Light Reading

Verizon Offers Industry-Specific Security Advice

Carol Wilson
4/22/2014
50%
50%

Seven years into publishing its annual analysis of data breach information, Verizon is taking a new approach, combining big data analysis with 10 years of data breach records to produce information specific industries can use to make their networks safer. (See Verizon DBIR Focuses Security by Industry.)

The 2014 Data Breach Investigations Report, known as the DBIR, goes beyond what past reports have delivered, says Verizon Enterprise Solutions 's Marc Spitler, senior analyst and DBIR co-author, to give enterprises more information on which they can act. After analyzing 63,000 incidents and 1,600 confirmed data breaches, Verizon determined that 90% of these fall into one of nine incident patterns. (By the way, you can download a copy of the report here.)

"These incidents patterns are analyzed, and they are mapped to particular industries, because we believe that will make it more actionable to those industries," Spitler says. "We think this is the proper evolution of what we are doing because people want more analysis and more advice on what to do."

By focusing on the type of incidents that most often affect their specific industry segment, enterprises can make more efficient use of the information Verizon is providing. That's particularly important because most industries are hit harder by a limited number of attack types, Spitler says.

What Verizon found is that most industries face the greatest threat from only three of the nine data threat patterns. Those patterns are:

  • Crimeware: malware intended to gain control of systems
  • Insider/privilege misuse
  • Physical theft/loss
  • Cyber-espionage
  • Denial-of-service attacks
  • Web app attacks
  • Point-of-sale intrusions
  • Payment card skimmers
  • Miscellaneous errors such as directing email to the wrong person

That's not to say the 2014 DBIR isn't full of its usual juicy tidbits about trends in cybercrime, because it is. For example, cyber-espionage is up, with the number of incidents reported totaling three times what was reported in 2013, although that is due in part to a greater data set. Many data breaches today happen stealthily and can take a long time to identify, leading to greater damage.

For the first time, the Verizon DBIR chose to address DDOS attacks and found these are getting stronger every year. DDOS attacks compromise network resources and can be either a distraction to the real data breach or an intended disruption of business. Financial services, retail, professional, information, and public sector enterprises all count DDOS attacks among their main threats.

The number one way of getting information remains use of stolen or hacked passwords, and DBIR authors say that makes a strong case for two-factor authentication.

Interestingly, retail point-of-sale attacks, which have been in the news of late, are actually on the wane in terms of volume, the DBIR notes.

Verizon issues its annual DBIR in part to highlight its own Verizon Managed Security Services which delivers, among many other things, two-factor authentication capabilities.

— Carol Wilson, Editor-at-Large, Light Reading

(2)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Carol Wilson
50%
50%
Carol Wilson,
User Rank: Blogger
4/22/2014 | 3:22:35 PM
Re: Social Engineering
One of the DBIR's findings this year is that many data breaches go unnoticed for a substantial period of time. 

Certainly that was the case with many of the retail breaches this year, like the Target and Lord&Taylor incidents. Information gathering can be done over a long period of time, which means the impact of the breach is much greater. 

That puts a premium on not only trying to prevent breaches but on identifying them more quickly, which I think depends more on the ongoing analysis and tracking of LAN and WAN activity. 
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
4/22/2014 | 3:18:32 PM
Social Engineering
Getting stolen or hacked passwords probably comes from phishing attempts. It would seem, in my estimation, one of the easiest ways to procure authentication information. 

Social engineering is a bit different in that oftentimes a user doesn't realize they have been hacked for a long time. This type of intrusion can go unnoticed for a lengthy amount of time, and can reap a treasure trove of information for malicious actors. 
Educational Resources
sponsor supplied content
Educational Resources Archive
Flash Poll
From The Founder
Ericsson's Hyperscale Datacenter System (HDS) 8000, featuring Intel's Rack Scale Architecture, caused a stir when it was announced at MWC 2015. For more on this revolutionary product, join me on Thursday, April 30 at 12:00 p.m. EST for a Super Webinar event, A New Hardware Paradigm for the Telco Data Center.
LRTV Documentaries
Cox Eyes Cloud-Based Home Networks

4|27|15   |   05:30   |   (0) comments


Cox's Jeff Finkelstein explains how moving services to the cloud will let cable deliver services faster and eliminate constant hardware replacements.
LRTV Documentaries
CableLabs' Clarke Updates Cable Virtualization

4|23|15   |   05:41   |   (1) comment


Former BT exec now leading CableLabs' NFV and SDN efforts explains key role of open source and updates efforts to virtualize the home network.
LRTV Interviews
Ericsson's CTO Talks Transformation: Pt. II

4|23|15   |   08:19   |   (1) comment


In the second installment of an in-depth two-part interview, Ericsson's CTO Ulf Ewaldsson talks to Light Reading CEO and founder Steve Saunders about cultural change, network slicing and technology advances.
LRTV Interviews
Ericsson's CTO Talks Transformation: Pt. I

