Data Source: Verizon Data Breach Report 2013. Images ©Advent IM Ltd June 2013
pass
pass
pass
pass
pass
pass
pass
pass
pass...
Data Source: Verizon Data Breach Report 2013.Some Images courtesy of
freedigitalphotos.net ©Advent IM Ltd June 2013
Social...
Data Source: Verizon Data Breach Report 2013.Some Images courtesy of
freedigitalphotos.net ©Advent IM Ltd June 2013
29%
of...
Upcoming SlideShare
Loading in …5
×

Data Breach and Hacking

462 views

Published on

Weak and stolen credentials enable much of data breach
#databreach #security #hacking

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
462
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Data Breach and Hacking

  1. 1. Data Source: Verizon Data Breach Report 2013. Images ©Advent IM Ltd June 2013 pass pass pass pass pass pass pass pass pass pass 76% of data breaches utilised weak or stolen credentials Username: admin Password: password ATM card skimming including use of 3D printing Theft Surveillance or spying Sometimes the breach has been in planning and progress for months and may involve various security intervention opportunities
  2. 2. Data Source: Verizon Data Breach Report 2013.Some Images courtesy of freedigitalphotos.net ©Advent IM Ltd June 2013 Social Engineering targets – many remain shadowy however in larger organisations, ex employees are just as much of a vulnerability as current managers…time to check those Leavers Policies… 27% of Managers targeted and 27% of Ex Employees
  3. 3. Data Source: Verizon Data Breach Report 2013.Some Images courtesy of freedigitalphotos.net ©Advent IM Ltd June 2013 29% of breaches involved some kind of ‘Social element’

×