Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and even education, according to the Verizon 2017 Data Breach Investigations Report (DBIR).
Almost 2,000 breaches were analysed for this year’s report and it was found that more than 300 were espionage-related, many of which began as phishing emails.
Verizon also found that criminals made even more use of ransomware to extort money from victims, with this year seeing a 50 per cent increase in these attacks compared to 2016. However, despite this increase and associated media coverage surrounding ransomware, the research revealed that many organisations are still relying on out of date security measures and aren’t investing in security precautions.
Verizon said that these companies are actually choosing to pay a ransom demand instead of investing in security services that could prevent a potential cyber attack.
George Fischer, president of Verizon Enterprise Solutions, said: “Insights provided in the DBIR are leveling the cybersecurity playing field. Our data is giving governments and organisations the information they need to anticipate cyber attacks and more effectively mitigate cyber risk.
“By analysing data from our own security team and that of other leading security practitioners from around the world, we’re able to offer valuable intelligence that can be used to transform an organisation’s risk profile.”
The report also found that 51 per cent of data breaches analysed involved malware. Ransomware rose to the fifth most common specific malware variety.
Phishing is still a popular tactic used by criminals, according to the report. Verizon found that 95 per cent of phishing attacks were linked to software installation on the victim’s device. Meanwhile, 43 per cent of data breaches utilised phishing, and it is used in both cyber-espionage and financially motivated attacks.
According to the report, smaller companies are also a target. Some 61 per cent of victims analysed by Verizon were businesses with fewer than 1,000 employees.
Share This Post, Choose Your Platform!
With over 25 years in the business telecoms industry and an unrivalled reputation of delivering excellent, personal customer service, Arrow is one of very few companies in the UK able to provide a full telecoms, IT and energy consultancy and service proposition.
Savings through automation, scale, improved service. We’ve got that covered. But the true value comes with empathy, through empowerment, collaboration. It’s connecting people that drives us forward. It’s people that make tomorrow happen.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.