Verizon 2013 Data Breach Investigations
Report Highlights

Source: 2013 Data Breach Investigations Report

1
Some organizations will be a
target REGARDLESS of what they do.
Most become a target BECAUSE of
what they do.

Source: 201...
Industries Impacted Most
Analysis of more than 47,000 reported security incidents and 621 confirmed data
breaches from the...
Who Are the Perpetrators?
92% OUTSIDERS
14% INSIDERS
1% BUSINESS PARTNERS
7% MULTIPLE PARTIES
19% STATE-AFFILIATED
ACTORS
...
How Do Breaches Occur?
Used some form of hacking
Network intrusions exploited
weak or stolen credentials
Incorporated malw...
Top 10 Threat Actions for All Companies

See the top 20 threat actions broken down by company size in the full report.
Sou...
We’re Not Seeing Improvement
While it may be difficult to detect, positively identify, and respond to an intrusion
within se...
Get the full report and learn more about:
1.

Mobile device threats

2.

Most common motives behind the threats

3.

Most ...
Upcoming SlideShare
Loading in …5
×

2013 Data Breach Highlights

659 views

Published on

A look at the top findings from the Verizon 2013 Data Breach Report. Includes link to full report.

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
659
On SlideShare
0
From Embeds
0
Number of Embeds
32
Actions
Shares
0
Downloads
18
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

2013 Data Breach Highlights

  1. 1. Verizon 2013 Data Breach Investigations Report Highlights Source: 2013 Data Breach Investigations Report 1
  2. 2. Some organizations will be a target REGARDLESS of what they do. Most become a target BECAUSE of what they do. Source: 2013 Data Breach Investigations Report 2
  3. 3. Industries Impacted Most Analysis of more than 47,000 reported security incidents and 621 confirmed data breaches from the past year Breaches affected financial organizations Breaches occurred in retail environments and restaurants Network intrusions involved manufacturing, transportation, and utilities Network intrusions hit information and professional services firms Breaches impacted larger organizations 27 different countries are represented Source: 2013 Data Breach Investigations Report Presented by: wwt.com 3
  4. 4. Who Are the Perpetrators? 92% OUTSIDERS 14% INSIDERS 1% BUSINESS PARTNERS 7% MULTIPLE PARTIES 19% STATE-AFFILIATED ACTORS Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon Presented by: wwt.com 4
  5. 5. How Do Breaches Occur? Used some form of hacking Network intrusions exploited weak or stolen credentials Incorporated malware Involved physical attacks Leveraged social tactics Resulted from privilege misuse and abuse The proportion of breaches incorporating social tactics like phishing was FOUR TIMES HIGHER in 2012. Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon Presented by: wwt.com 5
  6. 6. Top 10 Threat Actions for All Companies See the top 20 threat actions broken down by company size in the full report. Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon Presented by: wwt.com 6
  7. 7. We’re Not Seeing Improvement While it may be difficult to detect, positively identify, and respond to an intrusion within seconds or minutes, our ability to do so should ostensibly increase the longer they poke around our internal networks. But unfortunately, we’re not really seeing that improvement. Figure 42: Percent of breaches that remain undiscovered for months or more Source: 2013 Data Breach Investigations Report Read the Full Report from Verizon Presented by: wwt.com 7
  8. 8. Get the full report and learn more about: 1. Mobile device threats 2. Most common motives behind the threats 3. Most common abusers – this may surprise you 4. What can your organization do Read the Full Report from Verizon Source: 2013 Data Breach Investigations Report Presented by: wwt.com 8

×