from only three of the nine data threat patterns. Those patterns are:

  • Crimeware: malware intended to gain control of systems
  • Insider/privilege misuse
  • Physical theft/loss
  • Cyber-espionage
  • Denial-of-service attacks
  • Web app attacks
  • Point-of-sale intrusions
  • Payment card skimmers
  • Miscellaneous errors such as directing email to the wrong person

That's not to say the 2014 DBIR isn't full of its usual juicy tidbits about trends in cybercrime, because it is. For example, cyber-espionage is up, with the number of incidents reported totaling three times what was reported in 2013, although that is due in part to a greater data set. Many data breaches today happen stealthily and can take a long time to identify, leading to greater damage.

For the first time, the Verizon DBIR chose to address DDOS attacks and found these are getting stronger every year. DDOS attacks compromise network resources and can be either a distraction to the real data breach or an intended disruption of business. Financial services, retail, professional, information, and public sector enterprises all count DDOS attacks among their main threats.

The number one way of getting information remains use of stolen or hacked passwords, and DBIR authors say that makes a strong case for two-factor authentication.

Interestingly, retail point-of-sale attacks, which have been in the news of late, are actually on the wane in terms of volume, the DBIR notes.

Verizon issues its annual DBIR in part to highlight its own Verizon Managed Security Services which delivers, among many other things, two-factor authentication capabilities.

— Carol Wilson, Editor-at-Large, Light Reading

(2)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
Carol Wilson
50%
50%
Carol Wilson,
User Rank: Blogger
4/22/2014 | 3:22:35 PM
Re: Social Engineering
One of the DBIR's findings this year is that many data breaches go unnoticed for a substantial period of time. 

Certainly that was the case with many of the retail breaches this year, like the Target and Lord&Taylor incidents. Information gathering can be done over a long period of time, which means the impact of the breach is much greater. 

That puts a premium on not only trying to prevent breaches but on identifying them more quickly, which I think depends more on the ongoing analysis and tracking of LAN and WAN activity. 
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
4/22/2014 | 3:18:32 PM
Social Engineering
Getting stolen or hacked passwords probably comes from phishing attempts. It would seem, in my estimation, one of the easiest ways to procure authentication information. 

Social engineering is a bit different in that oftentimes a user doesn't realize they have been hacked for a long time. This type of intrusion can go unnoticed for a lengthy amount of time, and can reap a treasure trove of information for malicious actors. 
Educational Resources
sponsor supplied content
Educational Resources Archive
Flash Poll
LRTV Huawei Video Resource Center
Sales Director of INIT on Plug & Play Switch Devices

9|19|14   |   3:21   |   (0) comments


INIT Italy uses both the Huawei S5700 and S7700 series switches for the campus LAN environment. Sales Director Andrea Curti says their company chose these Huawei devices over others because of their performance, flexible scalability and plug-and-play features.
LRTV Huawei Video Resource Center
Saudi Arabia Upgrades Vocational Training System

9|19|14   |   3:31   |   (0) comments


The Technical and Vocational Training Corporation (TVTC) has 100,000 students, 150 government-owned institutions and oversees 1000 private institutes. The CIO of TVTC explains that Huawei devices have allowed them to manage multiple datacenters using just one software program, scientifically tracking the progress of students and teachers, saving them millions.
LRTV Huawei Video Resource Center
Huawei's Media Solutions Are Here to Stay

9|19|14   |   4:35   |   (0) comments


The current media revolution requires rapid upgrades in technology. New formats (HD, 3D, 4K etc.) and the subsequent explosion of file sizes demand sophisticated network and storage architecture. Social media and the multiple distribution channels require a robust asset management system. Gartner analyst Venecia Liu speaks about the current technological trends in ...
LRTV Huawei Video Resource Center
Microgenesis on Huawei's Switches

