Verizon 2019 Data Breach Report

Data breaches continue to make headlines around the world. Seemingly, no matter what defensive measures security professionals put in place, attackers are able to circumvent them.  

Nearly 70% of cyber-attacks are perpetrated by outsiders but 345 of these attacks involve internal employees/staff and almost 40% involve criminal groups and some 23% involve Nation States.

However, the C-suite, who have access to a company’s most sensitive information, are now the major focus for social engineering and cyber-attacks.

No organisation is too large or too small to fall victim to a data breach. Having a sound understanding of the threats you and your peer organisations face, how they have evolved over time, and which tactics are most likely to be utilised can prepare you to manage these risks more effectively and efficiently.

The Verizon Data Breach Investigations Report (DBIR) provides, an important, perspectives on threats that organisations face. The 12th DBIR is built on real-world data from 41,686 security incidents and 2,013 data breaches provided by 73 data sources, both public and private entities, spanning 86 countries worldwide.

Key Takeaways

Senior Executives:  C-level executives were twelve times more likely to be the target of social incidents and nine times more likely to be the target of social breaches than in years past. To further underline the growth of financial social engineering attacks, both security incidents and data breaches that compromised executives rose from single digits to dozens in this report.

Cloud Hacking: As companies continue to transition to more cost- efficient cloud-based solutions, their email and other valuable data migrate along with them. Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value.

Consequently, there’s been a corresponding increase in hacking cloud-based email servers via the use of stolen credentials. This is not an indication that cloud- based services are less secure, however. It is simply that phishing attacks, credential theft and configuration errors are a natural by-product of the process.

Payment Card Breaches:  Payment card web application compromises are well on their way to exceeding physical terminal compromises in payment card-related breaches. Data from one of our contributors, the National Cyber- Forensics and Training Alliance (NCFTA), substantiates this shift appears to have already occurred, and our larger data set is also trending that way.

Ransomware:  Ransomware attacks are still going strong, and account for nearly 24 percent of incidents where malware was used. Ransomware has become so commonplace that it is less frequently mentioned in the specialized media unless there is a high-pro le target in the mix.

However, it is still a serious threat to all industries. Meanwhile, some other threats that are frequently hyped, such as crypto-mining (2% of malware), occur very infrequently in our data set.
 
Chip and Pin: The number of physical terminal compromises in payment card-related breaches is decreasing when compared to web application compromises. This may be partly due to the implementation of chip and pin payment technology starting to show progress.

HR Improvements:  Interestingly, attacks on Human Resource personnel have decreased from last year. Our data set showed 6x fewer Human Resource personnel being impacted this year compared to last. This correlates with W-2 tax form scams almost disappearing entirely from the DBIR data set.

Click- Through Rates: Click-through rates on phishing simulations for data partners fell from 24% to 3% during the past seven years. But 18% of people who clicked on test phishing links did so on mobile devices.

Research shows mobile users are more susceptible to phishing, probably because of their user interfaces and other factors. This is also the case for email-based spear phishing and social media attacks.

Verizon

You Might Also Read:

SMEs Risk Costs Of Up To $2.5m Following A Breach:

 

 

« ‘Chinese Spies’ Had NSA Cyber Weapons Before The Shadow Brokers Leak
Hackers Don't Only Target Big Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Site24x7

Site24x7

Site24x7 is an all-in-one performance monitoring solution for Networks, Websites, Servers and Applications.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

Dubex

Dubex

Dubex is Denmark's leading business-oriented IT security specialist.

CyberDef

CyberDef

CyberDef is a consulting company specialising in cyber defence services for small and medium enterprises.

Cyber Intelligence (CI)

Cyber Intelligence (CI)

Cyber Intelligence is an award winning 'MSC status' cyber security education and training company.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

Excelsecu Data Technology

Excelsecu Data Technology

Excelsecu is a global solution provider of online identity authentication, widely applied in banks, government bodies and enterprises.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

Internet Security Research Group (ISRG)

Internet Security Research Group (ISRG)

ISRG's mission is to reduce financial, technological, and educational barriers to secure communication over the Internet.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

Comcast Technology Solutions (CTS)

Comcast Technology Solutions (CTS)

Comcast Technology Solutions delivers proven technologies for global video, media, communications, data applications, and cybersecurity & compliance.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.