Will your organization, or one you work with, suer a security breach thisyear? Nobody’s immune, no target is too small, or too large. The methodsused by hackers to gain access to data are numerous, wide-reaching andever-growing. This isn’t a threat you can aord to ignore.
All kinds o organizations — rom government agencies to iconic consumerbrands, internet startups to trusted nancial institutions — have reported majordata breaches in the last year. Many o the stories that hit the headlines arerom the US, but this year’s Data Breach Investigations Report (DBIR) prolesdata breaches rom 27 countries. This is not a localized problem, or one that youcan aord to ignore. Forty-six US states already have public disclosure laws,and governments around the world, including the European Union, are activelydiscussing introducing mandatory reporting requirements o their own.Keeping on top o the threat landscape is a constant challenge. The best wayto eectively prepare yoursel is with hard data and expert analysis. The DBIRanalyzes data rom 19 organizations — covering more than 47,000 reportedsecurity incidents and 621 conrmed data breaches rom the past year. It givesunparalleled insight into the attackers and their methods, enabling you to betterprotect yoursel.This executive summary examines three commonly held assumptions aboutdata security, and casts new light on the real risks based on the data that we’vegathered. We’ll look at the threat o espionage attacks on organizations o allsizes, how attacks are conducted, and your most eective deense against them.It will help you to make more inormed data security decisions and reduce yourexposure to nancial loss and reputational damage.
76% o network intrusionsexploited weak or stolencredentials. Strict policiesare required to reduce thiseasily preventable risk.
Social tactics — usingemail, phone calls andsocial networks to gaininormation on individuals— are oten ignored, butcontributed to 29% oattacks.
Disclosure laws mean that you can’t keep quiet about abreach while you deal with the allout. As well as trying toavoid being hacked in the rst place, organizations needto be able to spot compromises quickly and minimize theamount o data lost.
2013 DATA BREACH INVESTIGATIONS REPORT
69% o breaches werespotted by an external party— 9% were spotted bycustomers.
Verizon has been producing the Data Breach InvestigationsReport since 2008. This year its analysis covers more than47,000 security incidents. Its scale is unparalleled.