Data breaches ‘becoming more complex and dangerous’
Published On: February 16, 2017 |
New research has revealed that data breaches are becoming more complex and no longer just impact the IT department, but now involve every department in affected companies.
The Verizon 2017 Data Breach Digest, the latest annual report from the company, found that every breach leaves a “lingering, if not lasting imprint on an enterprise”.
According to Verizon, humans have a significant role in data breaches and cybersecurity incidents. They are threat actors, targeted victims and incident response stakeholders. The report highlights that disgruntled employees are a significant threat to organisations.
The Data Breach Digest details 16 common breach scenarios, and explains how various stakeholders are affected, including corporate communications, legal counsel or the human resources department.
Bryan Sartin, executive director of the RISK Team at Verizon Enterprise Solutions, explained: “Data breaches are growing in complexity and sophistication. In working with victim organisations, we find that breaches touch every part of an organisation up to and including its board of directors.
“Companies need to be prepared to handle data breaches before they actually happen in order to recover as quickly as possible. Otherwise, breaches can lead to enterprise-wide damage that can have devastating and long-lasting consequences such as a loss of customer confidence or a drop in stock price.”
The 2017 Data Breach Digest highlights five actions an organisation should take immediately after suffering a breach. These include preserving evidence and being flexible by adapting to evolving situations.
Verizon also encouraged enterprises to establish consistent communication methods and to collaborate with other key stakeholders who may have more developed skills in certain areas. Organisations should also document their actions and findings, and be prepared to explain them when necessary, according to the report authors.
Share This Post, Choose Your Platform!
With over 20 years in the business telecoms industry and an unrivalled reputation of delivering excellent, personal customer service, Arrow is one of very few companies in the UK able to provide a full telecoms, IT and energy consultancy and service proposition.
Savings through automation, scale, improved service. We’ve got that covered. But the true value comes with empathy, through empowerment, collaboration. It’s connecting people that drives us forward. It’s people that make tomorrow happen.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.