9|19|14   |   3:57   |   (0) comments


Microgenesis is a solutions and system integrator company in the Philippines whose areas of expertise include data centers, networking and security products. In this video, Executive Director Jeffrey Choa talks to us about his customers needs and they benefit from using Huawei switches.
LRTV Huawei Video Resource Center
Network Solutions Help the Philippines Jump Ahead

9|17|14   |   2:59   |   (0) comments


In the past, the Philippines has under-invested in technology. Now, the CEO of Softshell talks about how Huawei products help the Philippines jump ahead as the economy improves.
LRTV Huawei Video Resource Center
VCS Observation for Safer Cities in the Netherlands

9|17|14   |   5:20   |   (0) comments


Holland's VCS Observation has been operating for 22 years. Its main goal is to get cities safer. CEO Wim van Deijzen tells us some of the challenges his company faces and how Huawei is helping to overcome these challenges.
LRTV Huawei Video Resource Center
A Conversation With Serbia's Ministry of Interior

9|17|14   |   4:38   |   (0) comments


At HCC 2014, the Assistant Minister of the Ministry of Interior of the Republic of Serbia talks to us about his projects and corporation with Huawei. Solutions like Safe City and E-Government and services like cloud computing are just some of the areas his department is interested in.
LRTV Huawei Video Resource Center
IHS Analyst Discusses eLTE at CCW 2014

9|10|14   |   7:09   |   (0) comments


Thomas Lynch, associate director of critical communications at IHS Technology, talks about broadband in critical communications.
LRTV Huawei Video Resource Center
TCAA on Huawei eLTE: A Broadband Solution for Mission-Critical Communications

9|10|14   |   2:29   |   (0) comments


At CCW2014 in Singapore, the TCCA's Phil Kidner talks about the importance of broadband data for critical communications.
LRTV Custom TV
Spotlight on Cisco: SDN for Optical Networks

9|8|14   |   9:27   |   (0) comments


Cisco's Greg Nehib talks OpenFlow and more on the 'Software-Defined Networking for Optical Networks' panel at the Big Telecom Event in June 2014.
LRTV Custom TV
Cisco's Evolved Programmable Network (EPN)

9|8|14   |   4:05   |   (0) comments


A look at the various demos Cisco showed at Light Reading's Big Telecom Event highlighting Cisco's EPN innovation and how SDN and NFV technologies are enabling a variety of new services.
LRTV Huawei Video Resource Center
The Future of Ultra-Broadband, With Kevin Kelly (UBBF2014)

9|5|14   |   1:13   |   (1) comment


If you think the technological changes we've seen up to now are astounding, just wait until you see what the future has in store. Discuss upcoming breakthroughs with Kevin Kelly, Founding Executive Editor of Wired Magazine, at the Huawei Ultra-Broadband Forum on September 24.
Upcoming Live Events
October 29, 2014, New York City
November 6, 2014, Santa Clara
November 11, 2014, Atlanta, GA
December 2, 2014, New York City
December 3, 2014, New York City
December 9-10, 2014, Reykjavik, Iceland
June 9-10, 2015, Chicago, IL
Infographics
A survey conducted by Vasona Networks suggests that 72% of mobile users expect good performance all the time, and they'll blame the network operator when it's not up to par.
Today's Cartoon
Vacation Special Caption Competition Click Here
Latest Comment
Hot Topics
Photos: Qualcomm Takes Over San Francisco
Sarah Reedy, Senior Editor, 9/19/2014
Exclusive: Microwave Maven Exalt Is Cooked
Dan Jones, Mobile Editor, 9/22/2014
NFV & The Data Center: Top 10 Takeaways
Sarah Reedy, Senior Editor, 9/18/2014
EMC Mulls Merger With HP or Dell – Reports
Mitch Wagner, West Coast Bureau Chief, Light Reading, 9/22/2014
Pics: LR's Women in Telecom Breakfast
Sarah Reedy, Senior Editor, 9/16/2014
Like Us on Facebook
Twitter Feed