Access "Verizon DBIR: Organizations are forgetting computer security basics"
This article is part of the May 2012 issue of New security strategies for the bring-your-own-device era
In the information security industry, we’re always hearing about cybercriminals becoming more sophisticated, developing increasingly insidious ways to break into corporate networks. And of course, there’s always a new product out there that will solve the latest threat. While there’s no doubt criminals are developing some pretty sneaky attack techniques – especially against certain organizations like defense contractors -- it turns out that the majority of cyberattacks are far from sophisticated. According to the 2012 Verizon Data Breach Investigations Report, 96 percent of all attacks weren’t tremendously difficult, and 79 percent of victims were targets of opportunity. So despite all the hand wringing over emerging threats, what happened most often was the old style crime of opportunity: Criminals seized on easily exploitable vulnerabilities to victimize organizations more than specifically targeting a company. While it was too early in April to say how attackers were able to break into Global Payments’ servers, the March 30 breach involving Utah ... Access >>>
Premium Content for Free.
Mobile device management systems help mitigate BYOD risks
by Lisa Phifer, Contributor
Understand the benefits and limitations of multi-platform MDM technology.
Deploying DP systems: Four DLP best practices for success
by Crystal Bedell
Plan your data loss prevention project carefully to avoid missteps.
- Mobile device management systems help mitigate BYOD risks by Lisa Phifer, Contributor
VMware strategy for security partners undergoes overhaul
by Marcia Savage
Virtualization giant revamps its security partner program after hitting some bumps in the road.
Thwarting BYOD risks starts with a mobile security policy, experts say
by Robert Westervelt
Organizations need to establish formal mobile policies before buying a mobile device management system.
- VMware strategy for security partners undergoes overhaul by Marcia Savage
Verizon DBIR: Organizations are forgetting computer security basics
by Marcia Savage
Verizon data breach report illustrates need to get back to basics.
Cybersecurity education vs. cybersecurity training
by Ron Woerner, Contributor
Security professionals need to understand the difference and plan accordingly.
Security staffing: Why information security positions go unfilled
by Lee Kushner, Contributor
Be aware of potential roadblocks and adjust your recruiting accordingly.
- Verizon DBIR: Organizations are forgetting computer security basics by Marcia Savage
More Premium Content Accessible For Free
Unified threat management aspires to the enterprise class
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
Threat intelligence and risk: Why cybersecurity hangs in the balance
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
How to respond to the latest distributed denial-of-service attacks
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...