Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
UCS Invicta: Integrated Flash
Deploy flash memory technology to
deliver peak workload performance.

Find out more>>
Enterprise I.T.
Real-time info services with Neustar
Average Rating:
Rate this article:  
What Verizon
What Verizon's Data Breach Report Can Teach Enterprises

By Jennifer LeClaire
April 23, 2014 1:35PM

    Bookmark and Share
So, what are the takeaways for enterprises from the Verizon Data Breach Report? Combined with major breaches such as Target, Michaels, Adobe and Edward Snowden, Verizon's Data Breach report should be a wake-up call to every organization to re-think security from an "inside-out" model and assume the bad guy is already on the network.
 


It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. Meanwhile, use of stolen or misused credentials is still the leading way cybercriminals gain access to corporate information. So says the 2014 Verizon Data Breach Investigations Report.

With 511 incidents, there’s more than a three-fold increase in cyberespionage compared with the 2013 report. Retail point-of-sale (POS) attacks continue to trend downward. And the report points out that 85 percent of insider and privilege-abuse attacks used the corporate LAN, and 22 percent took advantage of physical access.

The trends are clear, but what does all this mean for the enterprise? We caught up with Tom Cross, director of security research at network security solution provider Lancope, to get his opinion on the takeaways from the report. He told us the Verizon Data Breach Investigations Report paints a picture of how point-of-sale attacks have evolved.

Adopt Unappealing Technology

“POS terminals that are directly connected to the open Internet by small businesses represent low hanging fruit that is incredibly easy to pluck,” said Cross. “In the past year we know that POS malware was used in much more sophisticated attacks against larger, better defended retail establishments.”

Cross said this process mirrors what we expect to see with other kinds of embedded systems associated with the Internet of Things. If there is a business model associated with attacking devices, he said, it will be pursued. If those attacks prove lucrative, they’ll be repeated. It’s all about one motive: money.

Cross’ favorite recommendation in the report is the suggestion that organizations adopt unappealing technology in order to deter theft.

“It reminds me of a scene in one of William Gibson's novels in which someone is applying spray-on rust to a brand new bicycle in order to make it look unattractive to thieves,” Cross said. “Sometimes, having the latest tech gadgets can make you a target, and it’s all the more troublesome if you happened to have loaded a bunch of sensitive information onto that gadget right before it grew legs.”

Reactions to the Report

Here are some other reactions from security experts:

Eric Chiu, president and cofounder at HyTrust, the cloud control company, said, “This report, combined with major breaches such as Target, Michaels, Adobe and Edward Snowden, should be a wake-up call to every organization to rethink security from an 'inside-out' model and assume the bad guy is already on the network. Companies need to implement access controls, role-based monitoring and data encryption to ensure that critical systems and sensitive data are protected.”

Adam Kujawa, head of malware intelligence at Malwarebytes, an anti-malware software company, said, “Moving forward, we can expect the government actor underworld we have been hearing so much about in the news and the cybercriminal underworld we experience first-hand to start and use the same tactics. While we are going to continue to see the slew of banker Trojans, information stealing malware and tech support or anti-virus scammers, the larger organizations will go after bigger targets.”

And Kevin O'Brien, director of Product Marketing at CloudLock, a cloud security firm, said, “Notably, there are no major breaches coming from the public cloud sector. That doesn't mean that the cloud is immune to breach or loss, but rather, this is likely the next major front for security incidents.”
 

Tell Us What You Think
Comment:

Name:



Get Powerful App Acceleration with Cisco. In a world where time is money, you need to accelerate the speed at which data moves through your data center. Cisco UCS Invicta delivers powerful, easy-to-manage application acceleration for data-intensive workloads. So you can make decisions faster and outpace the competition. Learn More.


 Enterprise I.T.
1.   SAP Taps Apigee for API Management
2.   IBM Beefs Up Identity Intelligence
3.   USB Security Flaw Uncovered
4.   AMD Debuts 64-Bit ARM Server Chips
5.   Asana Revamps Mobile App


advertisement
IBM Beefs Up Identity Intelligence
To offer biz better security products.
Average Rating:
AMD Debuts 64-Bit ARM Server Chips
New Opterons target data center needs.
Average Rating:
Dell, BlackBerry Downplay Threat
Say Apple-IBM alliance can't hurt them.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Ruling Against Microsoft Raises E-Mail Privacy Concern
Microsoft has been ordered to hand over e-mails to law enforcers in the United States as part of a criminal investigation, even though the e-mail is stored at a data center in Dublin,Ireland.
 
Twitter Buys Password Manager Startup Mitro
Following on the heels of another acquisition earlier this week, Twitter is adding to its fold a password-manager security startup called Mitro, which in turn is releasing its code as open source.
 
Government Requests for Customer Data Skyrocket
Requests for customer data from the government jumped 50 percent in the first half of 2014, according to Twitter, which received more than 2,000 requests for user info from gov't agencies.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.