CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

Verizon’s 2022 data breach report: Key takeaways

admin by admin
May 31, 2022
in Information Security
Share on FacebookShare on Twitter


This year’s DBIR offers practical advice on improving your security posture and tips for making yourself much less of a target.

It’s time for the annual Verizon Data Breach Investigation Report (DBIR), a compendium of cybersecurity and malware trends that offers some of the best analyses in our field. It examines more than 5,000 data breaches collected from 80 partners from around the world. If you’d like to explore the report from previous years, we’ve also written up summaries of the 2021 and 2020 reports.

If the events of last year could be summed up with one attack, it would be the SolarWinds breach and how it had so many wide-ranging consequences. Overall, supply chain attacks were responsible for 62% of system intrusion incidents this past year, illustrating just how interconnected we have become to run our businesses and operate our computing networks.

One notable consequence is the big rise in system intrusions as a proportion of attacks, which is shown in the following graph.


Image credit: GitHub

Nevertheless, the topic of ransomware remains at the front and center of this year’s report. In the past year, this particular threat has doubled its frequency to account for a total of a quarter of all breaches, as is shown in the chart below. Certainly, the pandemic has been good for ransom actors. 

Image credit: GitHub

However, even with this huge corpus of breaches, the number presented may still be on the low side. The U.S. Senate Committee on Homeland Security & Governmental Affairs revealed that the numbers provided to them by the FBI and other organizations might be drastically underestimating the real number of ransomware victims and the amounts paid out during attacks. Its report is also worth reviewing and contains several recommendations that the federal government should take to improve overall posture and response to these attacks.

Another challenging aspect of ransomware is its effect across all sizes of targets. The DBIR specifically examined thousands of incidents involving the smallest businesses that have less than 10 employees. There were 130 incidents with data leaks, using both ransomware and stolen credential attacks. While this is a small proportion, it is still troubling. 

Practical advice on improving your security posture

When describing how to monitor devices for suspicious activity, the report offers the following comparison: “Think of your computer like a car – if it suddenly won’t start, runs slower or makes a weird noise, it’s time to have an expert take a look.” The trick is knowing when these telltale signs appear that aren’t as obvious as what we expect from our cars.

The report offers additional suggestions, such as tips to make yourself much less of a target. The authors write, “Use antivirus to remove bots; implement patching, filtering and asset management to prevent exposed vulnerabilities; and standardize two-factor authentication and password managers to minimize credential exposure.”

What’s the good news?

This year’s DBIR offers some positive notes on three fronts: We’re patching more and we’re patching faster.

Next, we are generally getting better at detecting attacks in a timely manner.

Image credit: GitHub

Finally, we are also getting better at detecting and reporting phishing, as is visualized in the below graph showing the increase in people who didn’t click on phishing lures: 

Image credit: GitHub

“The question is can your organization both act on the 12.5% that reported phishing lures and find the 2.9% of the targets who clicked on them?”, the report authors ask.


Further reading:
How to spot email scams
Stay protected against scams and online fraud



Source link

Previous Post

Innerconnectivity ~ Future of CIO

Next Post

Zero-Day ‘Follina’ Bug Lays Older Microsoft Office Versions Open to Attack

Related Posts

Information Security

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

by admin
June 24, 2022
Information Security

ToddyCat claws at Asian governments

by admin
June 24, 2022
Information Security

NSO Confirms Pegasus Spyware Used by at least 5 European Countries

by admin
June 23, 2022
Information Security

AWS re:Inforce 2022: Threat detection and incident response track preview

by admin
June 23, 2022
Information Security

Vishing scams on the rise: How to protect yourself

by admin
June 23, 2022
Next Post

Zero-Day ‘Follina’ Bug Lays Older Microsoft Office Versions Open to Attack

Leave Comment

Recommended

“We Need to Get Better”: How CIOs Are Working to Extract More Value from EHRs

June 25, 2022

Innerframeworkforblance

June 25, 2022

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

June 24, 2022

ToddyCat claws at Asian governments

June 24, 2022

“People Are What Makes Tech Work”: Lee Milligan Reflects on His Journey at Asante

June 24, 2022

Innercapabiltyconnectivity

June 24, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.