Your SlideShare is downloading. ×
Six Security Stats That Matter From the Verizon Data Breach Investigations Report
Six Security Stats That Matter From the Verizon Data Breach Investigations Report
Six Security Stats That Matter From the Verizon Data Breach Investigations Report
Six Security Stats That Matter From the Verizon Data Breach Investigations Report
Six Security Stats That Matter From the Verizon Data Breach Investigations Report
Six Security Stats That Matter From the Verizon Data Breach Investigations Report
Six Security Stats That Matter From the Verizon Data Breach Investigations Report
Six Security Stats That Matter From the Verizon Data Breach Investigations Report
Six Security Stats That Matter From the Verizon Data Breach Investigations Report
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Six Security Stats That Matter From the Verizon Data Breach Investigations Report

4,764

Published on

Now in its sixth year of publication this year’s 2013 report does not disappoint. It includes data from 19 global security organizations with an analysis of a 47,000+ security incidents and 621 …

Now in its sixth year of publication this year’s 2013 report does not disappoint. It includes data from 19 global security organizations with an analysis of a 47,000+ security incidents and 621 confirmed breaches. In addition, the 2013 DBIR offers new insight into data thieves and their motives.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
4,764
On Slideshare
0
From Embeds
0
Number of Embeds
13
Actions
Shares
0
Downloads
5
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.STAT #1: MINIMAL TIME TO COMPROMISEIN 84% OFCASES, INITIALCOMPROMISETOOK HOURSOR LESS.ALMOST A QUARTER TOOK JUST MINUTES OR LESS
  • 2. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.STAT #2: GROWING TIME TO BREACH DISCOVERY66% OF CASESWEREN’TDISCOVEREDFOR MONTHS OREVEN YEARS.UP FROM 56% THE YEAR BEFORE
  • 3. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.STAT #3: GROWING ESPIONAGESTATE-AFFILIATEDESPIONAGEACOUNTED FOR19% OFATTACKS.ESPIONAGE-RELATED ATTACKS BY SECTOR
  • 4. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.STAT #4: LOW DIFFICULTY, HIGH IMPACT78% OF ATTACKS WERE LOWOR VERY LOW IN DIFFICULTYEVEN ESPIONAGE LEVERAGED BASIC TECHNIQUES:95% OF ESPIONAGE RELIED ON PHISHING
  • 5. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.STAT #5: CREDENTIAL EXPLOITATION76% OF NETWORKINTRUSIONSEXPLOITED WEAKOR STOLENCREDENTIALSSTRICT POLICIES HELP REDUCE THIS EASILY PREVENTABLE RISK
  • 6. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.STAT #6: INITIAL BREACH DISCOVERY69% OFBREACHESSPOTTED BYAN EXTERNALPARTY9% DISCOVERED BY CUSTOMERS
  • 7. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.MORE CONTRIBUTORS THAN EVERTHE 2013 DBIR:19 CONTRIBUTORSFROM AROUNDTHE WORLD13 MORE THAN EVER BEFORE
  • 8. DOWNLOAD FULL 2013 DBIRVERIZONENTERPRISE.COM/DBIR/2013

×