Verizon'€™s 2016 Data Breach Investigations Report

Understand what you'€™re up against.

Cybersecurity'€™s most comprehensive investigations report is back.

Download the 2016 DBIR
Share 
  • More insightful than ever.

    For the ninth time, the 2016 Data Breach Investigations Report (DBIR) lifts the lid on what'€™s really happening in cybersecurity. The 2016 dataset is bigger than ever, examining over 100,000 incidents, including 2,260 confirmed data breaches across 82 countries. With data provided by 67 contributors including security service providers, law enforcement and government agencies, this year'€™s report offers unparalleled insight into the cybersecurity threats you face.

    Understand the risks—watch the 2016 DBIR video

  • No one is immune.

    Take a look through the list of published data breaches and one thing will immediately strike you: no location, industry or organization is immune from attack. Even with the strongest defenses, you can'€™t bank on not being breached. But you can deter the criminals. The 2016 Data Breach Investigations Report helps you understand how cybersecurity breaches occur, what the most likely attack types are for your industry and what techniques you can adopt to reduce the risk.

    And it'€™s not just for IT. A breach impacts the whole organization, so all senior executives need to understand the threats and be aware of the risks. Our executive summary gives you all the information you need in an easy-to-digest format.

    Read the executive summary

  • Listen to what'€™s happening in your industry.

    Our series of podcasts discusses the cybersecurity threats in your industry and what you can do to reduce the risk to your organization.

  • Healthcare

    How can healthcare providers protect patient data? Bryan Sartin and Brian Campbell reveal what'€™s happening.

    Bryan Sartin & Brian Campbell talk Healthcare Security

    A 7-minute Healthcare Cybersecurity Update

    Download MP3View Transcript

    A 7-minute Healthcare Cybersecurity Update

    Joe Maglitta: You're listening to the Verizon Insights podcast. The thoughts and opinions expressed in this podcast are those of the individual speakers and do not necessarily reflect the views of Verizon or any other entity mentioned in the podcast.

    Joe Maglitta: Hello everyone, I'm Joe Maglitta, principal at Maglitta Communications, former vice president of the Market Experts Group at Ziff Davis Enterprise, and a contributing editor for CIO Magazine. Joining us today is Bryan Sartin, Executive Director of Verizon Global Security Services. In the next few minutes we'll highlight findings from the Verizon 2016 Data Breach Investigations Report and offer some ways to better protect your organization. The 2016 report covers over 100,000 incidents, and 2,260 confirmed breaches from 82 countries. Bryan, welcome.

    Bryan Sartin: Good morning, Joe, thank you.

    Joe Maglitta: So let's get down to it. What are some of the headlines from this year's report, Bryan?

    Bryan Sartin: It's our ninth report and every year we try to take a little bit of a different slice at the threat landscape. There's no question about the role of spear phishing and how that is playing a big part especially on the initial intrusions of most types of cyber attacks these days. The use of malware in conjunction with phishing is starting to really illustrate to us that humans are now the slowest in the herd, if you will, from a vulnerability perspective. In other words, people are the easiest targets in a cyber attack. So, we talk a lot about that and really lay out the science on what that means today, and, of course, what to do about it. But for real statisticians and data gurus, we have the use of the attack this year. In this case you can start to look at the total dataset, hundreds of thousands of incidents, more than 2,000 confirmed data breaches. And we found a scientific way to boil those down to a series of playbooks, if you will, meaning the sequential sets of moves from pre attack research to initial point of intrusion to identifying targets of interest within the victim's enterprise to finding ways to exfiltrate that data, subsequent points of entry, and so forth. And we have a brilliant visual method of illustrating those in true color. And it's fantastic. I hope our readers have as much fun reading as we did putting it together.

    Joe Maglitta: So now that we've got a general overview of this year's findings, let's bring in Brian Campbell, Verizon's Managing Director of Professional Services for healthcare. Brian is going to help us take a closer look at the particular challenges in the Healthcare industry, and more importantly, solutions. Brian Campbell, welcome.

    Brian Campbell: Thank you, Joe, it's great to be here.

    Joe Maglitta: We’re going to go do a tag team approach here. Bryan Sartin will highlight the challenges in healthcare, and we'll ask Brian Campbell to come in and suggest some ways to counter this year's most pressing threats. Bryan Sartin, when you look at the data here, it looks like it's all about people as far as I can tell, specifically internal people in the organization.

