Knowledge

11/3/2017

Digital Edge’s Contribution to the Verizon Security Breach Report 2017

This year, Digital Edge served as a contributor for Verizon’s Security Breach report by providing details and our analysis of our client’s breach reports (Note: None of our Client Confidentiality was Compromised. The Report Contains Attempts that were either Unsuccessful or Diverted by the Digital Edge Security Team). Every year they analyze and highlight security information of many companies to the public. This report generally includes the amount, the types and the success rate of the attacks; which is used in order to provide information and raise awareness of this ever-growing issue. Digital Edge analyzed the types of vulnerabilities, as well as, kept record of client uptime and recovery period. This is all elaborated upon in the Security Breach Report on a broader spectrum, combining our information with other contributors. Reporting internal data to Verizon is not mandatory, these statistics only portray those breaches which have been voluntarily recorded therefore statistical trends are valid and extremely interesting.

From the general reports, the most targeted are financial organizations which accounted for about 24% of the attacks. It is no surprise, that Financial Organizations accounted for the majority of those targeted, with 73% of total breached being financially motivated - extortion being the primary goal – using malware installed via corrupt email attachments.

A major key to point out in these exploitations is that they happen within hours or even minutes; however, identifying and fixing the problem can take days. Systems are built very securely now which make it difficult for a hacker to invade; however, once they get in it is very easy for them to extract a lot of information very quickly. From the IT stand point, once breached, it can take a while to identify, heal and recover from the damage that was done. Although this is an area of concern, the process of mending the vulnerability is developing and becoming faster. Digital Edge works hard to keep this recovery time period as short as possible and to get clients back on their feet as quick as possible.

From the report, we compiled a list of industries surveyed on the amount of attempted attacks versus successful attacks. The percentage shows the approximation of successful attacks on the industry (note: these are not 100% accurate because the sample sizes are very different and not all industries are mandated to report) which gives us information of how industries are protected. Financial industries are leading targets; and although the success rate is 47%, it decreased from 58% last year, showing improvement on their security system. Generally, the percentage of success lessened compared to last year’s reports even though some are still alarmingly high. Many things can factor into this, however, security systems are improving and making it harder for hackers to get in.

Below is the full table of industries, attacks attempted, successful attacks, and the percentage, as previously mentioned:

Department Total Attempted Attacks Total Breaches Percentage of Successful Attacks
Accommodation 215 201 93%
Administrative 42 27 64%
Agriculture 11 1 9%
Construction 6 2 33%
Education 455 73 16%
Entertainment 5,534 11 0.1%
Finance 998 471 47%
Healthcare 458 296 64%
Information 717 113 15%
Management 8 3 37%
Manufacturing 620 124 20%
Mining 6 3 50%
Other Services 69 50 72%
Professional 3,016 109 3%
Public 21,239 239 1%
Real Estate 13 11 84%
Retail 326 93 28%
Trade 20 10 50%
Transportation 63 14 22%
Utilities 32 16 50%
Unknown 8,220 68 0.8%

 

Digital Edge feels that IT departments need to focus on strengthening the security process so it has a faster recognizing and recovery rate. This can help prevent intruders and protect important company information; as well as bring down the success rate of attacks.

It should also be noted that breaches that happened years ago could still have vulnerabilities that can be exploited to do more damaging. This can be extremely dangerous since the original breach that happened a while ago, could still pose a potential threat.

Overall, we believe that there are 3 factors that IT professionals should be concentrating on at this time:

  1. Visibility. With the tools such as Big Data, more information can be collected and be available for alerting, in addition to analysis.
  2. Security Intelligence. The security information collected with big data tools should be aggregated and enriched by Structured Threat Information through STIX/TAXII mechanisms for alerting, automatic decision making, as well as future analysis. 
  3. Analysis. Security Event and Incident Management Systems should allow CIRT (Computer Incident Readiness) to analyze incidents quickly.

We suggest that everyone reads the full report.

Verizon is doing an excellent job collecting these statistics and compiling the data to help keep all of us informed.

Stacey Petrov
Marketing and PR specialist

Stacey is a student of Media Marketing Management and assists Digital Edge marketing team with PR and content development. Stacey posesses great writing skills as well as knowlegde of technology and Digital Edge operation.

Was this article helpful?