• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Current News   »   Verizon: Outside threats dominate data breaches

Verizon: Outside threats dominate data breaches

  • Posted on:March 6, 2012
  • Posted in:Current News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Verizon Business recently released some of the results of its 2012 Data Breach Investigations Report, which took into account around 90 of the 855 global breaches the company tracked last year. Among the most glaring results is the fact that outside threats were main cause of data breaches in 2011.

According to the report, which will be released in full at a later date, more than 85 percent of the incidents reviewed were the results of hacker cyberattacks. Overall, 92 percent of data security events originated outside company walls, the report found.

"[Last year] was an interesting year in cybercrime. From mini-breaches to mega-breaches, and from 'hacktivism' to espionage to money-driven crime syndicates, there was plenty going on to keep [information security] professionals awake at night," the sample report stated.

In 2010, outsiders accounted for 88 percent of all incidents, which reveals that companies should be fearing this threat even more moving forward. At the same time, the rate of insider data breaches continued to decline in 2011, slipping to 5 percent of all incidents. Two years ago, insiders were responsible for 10 percent of breaches.

Moving forward, companies should expect this trend to continue, with outside risks continuing to grow in both volume and sophistication, Wade Baker, director of research and intelligence at Verizon Enterprise Solutions, told Dark Reading. It's important that companies align their data and Internet security strategies accordingly.

Other analyses of 2011 data breaches also highlighted the growing risk hackers pose to data protection.

Earlier this year, the Identity Theft Resource Center (ITRC) released its own study on the matter, and revealed that "a targeted intrusion of a data network," such as those launched by hackers, caused 26 percent of last year's data breaches. The loss of data in transit, which accounted for 18 percent of breaches last year, was second on the list of causes, followed by insider theft of information, which accounted for 13 percent.

"Any efforts to accurately quantify the actual number of breaches, and resulting number of compromised records, are stymied in the absence of mandatory reporting on a national level," said ITRC program director Karen Barney.

Overall, the ITRC looked into 419 reported incidents. It found that more than 22 million records were exposed, and 62 percent of breaches involved Social Security numbers and 27 percent were centered on the theft of payment card information.

Security News from Trend Micro

Related posts:

  1. Report: Hackers now No. 1 cause of data breaches
  2. Report: Hactivists behind most data breaches in 2011
  3. Companies must anticipate, prepare for insider breaches
  4. Data breaches affect more than 2 million in Massachusetts

Security Intelligence Blog

  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack
  • Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Skimming and Phishing Scams Ahead of Black Friday and Polish Hacking Team Wins Capture the Flag Competition
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.