Some of the findings in the report include:
- Most data breaches came from external sources. But breaches attributed to insiders were much larger in scope than those caused by outsiders.
- Most breaches resulted from a combination of events rather than a single action. And some form of error often directly or indirectly contributed to a compromise.
- Most breaches go undetected for quite a while and many are only discovered by a third party rather than the victimized organization.
- Keeping track of data is an extremely complex challenge – often victims were unaware they even had the data that was stolen.
Bryan Sartin, director of investigative response at Verizon Business, told SCMagazineUS.com, “Instead of randomly targeting organizations, criminals are going after specific people. For example, if a criminal knows that a certain application is used at thousands of enterprises, and that it has security exposures, they will look for vendors who sell or support it.”
And then what happens? How do they exploit honest people? The answer, at least in cases where organized crime is involved, is that they don't. They look for individuals who are in financial straits, labor desperados, or other potential turncoats – typical organized crime exploitation tactics.
“Say an application call center is involved," Sartin said. "They will attempt to find a disgruntled employee and offer money for that person to identify potential enterprise targets."
The black market social network enables criminals to work with one another to find vulnerable systems, compromise data and commit large-scale identity fraud, the report claims. Within this social network, criminal conglomerates maintain access to hackers, fraudsters and other organized crime groups.
A complete copy of the report is available at: http://www.verizonbusiness.com/databreach.