Organised crime behind 85 per cent of all data breaches

By on

Verizon Business report finds more data being lost than ever before.

Organised crime accounted for 85 per cent of all data stolen in external attacks on companies, according to a report carried out by Verizon Business in conjunction with the US Secret Service.

The 2010 Verizon Data Breach Investigation Report used confidential information logged on the Verizon Incident Sharing Framework (PDF) alongside information provided to the Secret Service.

The figures also found a larger amount of data being lost within organisations than previously noted, but external attacks remain the number one way in which data is stolen with 69 per cent of all breaches.

"By adding our data to the Secret Service's, we were able to build up a better picture of data breaches, with many results found to be the same as earlier reports," said Matthijs van der Wel, managing principal for the forensics team at Verizon.

"The data we have now gathered, from both the US and worldwide, provides organisations with a clearer insight into the threats they face, and information on where they need to protect themselves against these risks."

Van der Wel added that 49 per cent of thefts that occur from inside an organisation are caused by employees abusing privileges, and that companies need to apply better data management policies to clamp down on this trend.

"Many organisations give employees too much access to certain levels of data. They should instigate more rigid controls to ensure that staff only have access to data they need, say, information from the last week or month," he said.

Companies should also look beyond simple username and password access to data, and use second factor authentication processes to prevent lost or stolen credentials being used to gain information.

Furthermore, data breaches occur most often via servers and online applications, but 87 per cent of victims had evidence of the breach on log files, yet failed to spot it.

"Many firms say it is impossible to spot a data breach in their log files, but we would suggest that if they look for anomalies in the amount of log-files, they could spot irregular patterns and find breaches this way," he said.

Copyright ©v3.co.uk
Tags:

Most Read Articles

Log In

Username:
Password:
|  Forgot your password?