Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Verizon claims most data breaches undiscovered for months or years

Vast majority of leaks caused by external attacks, claims telecom vendor

Article comments

Over 90 percent of data breaches are the result of external attacks and almost 60 percent of organisations discovered them months or years later, Verizon claimed at the RSA security conference.

Called the Verizon 2011 Investigative Response Caseload Review, it compiles statistics from 90 data breach cases investigated by the company's incident response team last year, and provides a preview of Verizon's larger annual report that will contain data collected from additional sources like national CERTs and law enforcement agencies.

The report concludes that 92 percent of data breach incidents have had an external cause, which conflicts with the findings of other security vendors, according to whom most data breaches are the result of internal threats.

"I think that's a bit of a myth in the security community," said Wade Baker, director of risk intelligence for Verizon Business. "There's fewer people inside of an organisation than there are outside and I think it stands to reason that, by the numbers, we will have more external incidents."

However, Baker agreed that many insider actions resulting in data breaches get dealt with internally and aren't necessarily accounted for in Verizon's report, which only compiles information from incidents Verizon was called to investigate.

According to the report, the use of default or stolen credentials was one of the primary methods that attackers used to gain access to data in 2011.

Some organised crime groups have automated their attacks to scan for very specific ports, like those for remote desktop, pcAnywhere and similar products, and then they try to login with common or stolen passwords, said Chris Porter, principal for Verizon's RISK Team.

This problem is common with small businesses that outsource the administration of their IT systems to third parties who offer remote support. These organisations should implement some type of access control for remotely accessible systems, like restricting which IPs are allowed to connect to them, Porter said.

Web-based attacks like SQL injection have a lower frequency and didn't even make the top ten list on the annual report that will be published later this year, Baker said. The rate of SQL injection attacks is usually much higher for financial services organisations.

One problem that doesn't seem to improve from year to year has to do with breach discovery. It takes the majority of organisations months to discover a breach and some of them even take years, according to Verizon.

Furthermore, the discovery of these breaches is usually the result of external action, like law enforcement agencies or other organisations informing the affected companies, Baker said.

Restricting outbound connections to ports that are necessary for the organisation's communications is equally important as monitoring incoming traffic, Porter said. This is known as egress filtering and can help prevent breaches.

Whitelisting applications that are allowed to run on servers can prevent attackers from installing and executing malware on systems they've gained access to. It's much easier to allow only some applications and services to run and block everything else, than to build a list of malicious programs and continuously add to it, the Verizon researchers said.



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *