Security Slideshow: Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report

By Jennifer Lawinski  |  Posted 04-21-2011

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report

Smaller TargetsLarge-scale attacks decreased while attacks on SMBs were up. They could be easy targets with low security or it could indicate that hackers are growing leery of getting caught.

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 2

Beware Outsiders92% of data breaches were caused by external sources. Only 16% were insider attacks.

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 2

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 3

Physical Attacks on the RiseAttacks involving physical actions were up 50% over 2009. Manipulating credit-card devices is a common tactic.

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 3

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 4

Hackers and MalwareHackers were responsible for 50% of breaches. Malware was used in 49% but was responsible for 80% of lost data.

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 4

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 5

Password Security ProblemsWeak or stolen passwords remain a concern for enterprise security.

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 5

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 6

Six Tips for the Enterprise1. Focus on essential controls across the organization to make sure some areas aren't neglected.

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 6

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 7

Six Tips for the Enterprise2. Eliminate unnecessary data. If you won't need it, don't keep it. Protect data that you do need.

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 7

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 8

Six Tips for the Enterprise3. Secure remote access and restrict services to specific IP addresses and networks. Make sure access is limited to sensitive data within the network.

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 8

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 9

Six Tips for the Enterprise4. Audit user accounts and monitor those with privileges. Managers can provide direction and make sure employees follow security policies and procedures.

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 9

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 10

Tips for the Enterprise5. Read your event logs and focus on the issues they reveal. It will help your response time.

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 10

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 11

Six Tips for the Enterprise6. Pay attention to physical security assets like credit card input devices, ATMs and gas pumps. They are targets for tampering and manipulation.

Data Breaches Rise, Thefts Fall: Verizon's Data Breach Investigations Report - Page 11