Light Reading
Using its annual Data Breach Investigative Report, Verizon tells 18 different industries what they most need to fear - and protect against.

Verizon Offers Industry-Specific Security Advice

Carol Wilson
4/22/2014
50%
50%

Seven years into publishing its annual analysis of data breach information, Verizon is taking a new approach, combining big data analysis with 10 years of data breach records to produce information specific industries can use to make their networks safer. (See Verizon DBIR Focuses Security by Industry.)

The 2014 Data Breach Investigations Report, known as the DBIR, goes beyond what past reports have delivered, says Verizon Enterprise Solutions 's Marc Spitler, senior analyst and DBIR co-author, to give enterprises more information on which they can act. After analyzing 63,000 incidents and 1,600 confirmed data breaches, Verizon determined that 90% of these fall into one of nine incident patterns. (By the way, you can download a copy of the report here.)

"These incidents patterns are analyzed, and they are mapped to particular industries, because we believe that will make it more actionable to those industries," Spitler says. "We think this is the proper evolution of what we are doing because people want more analysis and more advice on what to do."

By focusing on the type of incidents that most often affect their specific industry segment, enterprises can make more efficient use of the information Verizon is providing. That's particularly important because most industries are hit harder by a limited number of attack types, Spitler says.

What Verizon found is that most industries face the greatest threat from only three of the nine data threat patterns. Those patterns are:

  • Crimeware: malware intended to gain control of systems
  • Insider/privilege misuse
  • Physical theft/loss
  • Cyber-espionage
  • Denial-of-service attacks
  • Web app attacks
  • Point-of-sale intrusions
  • Payment card skimmers
  • Miscellaneous errors such as directing email to the wrong person

That's not to say the 2014 DBIR isn't full of its usual juicy tidbits about trends in cybercrime, because it is. For example, cyber-espionage is up, with the number of incidents reported totaling three times what was reported in 2013, although that is due in part to a greater data set. Many data breaches today happen stealthily and can take a long time to identify, leading to greater damage.

For the first time, the Verizon DBIR chose to address DDOS attacks and found these are getting stronger every year. DDOS attacks compromise network resources and can be either a distraction to the real data breach or an intended disruption of business. Financial services, retail, professional, information, and public sector enterprises all count DDOS attacks among their main threats.

The number one way of getting information remains use of stolen or hacked passwords, and DBIR authors say that makes a strong case for two-factor authentication.

Interestingly, retail point-of-sale attacks, which have been in the news of late, are actually on the wane in terms of volume, the DBIR notes.

Verizon issues its annual DBIR in part to highlight its own Verizon Managed Security Services which delivers, among many other things, two-factor authentication capabilities.

— Carol Wilson, Editor-at-Large, Light Reading

(2)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
Carol Wilson
50%
50%
Carol Wilson,
User Rank: Blogger
4/22/2014 | 3:22:35 PM
Re: Social Engineering
One of the DBIR's findings this year is that many data breaches go unnoticed for a substantial period of time. 

Certainly that was the case with many of the retail breaches this year, like the Target and Lord&Taylor incidents. Information gathering can be done over a long period of time, which means the impact of the breach is much greater. 

That puts a premium on not only trying to prevent breaches but on identifying them more quickly, which I think depends more on the ongoing analysis and tracking of LAN and WAN activity. 
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
4/22/2014 | 3:18:32 PM
Social Engineering
Getting stolen or hacked passwords probably comes from phishing attempts. It would seem, in my estimation, one of the easiest ways to procure authentication information. 

Social engineering is a bit different in that oftentimes a user doesn't realize they have been hacked for a long time. This type of intrusion can go unnoticed for a lengthy amount of time, and can reap a treasure trove of information for malicious actors. 
Educational Resources
sponsor supplied content
Educational Resources Archive
Flash Poll
From The Founder
Is your network built on 'The Old IP,' or are you part of 'The New IP' revolution?
LRTV Documentaries
A Cultural Shift for an OTT World

9|26|14   |   01:41   |   (3) comments


Telcos need to embrace a new approach to partnerships if they are to generate extra revenues quickly and give customers what they want.
LRTV Documentaries
New Skills Needed as Telecom, IT Collide

9|26|14   |   4:07   |   (1) comment


As telecom and IT collide, new technologies are emerging, new skills are needed and new opportunities for women are arising.
UBB Forum News
Do IP Networks Need An Overhaul?

