Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Database
    • Storage

    Your Data Breach Was Probably Avoidable

    Written by

    Roy Mark
    Published June 11, 2008
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Although it has been a widely held belief among companies that insiders are responsible for most data breaches, a new study released June 11 claims 73 percent of breaches result from external sources versus 18 percent from insider threats.

      Skewering some basic corporate security tenets, the study by Verizon Business also contends nearly 9 in 10 data breaches could have been prevented with reasonable security measures in place. The study covered four years and more than 500 investigations involving 230 million records.

      Moreover, the study claims, most breaches resulted from a combination of events rather than a single action with 62 percent attributed to “significant internal errors” that either directly or indirectly contributed to a breach. For breaches that were deliberate, 59 percent were the result of hacking and intrusions.

      “Security breaches and the compromise of sensitive information are very real and growing concerns for organizations worldwide,” Peter Tippett, vice president of research and intelligence for Verizon Business Security Solutions, said in a statement. “This report can help companies better understand data breaches — how they occur and the commonalities that exist.”

      Most importantly, Tippett said, corporations must be “proactive in their approach to security — the absolute key to safeguarding data.”

      The study also said 9 of 10 breaches involved some type of “unknown,” including systems, data, network connections and account user privileges. In addition, 75 percent of the breaches studied were discovered not by the victim company but by a third party.

      “This report clearly shows it’s not about clever or complex security protection measures,” Tippett said. “It really boils down to doing the basics from planning to implementation to monitoring of the data.”

      That begins, the report notes, with keeping track of corporate data.

      “In the modern organization, data is everywhere and keeping track of it is an extremely complex challenge,” the report states. “The fundamental principle, however, is quite simple — if you don’t know where data is, you certainly can’t protect it.”

      Among the chief recommendations of the study is to align process with policy, claiming that in 59 percent of data breaches, the company had security policies and procedures in place but not implemented. An even more striking finding of the study was that in 82 percent of the breaches, evidence was available to the organization prior to actual compromise.

      The study also found a significant increase in the number and type of international data attacks, particularly from China and Vietnam. Those attacks often involved application exploits that led to a data breach. Attacks from the Middle East, on the other hand, often involved site defacements. IP addresses from Eastern Europe and Russia are commonly associated with the compromise of point-of-sale systems.

      “As the world becomes more interconnected through information technologies, as enterprises aggressively seek global partnerships and as the laws governing the handling and disclosure of such incidents mature, it is likely that this upward trend of international data breaches will continue,” the study concluded.

      Roy Mark
      Roy Mark

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×