Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Verizon Business Data-Breach Report Examines Industry-Specific Challenges

Enterprises should assess their security strategies knowing that the challenges differ significantly by industry and that a one-size-fits-all approach is rarely effective. Those are the key findings in a supplemental analysis of data breaches released by Verizon Business today.
  • 03 October, 2008 12:24

<p>Supplemental Analysis From Four-Year, Landmark Study Finds Need for Tailored Strategies</p>
<p>SYDNEY, Australia – 3 October 2008 - Enterprises should assess their security strategies knowing that the challenges differ significantly by industry and that a one-size-fits-all approach is rarely effective. Those are the key findings in a supplemental analysis of data breaches released by Verizon Business today.</p>
<p>The latest study is based on the 2008 Verizon Business Data Breach Investigations Report, issued in June. The landmark report analysed breaches spanning four years and more than 500 forensic investigations involving 230 million compromised records including three of the five largest breaches ever reported.</p>
<p>In its supplemental analysis, Verizon Business security experts used the original data to provide a rare glimpse at the differences and similarities among attacks across four key industries: financial services, high-tech, retail and food and beverage. The four groups studied constituted a sufficient sample size for independent data analysis.</p>
<p>“The supplemental report provides further insight into the nature of breaches, underscoring that good security does not lend itself to a cookie-cutter approach,” said Dr. Peter Tippett, vice president of research and intelligence, Verizon Business Security Solutions. “Understanding what happens when a data breach occurs is critical to proactive prevention. Through our more targeted analysis, we are hoping to provide answers to businesses around the globe that want to protect not only their data but their reputation.”</p>
<p>Key Findings Across Industries</p>
<p>Findings, by vertical market, include:</p>
<p>Financial Services</p>
<p>Financial services face a greater risk from insiders, whereas partners represent the chief source of risk for other industries analysed.</p>
<p>A blend of attack types is used against financial services, with deceit and misuse as the most common attacks.</p>
<p>On average, attacks take longer and tend to be more sophisticated. Discovery often takes weeks, although financial services organisations generally learn of breaches more quickly than other types of organisations.</p>
<p>Relative to other industries, financial organisations demonstrated a higher level of asset awareness. Breaches associated with unknown or lost systems, data, connections and privileges occurred far less frequently.</p>
<p>High-Tech Services</p>
<p>· The picture in high-tech services is complex. More than any other industry, errors were a contributing factor and attacks were fairly sophisticated. Though presumably tech-savvy, high-tech organisations had a difficult time keeping track of information assets and system configurations.</p>
<p>· Malicious insiders are a big issue. Insider misuse, which refers to using granted resources or privileges, or both, for any unauthorised purpose, is much higher in high-tech. Such behaviour is inherently difficult to control in a culture where workers often have high levels of access to many systems.</p>
<p>· Hacking is significant. Tech firms tend to do a better job on basic system and application configurations, forcing attackers to rely on vulnerabilities to compromise systems. A consistent and comprehensive approach to patch deployment is often lacking.</p>
<p>· Attacking Web applications represents the most common method of intrusion. Additionally, the percentage of breaches involving intellectual property is higher in the high-tech community.</p>
<p>.</p>
<p>Retail</p>
<p>· Retail represents the largest portion of the overall cases analysed.</p>
<p>· Many attacks exploit remote access connections, but Web applications are also frequently targeted. Attacks on wireless networks are growing and are significantly higher than in any other industry.</p>
<p>· Simple attacks are prevalent, but a considerable number of more difficult attacks were employed against retail establishments.</p>
<p>· Retail is highly reliant on third-parties to discover breaches. Typically, discovery happens more quickly than in food and beverage but lags behind both the finance and high-tech industries.</p>
<p>· Overall, attacks against this industry are largely opportunistic, seeking quick payloads of data that can easily be used for fraudulent purposes.</p>
<p>Food and Beverage</p>
<p>Most breaches originate from external sources but leverage a partner’s trusted remote access connection as the point of entry into online repositories of payment card data.</p>
<p>These attacks rely on poor security configurations rather than application or software vulnerabilities, are quickly executed and are highly repeatable.</p>
<p>Many attacks exploited point-of-sale systems that criminals use to stage additional attacks and spread malware (corrupt software) throughout food and beverage chain establishments.</p>
<p>It takes food and beverage organisations a considerable amount of time to learn of a breach. When they do, the discovery is almost always made by a third party.</p>
<p>Tippett added, “This report clearly shows it’s not about clever or complex security protection measures. It really boils down to doing the basics from planning to implementation to monitoring of the data.”</p>
<p>To access the Verizon Business Supplemental Report, please click below: http://www.verizonbusiness.com/resources/security/databreachsuppwp.pdf.</p>
<p>A complete copy of the 2008 Data Breach Investigations Report is available at: http://www.verizonbusiness.com/resources/security/databreachreport.pdf.</p>
<p>To blog about this report, visit us at: http://securityblog.verizonbusiness.com/.</p>
<p>- ENDS -</p>
<p>For further information, please contact:</p>
<p>Gabriel Wong</p>
<p>Max Australia</p>
<p>Tel: +61 2 9954 3492</p>
<p>Email: gabriel.wong@maxaustralia.com.au</p>
<p>About Verizon Business</p>
<p>Verizon Business, a unit of Verizon Communications (NYSE: VZ), operates the world's most connected public IP network and uses its industry-leading global-network capabilities to offer large-business and government customers an unmatched combination of security, reliability and speed. The company integrates advanced IP communications and information technology (IT) products and services to deliver leading enterprise solutions including managed services, security, mobility, collaboration and professional services. These solutions power innovation and enable the company’s customers to do business better. For more information, visit www.verizonbusiness.com.</p>
<p>####</p>
<p>VERIZON'S ONLINE NEWS CENTRE: Verizon news releases, executive speeches and biographies, media contacts, high-quality video and images, and other information are available at Verizon's News Centre on the World Wide Web at www.verizon.com/news. To receive news releases by e-mail, visit the News Centre and register for customised automatic delivery of Verizon news releases.</p>

Most Popular

Cool Tech

Breitling Superocean Heritage Chronographe 44

Learn more >

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Join the newsletter!

Error: Please check your email address.

Latest Articles

Resources

PCW Evaluation Team

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?