Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Are you doing
cybersecurity
wrong?
Myth busting with the DBIR team.
This document and any attached materials are the sole property of Verizon and are not to be used by
you other than to eval...
The Data Breach
Investigations Report
The 2016 Data Breach
Investigations Report
(DBIR) provides insights
based on over 10...
There are many myths
surrounding cybersecurity.
Fortunately, the DBIR is here to
shine a light on the misnomers
and half t...
Myth #1
Hackers always carefully
select a target and then hit
them with a zero-day attack.
Truth
Most attacks are opportunistic, indiscriminate
and exploit known vulnerabilities.
The top 10 vulnerabilities account...
Myth #2
Attackers are fast. But the good
guys are catching up.
DATA
Truth
The gap between compromise
and detection is widening.
In 93% of breaches attackers take
minutes or less to compromis...
Admin
96dYB88@£f%^4008+
Password
Username
Myth #3
Passwords prove the identity
of authorized users.
Admin
P4ssw0rd
Password
Username
Truth
63% of confirmed data
breaches leverage
a weak, default or
stolen password.
Myth #4
No one falls for phishing anymore.
Truth
Phishing is on the rise.
30% of phishing emails
are opened. And about
12% of targets go on to
click the link or
atta...
Myth #5
Cyber-espionage attacks are
widespread and increasing.
Truth
Money remains the
main motive for attacks.
80% of analyzed breaches
had a financial motive.
Make your defenses good
e...
Myth #6
It’s all too complicated.
The bad guys have won.
! !
Truth
95% of breaches
fit into just nine attack
patterns. Understand
them and you’ll be better
able to make the right
inves...
We use the insights from the DBIR
to shape our own security portfolio.
That way, we can deliver the best
possible protecti...
We wrote the book on cybersecurity.
Read the 2016 DBIR to understand what
you’re up against:
www.VerizonEnterprise.com/DBI...
© 2016 Verizon. All Rights Reserved. The Verizon name and logo and all other names,
logos, and slogans identifying Verizon...
Upcoming SlideShare
Loading in …5
×

2016 Data Breach Investigations Report (DBIR) & Cybersecurity on SlideShare

235,906 views

Published on

The Verizon Data Breach Investigations Report (DBIR) has a long history of lifting the lid on what’s really happening in cybersecurity. And the 2016 DBIR edition is no different. This SlideShare leans on the DBIR to reveal the truth behind some common cybersecurity myths. Are attackers really that fast? Do people still fall for phishing? And is cybersecurity simply too difficult? Get a full view of the threat landscape and what you can do to mitigate the risk to your organization by reading the http://www.verizonenterprise.com/DBIR/2016/.

Published in: Technology
  • It's about time to protect our companies' data from hackers... Nice done Cybel Angel !!!
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • The Verizon Data Breach Investigations Report (DBIR) has a long history of lifting the lid on what’s really happening in cybersecurity. And the 2016 DBIR edition is no different. This SlideShare leans on the DBIR to reveal the truth behind some common cybersecurity myths. Are attackers really that fast? Do people still fall for phishing? And is cybersecurity simply too difficult? Get a full view of the threat landscape and what you can do to mitigate the risk to your organization by reading the http://www.verizonenterprise.com/DBIR/2016/.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

2016 Data Breach Investigations Report (DBIR) & Cybersecurity on SlideShare

  1. 1. Are you doing cybersecurity wrong? Myth busting with the DBIR team.
  2. 2. This document and any attached materials are the sole property of Verizon and are not to be used by you other than to evaluate Verizon’s service. © 2016 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. Proprietary statement. Are you doing cybersecurity wrong?
  3. 3. The Data Breach Investigations Report The 2016 Data Breach Investigations Report (DBIR) provides insights based on over 100,000 incidents, including analysis of 2,260 confirmed data breaches to reveal what’s really happening in cybercrime.
  4. 4. There are many myths surrounding cybersecurity. Fortunately, the DBIR is here to shine a light on the misnomers and half truths. Join us as we set the record straight on cybersecurity. MYTHS
  5. 5. Myth #1 Hackers always carefully select a target and then hit them with a zero-day attack.
  6. 6. Truth Most attacks are opportunistic, indiscriminate and exploit known vulnerabilities. The top 10 vulnerabilities account for 85% of successful exploit traffic. And the remaining 15% consists of over 900 Common Vulnerabilities and Exposures (CVEs).
  7. 7. Myth #2 Attackers are fast. But the good guys are catching up. DATA
  8. 8. Truth The gap between compromise and detection is widening. In 93% of breaches attackers take minutes or less to compromise systems. But four out of five victims don’t realize they’ve been attacked for weeks or longer. And in 7% of cases, the breach goes undiscovered for more than a year. DATA
  9. 9. Admin 96dYB88@£f%^4008+ Password Username Myth #3 Passwords prove the identity of authorized users.
  10. 10. Admin P4ssw0rd Password Username Truth 63% of confirmed data breaches leverage a weak, default or stolen password.
  11. 11. Myth #4 No one falls for phishing anymore.
  12. 12. Truth Phishing is on the rise. 30% of phishing emails are opened. And about 12% of targets go on to click the link or attachment.
  13. 13. Myth #5 Cyber-espionage attacks are widespread and increasing.
  14. 14. Truth Money remains the main motive for attacks. 80% of analyzed breaches had a financial motive. Make your defenses good enough and attackers will move on to easier targets.
  15. 15. Myth #6 It’s all too complicated. The bad guys have won. ! !
  16. 16. Truth 95% of breaches fit into just nine attack patterns. Understand them and you’ll be better able to make the right investments and protect your organization. BANK 000000
  17. 17. We use the insights from the DBIR to shape our own security portfolio. That way, we can deliver the best possible protection to our customers. You can use it too. Drive your security decisions with the DBIR. BANK 000000
  18. 18. We wrote the book on cybersecurity. Read the 2016 DBIR to understand what you’re up against: www.VerizonEnterprise.com/DBIR2016
  19. 19. © 2016 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. PTE16717 04/16 Contact us >

×