2016 Data Breach Investigations Report (DBIR) & Cybersecurity on SlideShare

19
Are you doing cybersecurity wrong? Myth busting with the DBIR team.

Transcript of 2016 Data Breach Investigations Report (DBIR) & Cybersecurity on SlideShare

Are you doing cybersecurity wrong?Myth busting with the DBIR team.

This document and any attached materials are the sole property of Verizon and are not to be used by you other than to evaluate Verizon’s service.

© 2016 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its a�liates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners.

Proprietary statement.

Are you doing cybersecurity wrong?

The Data BreachInvestigations ReportThe 2016 Data Breach Investigations Report (DBIR) provides insights based on over 100,000 incidents, including analysis of 2,260 confirmed data breaches to reveal what’s really happening in cybercrime.

There are many myths surrounding cybersecurity. Fortunately, the DBIR is here toshine a light on the misnomers and half truths.

Join us as we set the record straight on cybersecurity.

MYT

HS

Myth #1Hackers always carefully select a target and then hit them with a zero-day attack.

TruthMost attacks are opportunistic, indiscriminate and exploit known vulnerabilities.

The top 10 vulnerabilities account for 85% of successful exploit tra�c. And the remaining 15% consists of over 900 Common Vulnerabilities and Exposures (CVEs).

Myth #2Attackers are fast. But the good guys are catching up.

DATA

TruthThe gap between compromise and detection is widening.

In 93% of breaches attackers take minutes or less to compromise systems.

But four out of five victims don’t realize they’ve been attacked for weeks or longer. And in 7% of cases, the breach goes undiscovered for more than a year.

DATA

Admin

96dYB88@£f%^4008+

Password

Username

Myth #3Passwords prove the identity of authorized users.

Admin

P4ssw0rd

Password

Username

Truth63% of confirmed data breaches leverage a weak, default or stolen password.

Myth #4No one falls for phishing anymore.

TruthPhishing is on the rise.

30% of phishing emails are opened. And about 12% of targets go on to click the link or attachment.

Myth #5Cyber-espionage attacks are widespread and increasing.

TruthMoney remains the main motive for attacks.

80% of analyzed breaches had a financial motive.

Make your defenses good enough and attackers will move on to easier targets.

Myth #6It’s all too complicated. The bad guys have won.

! !

Truth95% of breaches fit into just nine attack patterns. Understand them and you’ll be better able to make the right investments and protect your organization.

BANK

00

00

00

We use the insights from the DBIR to shape our own security portfolio. That way, we can deliver the best possible protection to our customers.

You can use it too.

Drive your security decisions with the DBIR.

BANK

00

00

00

We wrote the book on cybersecurity. �Read the 2016 DBIR to understand what you’re up against:

www.VerizonEnterprise.com/DBIR2016

© 2016 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. PTE16717 04/16

Contact us >