The Verizon Business Investigative Response team recently released a report detailing the facts and figures associated with system breaches from more than 500 cases over the past 4 years. The report mostly contains obvious information regarding the who, what, where, and how of most data breaches, but it's worth reading. There were some pretty interesting statistics and factoids contained in the piece.
The Verizon Business Investigative Response team recently released a report detailing the facts and figures associated with system breaches from more than 500 cases over the past 4 years. The report mostly contains obvious information regarding the who, what, where, and how of most data breaches, but it's worth reading. There were some pretty interesting statistics and factoids contained in the piece.As I read through the report, here's what jumped out at me.
73% of data breaches resulted from external sources, including business partners.
The Retail, Food & Beverage and Financial Services industries were disproportionate targets of data breaches, clearly due to their concentration and possession of personal credit card data.
While 73% of data breaches came from outside sources, the damage done in terms of the number of records compromised paled in comparison with the damage done by internal attacks. The median number of records compromised by an internal job was 375,000.
80% of breaches were classified as low to medium in terms of difficulty to execute. Only 17% were deemed to be of a high difficulty to execute, which high difficulty being defined as needing specialized skills and resources in order to pull off the hack.
70% of the time, victims of breaches are notified by third parties. That's a pretty interesting fact, so what's the cause? Do IT shops lack the tools? Does the market lack an integrated, easy to manage offering to solve the problem? Are IT shops just not watching? I suspect all three are factors.
Here's the most shocking and alarming statistic for me:
90% of breaches utilized exploits for which there was a patch available for at least 6 months. Now I won't claim to be the most diligent engineer when it comes to applying security patches to my servers, but if you get hacked using an exploit for which there's been a fix for 6 months, you, and I, have no one to blame but ourselves.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.