Verizon’s 2015 Data Breach Investigations Report Details Common Threat Patterns
With cyberattacks becoming increasingly sophisticated, vulnerabilities are open across all industries and enterprises need to conduct individualized self-assessments of risk to be prepared. Taking an in-depth look at the cybersecurity landscape, Verizon’s annual Data Breach Investigations Report reveals common threat patterns and sizes up the effects of all types of data breaches.
Here are some key findings based on a first-time overview of mobile security, Internet of Things technologies and the financial impact of a breach:
- The bulk of cyberattacks (70 percent) use a combination of decades-old techniques, like phishing and hacking, and involve a secondary victim (adding complexity to a breach)
- In 60 percent of breaches, attackers are able to compromise an organization within minutes
- The cost of a breach involving 10 million records will fall between $2.1 million and $5.2 million (95 percent of the time)
- The bulk of nearly 80,000 security incidents analyzed this year can be traced back to nine basic attack patterns: miscellaneous errors, such as sending an email to the wrong person; crimeware (various malware aimed at gaining control of systems); insider/privilege misuse; physical theft/loss; Web app attacks; denial-of-service attacks, cyberespionage; point-of-sale intrusions and payment card skimmers
To check out the full article, click here.