Most organizations take months, years to discover a breach
Over 90 percent of data breaches are caused by external attacks, according to a new Verizon report
IDG News Service - Over 90 percent of data breaches are the result of external attacks and almost 60 percent of organizations discovered them months or years later, Verizon said in a report released at the RSA security conference on Wednesday.
Called the Verizon 2011 Investigative Response Caseload Review, it compiles statistics from 90 data breach cases investigated by the company's incident response team last year, and provides a preview of Verizon's larger annual report that will contain data collected from additional sources like national CERTs and law enforcement agencies.
The report concludes that 92 percent of data breach incidents have had an external cause, which conflicts with the findings of other security vendors, according to whom most data breaches are the result of internal threats.
"I think that's a bit of a myth in the security community," said Wade Baker, director of risk intelligence for Verizon Business. "There's fewer people inside of an organization than there are outside and I think it stands to reason that, by the numbers, we will have more external incidents."
However, Baker agreed that many insider actions resulting in data breaches get dealt with internally and aren't necessarily accounted for in Verizon's report, which only compiles information from incidents Verizon was called to investigate.
According to the report, the use of default or stolen credentials was one of the primary methods that attackers used to gain access to data in 2011.
Some organized crime groups have automated their attacks to scan for very specific ports, like those for remote desktop, pcAnywhere and similar products, and then they try to login with common or stolen passwords, said Chris Porter, principal for Verizon's RISK Team.
This problem is common with small businesses that outsource the administration of their IT systems to third-parties who offer remote support. These organizations should implement some type of access control for remotely accessible systems, like restricting which IPs are allowed to connect to them, Porter said.
Web-based attacks like SQL injection have a lower frequency and didn't even make the top ten list on the annual report that will be published later this year, Baker said. The rate of SQL injection attacks is usually much higher for financial services organizations.
One problem that doesn't seem to improve from year to year has to do with breach discovery. It takes the majority of organizations months to discover a breach and some of them even take years, according to Verizon.
Furthermore, the discovery of these breaches is usually the result of external action, like law enforcement agencies or other organizations informing the affected companies, Baker said.
Restricting outbound connections to ports that are necessary for the organization's communications is equally important as monitoring incoming traffic, Porter said. This is known as egress filtering and can help prevent breaches.
Whitelisting applications that are allowed to run on servers can prevent attackers from installing and executing malware on systems they've gained access to. It's much easier to allow only some applications and services to run and block everything else, than to build a list of malicious programs and continuously add to it, the Verizon researchers said.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts