Transcript

What the 2013 Verizon Data Breach Report tells us about phishing

WHAT THE $ 2013 VERIZON DATA BREACH REPORT TELLS US ABOUT PHISHING The Verizon Data Breach Report is the information security industry's own annual "State of the Union address" for data breaches. No other industry report compiles, analyzes, and reports on as much breach data from organizations around the globe. This year ThreatSim was invited to contribute phishing data to the report. Let's look at what the data tells about the state of data breaches: 1.1 BILLION COMPROMISED RECORDS COVERED BY THE REPORT OVER THE LAST UNE 621 REPORT Uш YEARS BREACHES IN THIS YEAR'S GG REPORT GG DATA ELEMENT DESIRED BY ALL THREAT ACTORS: CREDENTIALS 2 SIZE FITS ALL 45/120 NUMBER OF ESPIONAGE VICTIMS CONCEPT THAT MAKES SENSE FOR BASEBALL CAPS BUT NOT SECURITY PROGRAMS THAT ARE SMALLER THAN 1000 EMPLOYEES T-D 95% 47% MORE PHISHING AATTACKS INVOLVE PHISHING INVOLVE ATTACHMENTS IN 2013 OF ESPIONAGE ATTACKS OF MALWARE VECTORS A THE 2012 REPORT LIKELIHOOD OF GETTING AT LEAST 1 TARGET TO 80% CLICK ON A PHISH IF YOU RUN A CAMPAIGN TWICE OF BREACHES USED SOCIAL ENGINEERING OF THOSE BREACHES 29% PHISHING WAS USED 79% AS THE ATTACK VECTOR: 12 HRSO AMOUNT OF TIME THAT ELAPSES BETWEEN SENDING A PHISHING CAMPAIGN & RECEVING 1/2 THE TOTAL TARGET CLICKS OF AUTHENTICATION USER EDUCATION FACTORS THAT WILL GREATLY REDUCE MINIMUM NUMBER BEACON MONITORING USE OF STOLEN CREDENTIALS MOST EFFECTIVE METHODS BREACHES WERE DISCOVERED BY USERS FOR DISCOVERING SOMEONE MORE THAN TWICE AS OFTEN AS CLICKED ON A PHISHING MAIL NETWORK IDS IN LARGE ORGANIZATIONS NOTORIOUS B.I.G I REFERENCE Source: http://www.verizonenterprise.com/DBIR/2013/ C>ThreatSim y @ThreatSim www.ThreatSim.com CD CDCD

What the 2013 Verizon Data Breach Report tells us about phishing

shared by packetwerks on Apr 28
878 views
0 shares
0 comments
The Verizon 2013 Data Breach Investigations Report is the information security industry's own annual "State of the Union address" for data breaches. No other industry report compiles, analyzes, and re...

Publisher

ThreatSim

Category

Technology
Did you work on this visual? Claim credit!

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size