Data Breaches: Your Questions Answered
Transcript
- 1. The estimated financial loss from 700 million compromised records shows the real importance of managing data breach risks. Conducted by Verizon with contributions from 70 organizations from around the world. $400 MILLION 2015 DATA BREACH INVESTIGATIONS REPORT DATA BREACHES: YOUR QUESTIONS ANSWERED WHAT ARE THE BIGGEST THREATS? HOW CAN YOU REDUCE THE RISKS? GET THE FACTS.
- 2. PROPRIETARY STATEMENT This document and any attached materials are the sole property of Verizon and are not to be used by you other than to evaluate Verizon’s service. This document and any attached materials are not to be disseminated, distributed, or otherwise conveyed throughout your organization to employees without a need for this information or to any third parties without the express written permission of Verizon. © 2015 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners.
- 3. 2015 DATA BREACH INVESTIGATIONS REPORT What is the estimated average cost per record of a data breach? A: $201 B: 58¢ C: 9¢ Q1
- 4. 2015 DATA BREACH INVESTIGATIONS REPORT $254 per record $5M $15M $10M Across all breaches, the estimated average cost is just 58¢ per record. But this figure varies significantly with the number of records lost. 9¢ per record 20 million records 40 million records 60 million records 80 million records 100 million records 58¢. But it could be anything from 9¢ to $254.
- 5. 2015 DATA BREACH INVESTIGATIONS REPORT How long does it take an attacker to compromise your systems? A: Seconds B: Hours C: Days Q2
- 6. 2015 DATA BREACH INVESTIGATIONS REPORT In 38% of cases, it took attackers just seconds to compromise systems. And in 60% of cases, compromises happened within minutes.
- 7. 2015 DATA BREACH INVESTIGATIONS REPORT How long does it take an attacker to walk away with your data? A: Minutes B: Days C: Weeks Q3
- 8. 2015 DATA BREACH INVESTIGATIONS REPORT In more than a quarter (28%) of cases, it took attackers just minutes to exfiltrate data. 74%
- 9. 2015 DATA BREACH INVESTIGATIONS REPORT How long does it take you to find out there’s been a breach? A: Minutes B: Days C: Weeks Q4
- 10. 2015 DATA BREACH INVESTIGATIONS REPORT The detection deficit is growing over time. In more than a quarter of cases it took days or even months for organizations to discover a breach. % SYSTEMS COMPROMISED WITHIN DAYS % COMPROMISES DETECTED WITHIN DAYS
- 11. 2015 DATA BREACH INVESTIGATIONS REPORT Q5 How many vulnerabilities do you need to defend against? A: 10 B: 8,000 C: 7,000,000
- 12. 2015 DATA BREACH INVESTIGATIONS REPORT There were more than 7 million vulnerabilities exploited in 2014. But just ten accounted for 97% of incidents. Top ten vulnerabilities 97%
- 13. 2015 DATA BREACH INVESTIGATIONS REPORT What was the most common age of vulnerabilities seen in 2014? A: Seven years old B: Three years old C: Less than a year old Q6
- 14. 2015 DATA BREACH INVESTIGATIONS REPORT In 2014, we found more vulnerabilities dating back to 2007 than from any year between 1999 and 2014. 20071999 2014 And most attacks exploited known vulnerabilities where a patch has been available for months, often years.
- 15. 2015 DATA BREACH INVESTIGATIONS REPORT How many threats do I need to worry about? A: Thousands B: Millions C: Nine Q7
- 16. 2015 DATA BREACH INVESTIGATIONS REPORT DENIAL OF SERVICE ATTACKS CYBER- ESPIONAGE CRIMEWARE There are millions of threats, but we’ve identified nine patterns to help you prioritize your defenses. PAYMENT CARD SKIMMERS INSIDER AND PRIVILEGE MISUSE MISCELLANEOUS ERRORS WEB APPLICATION ATTACKS POINT-OF-SALE INTRUSIONS PHYSICAL THEFT AND LOSS
- 17. 2015 DATA BREACH INVESTIGATIONS REPORT How many phones/tablets are infected by high-impact malware? A: 10% B: 3% C: 0.03% Q8
- 18. 2015 DATA BREACH INVESTIGATIONS REPORT Mobile malware incidents are rare, and most are low-impact. But the potential threat is significant so you should consider using mobile device management. The equivalent of less than 0.03% of mobile devices are compromised by malware each year.
- 19. 2015 DATA BREACH INVESTIGATIONS REPORT Q9 How many recipients open phishing emails? A: 0.1% B: 11% C: 23%
- 20. 2015 DATA BREACH INVESTIGATIONS REPORT We’ve also seen phishing techniques getting more sophisticated. Many recent campaigns have been used to deliver malware which helps hackers compromise key systems. Users still fall for phishing attacks. 23% open phishing emails and 11% open the attachments.
- 21. 2015 DATA BREACH INVESTIGATIONS REPORT Q10 What do you want to do next? A: Get more information B: Identify high risks and prioritize C: Find out more about the cost of a breach
- 22. 2015 DATA BREACH INVESTIGATIONS REPORT You can do all three with the Verizon Data Breach Investigations Report (DBIR). Download the report now vz.to/DBIR15 The 2015 DBIR is based on the analysis of 2,122 data breaches and 79,790 security incidents from 61 countries, making it one of the most authoritative reports of its kind. 2015 DATA BREACH INVESTIGATIONS REPORT HEALTHCARE EDUCATION PUBLIC SECTOR HOSPITALITY FINANCIAL SERVICES RETAIL ENTERTAINMENT PROFESSIONAL MANUFACTURING TECHNOLOGY ADMINISTRATIVE TRANSPORTATION The estimated financial loss from 700 million compromised records shows the real importance of managing data breach risks.Conducted by Verizon with contributions from 70 organizations from around the world. $400 MILLION
- 23. © 2015 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. 04/15 vz.to/DBIR15