    Bryan Sartin: It is. In fact, quite a bit about internal actors and in a lot of cases accidents—errors and omissions—are also playing a big role here. And you know, healthcare is very curious. It's actually similar in fact to the public sector when you look at the threat profile in terms of our findings. So you see that loss or stolen assets play a huge role there. And you think about the sort of diversity in the technology, IT, security and other types of devices that you see so prevalent all the way out to handheld and mobility and so forth in and around the healthcare field. No surprise that lost or stolen assets that have some type of sensitive information on them play such a big role. But then you get down to privilege misuse—the misuse and abuse of privileges. So these are existing privileges or some form of systems access granted to an individual—employee, contractor or otherwise—that are specifically misused or abused in the course of some type of cyber attack. These are predominantly inside jobs. That statistic is upward of 23 percent. And right behind that, miscellaneous errors at just about 20 percent picking up third place there. So as you put it, humans, particularly the employees are playing the largest role in their threat landscape.

    Joe Maglitta: Brian Campbell, what should healthcare organizations be doing to help counter against privilege misuse?

    Brian Campbell: The fact that privileged misuse amounts to 32 percent of the breaches that were discovered … that the biggest things that organizations can do are really just to monitor the employee's behavior. Being able to track USB usage. People taking that data and allowing or disallowing that ability by the employees. And also just really understanding and knowing your data and knowing if people have access to data that they should not in fact have. Because the majority of times, privileged misuses have been breached by disgruntled employees who are using that for financial gain.

    Joe Maglitta: And how about for the second major threat—lost and stolen assets? What are some of the simple but powerful things that organizations can be doing to help counter that?

    Brian Campbell: Yeah, with the lost and stolen data, this was larger than any other sector that was looked at within the report. The fact that information assets are lost over 100 times more often than they're stolen, the things that really can be looked at is just organizations ensuring that they have encrypted data. Because it's not necessarily intentional. It’s lost. So is that data encrypted? Looking at reducing paper, trying to find ways to eliminate as much paper as possible, and just really training employees so they understand when they have their phone, computer, assets leaving an organization, what care should be taken within those assets.

    Joe Maglitta: Are you seeing an increase in training programs and awareness programs in healthcare? Is that something in general that the industry is doing a good job at, or still has a ways to go?

    Brian Campbell: It absolutely still has a way to go. A lot of times it's the clinicians, it's the folks that don't necessarily fully understand the sensitive nature of the data that they have. And it's really ensuring they are made aware, and that awareness can really help reduce the amount of stolen data that occurs. Because again, that piece is not an intentional act. It's by the person who is giving up the data. You know, it's lost. It's not necessarily being stolen by somebody.

    Joe Maglitta: Last piece I want to put out here for you is something that really jumped out at me is that, if you think about the majority of these confirmed data breaches took place in minutes or less, pretty quickly. But in something like 55 percent of the cases it took months, many months or more for healthcare organizations to discover them. Are there some relatively simple organizational fixes and procedures that could be put in place to help bring down that time to awareness?

    Brian Campbell: Yeah, the fact that 56 percent of the incidents were discovered in days … in 62 percent of the cases, it took just minutes to get access to the system. So it's really ensuring the fact of: your data's encrypted—what security measures are in place. Because the bad people are getting in relatively fast. But it's taking a long time to discover what's happening inside of the environment. So truly understanding that environment is the critical piece to stopping it from ever happening.

    Joe Maglitta: Well that's about all we have time for. Thanks to our guests, Bryan Sartin, Executive Director of the Verizon Global Security Services. And to Brian Campbell, Verizon's Managing Director of Professional Services for Healthcare. And of course thanks to you, our listeners, for joining us today. To get your copy of the Verizon 2016 Data Breach Investigation Report, visit VerizonEnterprise.com/DBIR2016. That's VerizonEnterprise.com/DBIR2016. As always, find us on Twitter @VZEnterprise, or on LinkedIn. Have a great rest of your day.

  • Public sector

    Bryan Sartin and Jessica Hill discuss the threats to public sector organizations and how to mitigate the risks.

    Bryan Sartin & Jessica Hill talk Public sector Security

    Our Public sector Data Security Discussion

    Download MP3View Transcript

    Our Public Sector Data Security Discussion

    Joe Maglitta: You're listening to the Verizon Insights podcast. The thoughts and opinions expressed in this podcast are those of the individual speakers and do not necessarily reflect the views of Verizon or any other entity mentioned in the podcast.

    Joe Maglitta: Hello everyone, I'm Joe Maglitta, principal at Maglitta Communications, former vice president of the Market Experts Group at Ziff Davis Enterprise, and a contributing editor for CIO Magazine. Joining us today is Bryan Sartin, Executive Director of Verizon Global Security Services. In the next few minutes we'll highlight findings from the Verizon 2016 Data Breach Investigations Report and offer some ways to better protect your organization. The 2016 report covers over 100,000 incidents, and 2,260 analyzed breaches from 82 countries. Bryan, welcome.

