Premium Content

Access "Verizon DBIR: Organizations are forgetting computer security basics"

Marcia Savage, Editor Published: 17 Oct 2012

In the information security industry, we’re always hearing about cybercriminals becoming more sophisticated, developing increasingly insidious ways to break into corporate networks. And of course, there’s always a new product out there that will solve the latest threat. While there’s no doubt criminals are developing some pretty sneaky attack techniques – especially against certain organizations like defense contractors -- it turns out that the majority of cyberattacks are far from sophisticated. According to the 2012 Verizon Data Breach Investigations Report, 96 percent of all attacks weren’t tremendously difficult, and 79 percent of victims were targets of opportunity. So despite all the hand wringing over emerging threats, what happened most often was the old style crime of opportunity: Criminals seized on easily exploitable vulnerabilities to victimize organizations more than specifically targeting a company. While it was too early in April to say how attackers were able to break into Global Payments’ servers, the March 30 breach involving Utah ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Threat intelligence and risk: Why cybersecurity hangs in the balance
    ISM_0614.png
    E-Zine

    As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...

  • How to respond to the latest distributed denial-of-service attacks
    DDOS_attacks.png
    E-Handbook

    All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...

  • Figuring out FIDO as the first products emerge
    ISM_0514.png
    E-Zine

    The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...