The 2013 Verizon DBIR once again hammered home the point that organizations aren't taking care of IT security basics. What are your reactions to the report? Can you provide some takeaways that organizations can implement before they are victimized by simple attacks in 2014?
Ask the expert
Have questions about enterprise security? Send them via email today! (All questions are anonymous.)
It has been interesting to watch the overall trends in the Verizon Data Breach Investigations Report (DBIR) over the years. The insider threat was the one to watch until just a few years ago. The 2013 edition of the Verizon DBIR shows that 92% of breaches originated from external sources, which represents a dramatic shift in the source of threats. This trend is forcing information security departments to refocus their priorities on protecting the company from external attacks.
One key takeaway from this report is that it doesn't seem that we are "winning the war." Don't get me wrong – we are putting up a valiant defense. However, I'm curious whether the increase in external data breaches corresponds with the IT budget crunch that started with the 2009 recession. Many IT security and technical teams are spending too much time nowadays just putting out fires due to a lack of resources. No one has the necessary resources and staff to implement the time-tested security practices of regular patching, vulnerability assessments and log monitoring, as demonstrated in the report. Investment in tools that automate these critical tasks should be a top priority for short-staffed IT security groups.
Another key takeaway is that our traditional security technologies are largely ineffective against highly targeted attacks. Threat actors are frequently turning to social engineering to find ways into the company through employees' personal lives. My advice on this front is to build network security in a multilayered, compartmentalized design. Assume that the attacker is going to get through some of your defenses, and build in monitoring to know how far they have progressed. Also, educate users on security threats, and consider applying additional security measures for executives or those with access to critical assets. By utilizing these steps, a company may stand a chance of not being a statistic in the 2014 Verizon DBIR.
Dig deeper on Data Loss Prevention
Related Q&A from Joseph Granneman, Security Management
An IT security governance board is a key feature in security budgeting, but who makes up this body? Expert Joseph Granneman outlines the best ...continue reading
The security data breach public response times from Target and Neiman Marcus were noticeably different. Expert Joseph Granneman explains which one ...continue reading
Security staffing can be tricky, but talent can be found in unconventional places. Expert Joseph Granneman explains the pros and cons of hiring data ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.