Data Privacy & Security Service Digital Digest_Summer 2018

Data Privacy & Security Service

Issue 12

CYBER YEAR IN REVIEW 2018 Verizon Data Breach Investigation Report Findings

The 2018 Verizon Data Breach Investigations report (DBIR) has been released. Use the link provided to access the full report: https://info.verizonenter- prise.com/VBM-2018-DBIR-ulp. html In a list of top industries subject to social breaches, education ranked third at 41%. Most data breaches in educa- tion fall into a miscellaneous category called “Everything Else”, accounting for 36% of data breaches. It is very dif- ficult to pinpoint a specific “4% of people will click on any given phishing campaign”- Verizon 2018 DBIR pattern these breaches fall under. However, W-2 scams were common, accounting for 22 instances in education this year. This may be due to the “open source natures of schools” (Verizon 2018 DBIR). Personal data is more readily disclosed by educational insti- tutions which may make them more vulnerable to these types of attacks. The second most common data breach method in education

is the Social attack, account- ing for 41% of breaches. Cy- ber-Espionage was prevalent in education with 25% of attacks falling under this pattern. The Hacking action type was dominant in education coming in at 72% because of the con- tinuing pervasiveness of DDoS (Denial of Service) attacks. Data breaches account for 44% of hacking actions while 16% of data breaches were due to human error. Here are some additional sta- tistics Verizon shared in their report: In 2017, there were over Who executed the breaches? • 73% of the breaches were perpetrated by outsiders • 28% involved internal actors • 50% of breaches were exe- cuted by organized criminal groups • 12% involved privilege mis- use 53,000 incidents and 2,216 confirmed data breaches.

• 76% of breaches were financially motivated • 48% of breaches featured hacking • 17% were social attacks • 30% included malware • 39% of cases where mal- ware was identified involved Ransomware • 49% of non-POS (Point of Sale) malware was installed via malicious email • 68% of breaches took months or longer to discov- er Verizon provides a summary of what you can do to thwart these breaches and attacks. Here are the basics: • Be vigilant • Make people your first line of defense • Only keep data on a need- to-know basis • Patch promptly • Encrypt sensitive data • Use two-factor authentica- tion • Don’t forget physical secu- rity

Data breaches by the numbers:

Page 3

Made with FlippingBook - professional solution for displaying marketing and sales documents online