BASKING RIDGE,USA: The 2010 Verizon Data Breach Investigations Report,
based on a first-of-its kind collaboration with the U.S. Secret
Service, has found that breaches of electronic records last year
involved more insider threats, greater use of social engineering and
the continued strong involvement of organized criminal groups.

The study, released Wednesday, also noted that the overall number of
breaches investigated last year declined from the total for the
previous year – “a promising” indication, the study said.

The report cited stolen credentials as the most common way of gaining
unauthorized access into organizations in 2009, pointing once again to
the importance of strong security practices both for individuals and
organizations.  Organized criminal groups were responsible for 85
percent of all stolen data last year, the report said.

Verizon Business investigative experts found, as they did in the
company’s prior data breach reports, that most breaches were
considered avoidable if security basics had been followed.  Only 4
percent of breaches assessed required difficult and expensive
protective measures.

The 2010 report concluded that being prepared remains the best defense
against security breaches. For the most part, organizations still
remain sluggish in detecting and responding to incidents. Most
breaches (60 percent) continue to be discovered by external parties
and then only after a considerable amount of time.  And while most
victimized organizations have evidence of a breach in their security
logs, they often overlook them due to a lack of  staff, tools or
processes.

The collaboration with the Secret Service, announced in May, enabled
this year’s Data Breach Investigations Report to provide an expanded
view of data breaches over the last six years. With the addition of
Verizon’s 2009 caseload and data contributed by the Secret Service --
which investigates financial crimes -- the report covers 900-plus
breaches involving more than 900 million compromised records.

“This year we were able to significantly widen our window into the
dynamic world of data breaches, granting us an even broader and deeper
perspective,” said Peter Tippett, Verizon Business vice president of
technology and enterprise innovation.   “By including information from
the Secret Service caseload, we are expanding both our understanding
of cybercrime and our ability to stop breaches.”

Michael Merritt, Secret Service assistant director for investigations,
said: “The Secret Service believes that building trusted partnerships
between all levels of law enforcement, the private sector and academia
has been proven and successful model for facing the challenges of
securing cyberspace   It is through our collaborative approach with
established partnership that the Secret Service is able to help expand
the collective understanding of breaches and continue to augment our
advanced detection and prevention efforts.”

Key Findings of the 2010 Report:

.         Most data breaches investigated were caused by external
sources.  Sixty-nine percent of breaches resulted from these sources,
while only 11 percent were linked to business partners.  Forty-nine
percent were caused by insiders, which is an increase over previous
report findings, primarily due in part to an expanded dataset and the
types of cases studied by the Secret Service.

·         Many breaches involved privilege misuse. Forty-eight percent
of breaches were attributed to users who, for malicious purposes,
abused their right to access corporate information.  An additional 40
percent of breaches were the result of hacking, while 28 percent were
due to social tactics and 14 percent to physical attacks.

·         Commonalities continue across breaches.  As in previous
years, nearly all data was breached from servers and online
applications. Eight-five percent of the breaches were not considered
highly difficult, and 87 percent of victims had evidence of the breach
in their log files, yet missed it.

·         Meeting PCI-DSS compliance still critically important.
Seventy-nine percent of victims subject to the PCI-DSS standard hadn’t
achieved compliance prior to the breach.


@CIOL


Regards
Sandeep Thakur

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to