Home  |   Subscribe  |   Resources  |   Reprints  |   Writers' Guidelines

Report: Health Care Only Industry With More Internal Than External Cyber Incidents 

Ransomware attacks are a key cybersecurity threat for global organizations, warns Verizon's 2018 Data Breach Investigations Report (DBIR). Ransomware is the most common type of malware, found in 39% of malware-related data breaches—double that of last year's DBIR—and accounts for over 700 incidents. What's more, Verizon's analysis show that attacks are now moving into business critical systems, which encrypt file servers or databases, inflicting more damage and commanding bigger ransom requests. 

DBIR analysis also flags a shift in how social attacks, such as financial pretexting and phishing, are used. Attacks such as these, which continue to infiltrate organizations via employees, are now increasingly a departmental issue. Analysis shows that human resource (HR) departments across multiple verticals are now being targeted in a bid to extract employee wage and tax data, so criminals can commit tax fraud and divert tax rebates.

"Businesses find it difficult to keep abreast of the threat landscape, and continue to put themselves at risk by not adopting dynamic and proactive security strategies," says George Fischer, president of Verizon Enterprise Solutions. "Verizon gives businesses data-driven, real-life views on the cyber-threat landscape, not only through the DBIR series but also via our comprehensive range of intelligent security solutions and services. This 11th edition of the DBIR gives in-depth information and analysis on what's really going on in cybercrime, helping organizations to make intelligent decisions on how best to protect themselves." 

Major Findings in Summary 
The 11th edition of the DBIR continues to deliver comprehensive data-driven analysis of the cyber threat landscape. Major findings of the 2018 report include the following:

"Ransomware remains a significant threat for companies of all sizes," says Bryan Sartin, executive director security professional services at Verizon. "It is now the most prevalent form of malware, and its use has increased significantly over recent years. What is interesting to us is that businesses are still not investing in appropriate security strategies to combat ransomware, meaning they end up with no option but to pay the ransom—the cybercriminal is the only winner here! As an industry, we have to help our customers take a more proactive approach to their security. Helping them to understand the threats they face is the first step to putting in place solutions to protect themselves." 

Sartin continues: "Companies also need to continue to invest in employee education about cybercrime and the detrimental effect a breach can have on brand, reputation, and the bottom line. Employees should be a business's first line of defense, rather than the weakest link in the security chain. Ongoing training and education programs are essential. It only takes one person to click on a phishing email to expose an entire organization." 

Biggest Risks per Industries Analyzed 
This year's report highlights the biggest threats faced by individual industries and also offers guidance on what companies can do to mitigate against these risks. Key industry findings include the following:

Other industries examined within the report include accommodation and food services; professional, technical and scientific services; and manufacturing and retail. 

The Time to Act Is Now 
Sixty-eight percent of breaches took months or longer to discover, even though 87% of the breaches examined had data compromised within minutes or less of the attack taking place. While safety cannot be guaranteed, the following proactive steps can be taken to help keep organizations from being victims:

  1. Stay vigilant. Log files and change management systems can give you early warning of a breach.
  2. Make people your first line of defense. Train staff to spot the warning signs.
  3. Keep data on a "need to know" basis. Only employees that need access to systems to do their jobs should have it.
  4. Patch promptly. This could guard against many attacks.
  5. Encrypt sensitive data. Make your data next to useless if they are stolen.
  6. Use two-factor authentication. This can limit the damage that can be done with lost or stolen credentials.
  7. Don't forget physical security. Not all data theft happens online. 

— Source: Verizon