Home arrow Fraud and Scams arrow How to Protect Yourself arrow Verizon Releases 2013 Data Breach Investigation Report
User Login





Lost Password?
No account yet? Register
Guard My Credit Menu
Home
- - - THE ISSUES - - -
Videos
Fraud and Scams
Credit Issues
Identity Theft
Privacy Issues
Our Children
Politics & Politicians
- - ACTION CENTER - -
Guard My Credit Links
Helpful Pamphlets
- - - - - - - - - - - - - - -
About ACCESS
Contact Us
About Our Site
Join the Fight
ACCESS is a non-profit, tax exempt consumer advocacy group.

Donations are tax deductable.

Guard My Credit Hits
11429473 Visitors
Verizon Releases 2013 Data Breach Investigation Report PDF Print E-mail

May 3, 2013 - For the past six years, Verizon has been releasing a paper titled the Data Breach Investigation Report (DBIR). The report provides a wealth of information about how data breaches occur, who is behind them and what motivates the criminals behind many of the breaches. The results are somewhat eye opening.

Image

According to the DBIR, nobody is immune to data breaches. Here are some of the report's findings:

  • 86% of data breaches that involve hacking don't involve employees of the company or organization being hacked,
  • 78% of hacking data breaches were unsophisticated; involving low, or very low skill levels,
  • 62% of data breaches took months to discover. 4% of data breaches took years to discover,
  • 22% of data breaches were not contained for months after their initial discovery,
  • 37% of data breaches occurred in financial services organizations with ATMs being the most vulnerable point of attack,
  • 24% of data breaches occurred in retail stores and restaurants.

While it is probably not surprising to anyone that 75% of intentional data breaches were financially motivated, you may be surprised to learn that 19% of intentional data breaches were as a result of espionage by foreign government agencies. 52% of the data breaches in this category involved hacking or malware.

With regard to unintentional data breaches caused by employees or contractors in organizations, 41% were caused by the use of unauthorized equipment such as unsecured smart phones or USB drives. Lost or stolen laptop and desktop computers were also significant contributors to data breaches in this category.

The report clearly shows that organizations that store significant amounts of personal data on their customers and employees need to do a better job of securing their data. You can find the entire report here. There is also a shorter, executive summary available.

 

byJim Malmberg

Note: When posting a comment, please sign-in first if you want a response. If you are not registered, click here. Registration is easy and free.

Follow me on Twitter:

 

TwitterCounter for @jmalmberg

 

Follow ACCESS
 

 

Comments
Search
Only registered users can write comments!

3.25 Copyright (C) 2007 Alain Georgette / Copyright (C) 2006 Frantisek Hliva. All rights reserved."

 
Guard My Credit Polls
#1 - Why did you visit our site today?
 
.•*´¯☼ ♥ ♥ Your Support of These Links Is GREATLY Appreciated ♥ ♥ ☼¯´*•.
Advertisement
 
Go to top of page
Home | Contact Us |About Us | Privacy Policy
eXTReMe Tracker
12/04/2024 01:49:03