Tuesday, April 22, 2014

Verizon's Annual Data Breach Report

Week 7

Tomorrow, we will see the release of the annual report from Verizon that compiles and analyzes security incidents that happened over the year.  This year it will be a 60 page document that discusses the main security concerns.  This year, Verizon is reporting that 94% of all security related incidents in 2013 can be traced to 9 specific categories.  Oh, did I mention that there were more than 63,000 security incidents last year alone!  That means that over 59,000 of those incidents came from one of nine categories.  This should tell you that we need to concentrate on specific areas to help secure our data.  Throughout the rest of this blog, I'm going to go over these 9 threats.


  1. Web App Attacks - This attack is made through, you guessed it, your apps that you use on a daily basis.  This is the most common type of breach according to the report coming out.  You find an app that you think sounds great and you download it.  Not all apps are safe.  Some make it through app inspection and have viruses attached to them.  You download, click and now you have a virus.  Also, you are sometimes required to put in personal information to download the app.  A few guesses at your security questions and the hacker is in.  Please watch what you download.  Apps are scarier than you may think.
  2. Cyberespionage - Pretty much, hackers are gaining unauthorized access to systems and then hanging around and getting personal information and stealing data.  Keep software and security software up to date.  This should stop most of the hackers from getting into your system.  
  3. Point-of-sale intrusions - This is when a hacker gains access to a company's point-of-sale data.  These are the systems that take the payment transactions that occur through a card transaction and submit those payments to the company.  This is what happened with the Target incident this past year.  Hackers gained access to the point-of-sale transactions and was able to steal millions of users data.  Watch where you swipe that card.  In times that there are going to be millions of people making transactions with cards in a short amount of time, for example Black Friday, I would suggest to use cash or checks during that time.  Checks still have to go through a system process but it's not as unsafe as swiping that card.  
  4. Payment Card Skimmers - This is when a hacker plants a device on a card scanner.  This can be planted at a gas pump, ATM or even in Restaurants, but the later is harder to do because they could be seen planting it.  Anyway, these can sit undetected and take data such as card numbers and your PIN.  Watch where you swipe that card.
  5. Insider Misuse - This is simply put that someone on the inside (an employee) caused some sort of security issue to happen.  They could have allowed the wrong person into the building, gave information out to the wrong person over the phone or they could have used the systems within in the wrong way.  
  6. Crimeware - This is like cyberespionage but deals with more illicit activities like stealing banking or financial information.  This can be done by creating fake webpages to make the user think they are on their banking site.  Keep your browsers up to date and anti-virus software and firewalls up to date as well.
  7. Miscellaneous Errors - These are common errors that occur that open up a security concern.  Nothing to do about this section other than to watch what you do when completing your job.
  8. Physical Theft/Loss - Of course, this is just theft and loss of equipment.  Make sure you have proper physical security and insurance to help combat these losses.  You don't want to lose all your computers and find out that you cannot replace them with insurance money.  
  9. Distributed Denial-of-Service Attacks (DDoS) - Ah, the DDoS!  One of the most common tools of a hacker.  These attacks are a flood of attacks from multiple machines.  The flood of information from the machines essentially makes the victim computer shut down and cause a denial of service and systems to the users that need that machine.  For instance, several hackers can start to send requests to access a Web Server.  That server gets too many of those and it shuts down.  The users that really need that server cannot access it anymore, thus a DDoS has occurred.  Keeping software and security software up to date can help but cannot help stop it from occurring if there are too many attacking.  Software like Wireshark can help determine if there are multiple users trying to access a specific device, which can allow you to get ready and do something about the attack, but Wireshark will not help stop the attack all together.  


The main point in this is, watch what you download, keep software up to date, make sure that you have proper anti-virus installed and a firewall defending your computer, and keep passwords and personal data to yourself.  The Internet is a dangerous place.  You are the person in charge of your security.  Don't get mad when you are hacked but yet have no defense on your computer.  



Reference:

Lev-Ram, M. (2014). New cyber-threats that go bump in the night. Retrieved April 22, 2014 from http://tech.fortune.cnn.com/2014/04/22/new-cyber-threats-that-go-bump-in-the-night/?section=magazines_fortune

No comments:

Post a Comment