4|23|15   |   09:27   |   (3) comments


In the first installment of an in-depth two-part interview, Ericsson's CTO Ulf Ewaldsson talks to Light Reading CEO and founder Steve Saunders about the incredible transformation underway in the communications networking industry.
LRTV Documentaries
LTE Paves the Way for the 5G Revolution

4|20|15   |   4:20   |   (0) comments


Håkan Andersson, head of 5G product strategy of the Radio Business Unit at Ericsson, discusses the role of LTE, the US and other industry verticals in building a true 5G ecosystem.
LRTV Documentaries
The 3GPP's Road to 5G Standardization

4|17|15   |   4:43   |   (0) comments


Satoshi Nagata, chairman of the 3GPP's TSG-RAN group and a manager at NTT Docomo, explains the standardization process for 5G, as well as the biggest challenges and opportunities.
LRTV Documentaries
AlcaLu CTO Makes the Case for a New 5G Air Interface

4|16|15   |   3:54   |   (0) comments


Michael Peeters, CTO of wireless at Alcatel-Lucent, explains why 5G will require a new air interface to meet its diverse performance targets.
LRTV Documentaries
AlcaLu + Nokia: The New Uber-Vendor

4|15|15   |   2:42   |   (4) comments


Heavy Reading Senior Analyst Gabriel Brown discusses the technological and competitive opportunities and challenges if a merger between Alcatel-Lucent and Nokia comes to pass.
LRTV Huawei Video Resource Center
Huawei's Data Center Power Play

4|15|15   |   6:22   |   (0) comments


Huawei has developed industry-leading energy efficiency capabilities for its indoor and outdoor data center solutions, explains Dr. Fang Liangzhou, vice president of Huawei's Network Energy product Line.
LRTV Huawei Video Resource Center
Huawei’s Routers, Switches Get the Green Mark

4|15|15   |   2:02   |   (0) comments


TUV Rheinland's Frank Dudley explains how Huawei's routers and switches have been successfully tested by energy efficiency experts and have gained Green Mark Certification.
LRTV Documentaries
A Finn, a Frenchman & a Guy From New Jersey Walk Into a Merger...

4|15|15   |   3:17   |   (0) comments


Stop us if you've heard this one before... Light Reading CEO Founder & CEO Steve Saunders weighs in on the technical and cultural implications of a Nokia and Alcatel-Lucent merger.
LRTV Huawei Video Resource Center
Accounting for Better Solutions

4|10|15   |   02:31   |   (1) comment


Murad Yousuf, CTO at Saudi Arabia's Ministry of Finance (Dept. of Zakat & Income Tax), talks about the benefits of deploying router technology from Huawei.
Upcoming Live Events
May 6, 2015, Georgia World Congress, Atlanta, GA
May 12, 2015, Grand Hyatt, Denver, CO
May 13-14, 2015, The Westin Peachtree, Atlanta, GA
June 8, 2015, Chicago, IL
June 9-10, 2015, Chicago, IL
June 9, 2015, Chicago, IL
June 10, 2015, Chicago, IL
September 29-30, 2015, The Westin Grand Müchen, Munich, Germany
October 6, 2015, Westin Peachtree Plaza, Atlanta, GA
November 11-12, 2015, The Westin Peachtree Plaza, Atlanta, GA
All Upcoming Live Events
Infographics
In its latest survey covering network operators' plans and strategies for ICT transformation, Heavy Reading asked telecom operators worldwide to identify the most important goals and objectives for their ICT transformation initiatives. Heavy Reading also asked operators about the importance of a "digital first" strategy, which enables customers to complete an interaction across different digital channels, such as web and mobile self-service and social media.
Hot Topics
Comcast Formally Ends Its Bid for TWC
Mari Silbey, Independent Technology Editor, 4/24/2015
What if the Comcast Merger Fails?
Mari Silbey, Independent Technology Editor, 4/20/2015
Google's WiFi-First Mobile Service 'Fi' Is Here
Dan Jones, Mobile Editor, 4/22/2015
Comcast Reportedly Dropping $45B TWC Bid
Sarah Thomas, Editorial Operations Director, 4/23/2015
Adtran Is Developing White Box GPON Tech
Ray Le Maistre, Editor-in-chief, 4/24/2015
Like Us on Facebook
Twitter Feed
Webinar Archive
BETWEEN THE CEOs - Executive Interviews
Many leading communications companies can claim to have undergone significant periods of reinvention during their histories, but none have been through more major ...
Data Center Interconnect, or DCI, is one of the hottest sectors in telecom currently. Since coming back to Light Reading last year, prodigal-son style, I've ...
Cats with Phones
Learning Curve Click Here
Pierre could never remember how to use Excel.
Latest Comment