9|25|14   |   02:01   |   (0) comments


As traffic levels ramp, do IP networks need new technologies and topologies?
LRTV Documentaries
Sprint Wields Its Influence in the Valley

9|25|14   |   3:09   |   (10) comments


Anne-Louise Kardas, Sprint's connection to startups in the Valley, explains how telcos can be innovative and find new opportunities with partners.
LRTV Documentaries
SDN, NFV & The Future of XO's Network

9|25|14   |   3:47   |   (0) comments


XO Communications COO Don MacNeil explains how cloud, SDN and NFV are altering its network requirements as well as changing data centers of the future.
UBB Forum News
The OTT Conundrum

9|24|14   |   01:39   |   (0) comments


What is holding back prosperous partnerships between telcos and the OTT players?
LRTV Documentaries
Putting Broadband to Work

9|24|14   |   01:26   |   (0) comments


High-speed broadband network rollout is key to telco strategies, but it's what happens after the network is built that counts.
Light Reedy
Light Reading's Women in Telecom Recap

9|24|14   |   0:55   |   (4) comments


Our first Women in Telecom breakfast was a huge success, and we hope you'll join us in London for the next event on November 6.
UBB Forum News
Monetizing Ultra-Broadband

9|24|14   |   01:43   |   (2) comments


Ultra-broadband networks need to be built, with fiber-to-the-premises the ultimate goal, but they need to be monetized, too.
LRTV Huawei Video Resource Center
Sales Director of INIT on Plug & Play Switch Devices

9|19|14   |   3:21   |   (0) comments


INIT Italy uses both the Huawei S5700 and S7700 series switches for the campus LAN environment. Sales Director Andrea Curti says their company chose these Huawei devices over others because of their performance, flexible scalability and plug-and-play features.
LRTV Huawei Video Resource Center
Saudi Arabia Upgrades Vocational Training System

9|19|14   |   3:31   |   (0) comments


The Technical and Vocational Training Corporation (TVTC) has 100,000 students, 150 government-owned institutions and oversees 1000 private institutes. The CIO of TVTC explains that Huawei devices have allowed them to manage multiple datacenters using just one software program, scientifically tracking the progress of students and teachers, saving them millions.
LRTV Huawei Video Resource Center
Huawei's Media Solutions Are Here to Stay

9|19|14   |   4:35   |   (0) comments


The current media revolution requires rapid upgrades in technology. New formats (HD, 3D, 4K etc.) and the subsequent explosion of file sizes demand sophisticated network and storage architecture. Social media and the multiple distribution channels require a robust asset management system. Gartner analyst Venecia Liu speaks about the current technological trends in ...
Upcoming Live Events
October 29, 2014, New York City
November 6, 2014, Santa Clara
November 11, 2014, Atlanta, GA
December 2, 2014, New York City
December 3, 2014, New York City
December 9-10, 2014, Reykjavik, Iceland
June 9-10, 2015, Chicago, IL
Infographics
Half of the world's population will be connected to the Internet by 2017, but not just by smartphones and desktops.
Hot Topics
Facebook Pokes Around LTE Direct
Sarah Reedy, Senior Editor, 9/25/2014
Sprint Wields Its Influence in the Valley
Sarah Reedy, Senior Editor, 9/25/2014
Gigabit Nets Boost GDP, Says FTTH Council
Jason Meyers, Senior Editor, Utility Communications/IoT, 9/23/2014
US Ignite Cultivates Gigabit Apps
Jason Meyers, Senior Editor, Utility Communications/IoT, 9/25/2014
Like Us on Facebook
Twitter Feed