About Us | Contact Us
View Cart

Verizon Releases 2015 Data Breach Investigation Report

By Vigilize | Monday, April 20, 2015 - Leave a Comment

An article review.


Great insights to help you better manage risk


ServIcons_ITAudit_01

Each year the security folks at Verizon partner up with companies around the world to collect, analyze and report on data breaches. This year, their report is 70 pages full of explanations, graphs, charts and statistics. We hope to highlight some of the main points in this article review, and we’d like to thank our good friend, Dennis Teague of MainSource Financial, for bringing this report to our attention.

The scope of the Verizon investigation is quite massive. There were 70 contributing organizations that reported 79,790 security incidents. Of those, there were 2,122 confirmed data breaches across 61 countries. When categorizing these breaches, the top three affected industries were public, information, and financial services. These top categories remain unchanged from previous years.

As we examined the report, these were some of the highlights:

  • In 70% of the attacks where the motive was known, there was a secondary victim.
  • 75% of attacks spread from Victim 0 to Victim 1 within 24 hours.
  • RAM scraping has grown significantly. This type of malware was present in some of the most high profile retail breaches.
  • Keylogger malware has declined in past years, making up just around 5% of the recorded breaches.
  • In 60% of the breaches, hackers were able to compromise the targeted system in minutes.
  • 23% of recipients will open phishing messages and 11% click on attachments.
  • Nearly 50% open emails and click on phishing links within the first hour.
  • 99% of exploited vulnerabilities were compromised more than a year after the CVE (Common Vulnerabilities and Exposures) was published.
  • Out of tens of millions of mobile devices, the number of devices infected with truly malicious exploits is about 0.03%.
  • 95% of malware types showed up for less than a month and four out of five didn’t last beyond a week.
  • 70 – 90% of malware samples are unique to an organization. Unique here refers to the signature or hash used within the malware.
  • The forecast average loss for a 1,000 records breach is between $52,000 and $87,000.
  • 95% of Web App Attacks involve harvesting credentials stolen from customer devices, then logging into web applications with them.
  • 15% of breach incidents still take days to discover.
  • When ranking internal misuse, 55% of incidents were internal actors abusing the access they have been trusted with.
  • In examinations of miscellaneous errors that led to a breach, 60% of those miscellaneous incidents were attributed to errors made by system administrators: i.e. misdelivery of information, publishing errors, disposal errors and beyond.

Though this report is not focused on any one industry or country, the global nature of it does give a good sense of where we stand against the rest of the world. Meanwhile, we can learn from what’s working and not working in other places.

Finally, this report is deep and based on a LOT of data. Because this is such a large and deep report, we recommend you page down through the report and make a list of what you want to read in detail. Then prioritize the list. If you are really busy, you might just want to peruse this report and keep it handy for some down time or management awareness training materials.

While this report is published annually, Verizon always changes the metrics they report on, so it lacks good historical trending information; however, the questions asked, especially this year, are unique and reveal interesting background on the “whys” as well as the “whats.”

This report is a free PDF download offered directly from Verizon Enterprise Solutions. When you click “Get Full Report,” you’ll be prompted to provide some personal information. You may do so at your own discretion, but opting in to their mailing list is not required. They provide a “Download Only” link just to the right of the “Register & Download” button.


Click Here To Read the Full Article


The above is what we call an “Article Review.” It is part of our attempt to help our readers find excellent reading materials to back up important technology risk management concepts. We try not to include articles that are merely news or additional news about mainstream issues. Instead, we try to highlight articles that our “typical clients” should be sure to read, or that are about concepts “outside the mainstream media.” infotex does not intend to endorse views represented by the writers of the articles we review, nor do we try to keep our Clients aware of EVERYTHING. For example, if a particular story concept is being reported upon in many different media sources, infotex usually chooses to ignore the story concept altogether, unless we can find a “unique take” on the story concept.


same_strip_012513


Latest News
    The Four Basic Truths of System Security Webinar-Video The last thirty years have seen an evolution of frameworks, laws, and assessment approaches to information security which can intimidate the management team with their complexity. This webinar will discuss the four basic truths of system security regardless of frameworks or approach, and eight control systems to […]
    Community Banking and their layers of security. . . Michael Hartke’s first post as Executive Vice President! Thinking back to my first talk to security professionals in community banking almost 10 years ago, the question continues to this day. First some background… infotex was moderating the Indiana Bankers Association Security Conference when one of the […]
    Reasons why we should be considered! infotex provides a number of services that can be checked out if you click over to offerings.infotex.com! We even made a movie with all the reasons why infotex should be your next MSOC!  
    infotex and GoTo To all infotex managed security service Clients: As recently reported by major news outlets there was a data breach affecting GoTo (formerly LogMeIn) wherein attackers stole encrypted backups containing customer information in November 2022.  Based on the advisory from GoTo the products they offer that are affected include LogMeIn Pro, LogMeIn Central, […]
    An option for increasing security for ALL organizations. . . The threat landscape is evolving daily, and it is becoming increasingly difficult for even large organizations providing cyber defense services to keep up. As Brandao (2021) notes, it is important for organizations to adapt holistic technologies that can correlate all attack events. Therefore, developing XDR […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    A relic of the internet’s less secure past, many small firms struggle to secure their email systems… An article review. With a great deal of cybersecurity related news focused on new threats and similarly new techniques aimed at combating them, it can be easy to forget some of the older threats that have never gone […]
    Seven Trends . . . …that small bank Information Security Officers face in 2023 Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Welcome to the Magnificent Seven, my annual predictive article about the seven trends in technology that will impact the Information Security Officers of […]
    System Security and Cybersecurity are not the same thing. . . Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Regarding “information security,” the last thirty years have seen an evolution of frameworks, laws, and assessment approaches which intimidate the management team with their complexity.  […]
    The cryptographic algorithm is vulnerable to attack and is no longer considered secure… An article review. NIST has announced that it plans to retire the SHA-1 cryptographic algorithm by the end of 2030, citing multiple vulnerabilities in the standard, effectively ending its use after nearly 30 years.  Introduced in 1995, SHA-1 used a 160-bit hash […]