    Bryan Sartin: Good morning, Joe, thank you.

    Joe Maglitta: So let's get down to it. What are some of the headlines from this year's report, Bryan?

    Bryan Sartin: It's our ninth report and every year we try to take a little bit of a different slice at the threat landscape. There's no question about the role of spear phishing and how that is playing a big part especially on the initial intrusions of most types of cyber attacks these days. The use of malware in conjunction with phishing is starting to really illustrate to us that humans are now the slowest in the herd, if you will, from a vulnerability perspective. In other words, people are the easiest targets in a cyber attack. So, we talk a lot about that and really lay out the science on what that means today, and, of course, what to do about it. But for real statisticians and data gurus, we have the use of the attack this year. In this case you can start to look at the total dataset, hundreds of thousands of incidents, more than 2,000 confirmed data breaches. And we found a scientific way to boil those down to a series of playbooks, if you will, meaning the sequential sets of moves from pre attack research to initial point of intrusion to identifying targets of interest within the victim's enterprise to finding ways to exfiltrate that data, subsequent points of entry, and so forth. And we have a brilliant visual method of illustrating those in true color. And it's fantastic. I hope our readers have as much fun reading as we did putting it together.

    Joe Maglitta: Now that we've got a good general overview of things, let's bring in Jessica Hill, Verizon's Manager of Professional Services for Public Sector. Jessica welcome.

    Jessica Hill: Thank you, good to be here.

    Joe Maglitta: So, we're going to use a tag team approach. Bryan Sartin will highlight the top challenges in public sector. And then Jessica will suggest some ways to counter this year's most pressing threats. So Bryan, as we look at the data, the public sector came under pretty heavy attack in terms of the numbers.

    Brian: Well yeah, first, did it really come under heavy attack? And unquestionably yes. Everyone should understand that we have more incidents for the public sector than we do any other victim sector. We're looking at just a little under 50,000 security incidents reported in this past year from the public sector alone. So we have a lot to say about what is, but also what is not happening in that sector as it compares to other sectors from affected defensive countermeasure strategy. And you see miscellaneous errors up there in excess of 20 percent, almost 25 percent. That's mistakes, errors and omissions on the part of the victims that are setting the stage for these types of attacks. Misuse, abuse of privileges, where employees, business partners, vendors, what have you, are explicitly misusing their privileges and their access for some form of unauthorized access or some type of data theft. Loss or stolen assets of course are up there pretty high in this sector as well as a few others. But also crimeware plays a very significant role in the public sector. Actually bigger than it does in any of the top ten sectors. So a very different threat pattern than you see in other sectors. And important to understand why it's different.

    Joe Maglitta: How much of that is due to an actual increase in activity, and how much of that is result of reporting requirements, particularly by the U.S. government agencies?

    Bryan Sartin: Well, it's a byproduct of contribution to our study. So we have, of course, public sector entities as entities in many states and other jurisdictions across the globe, and in certain sectors are required to disclose in some way, shape, or form, indications of security breach or especially data breaches that they experience within their enterprise or government agency. No question that's happening to a great deal within the U.S. agencies. So there's more reporting.

    Joe Maglitta: Jessica Hill, we have got an unprecedented number of internal and external attackers. I know there's no easy answer to this given the huge diversity of federal, state and local government capabilities and all the actors out there. What’s the recommendation here?

    Jessica Hill: Yeah, thank you. If you look at what types of breaches are happening, you see a lot of internal mistakes. There's some malicious activity happening, as well as some blatant accidents. And while the intent there is different, some of the ways you can mitigate are the same. So if you look at USB usage for example, lots of sensitive data is being removed and misplaced on USB drives. That can be controlled. There could be policies and procedures in place to limit the use of USB's and removing data. Also implementing a data loss prevention or DLP software greatly assists in limiting the amount of sensitive data that's transversed by e-mail. Those kind of policies really limit both malicious and inadvertent breaches. One of the trends you see in government is that the CIO level of management changes out about every two years, which is even shorter than the average CIO term in the private sector. And what you see there is a lot of confusion, there are policies that are adopted and then abandoned or maybe... policies that aren't totally understood or aren't implemented correctly when a new regime comes into power. So, when you look at the broader policies that need to be in place, and need to be effectively implemented, there really needs to be a lot of control over what data is out there, where and how is it stored, is it sensitive, who has access to it, and how do we dispose of it.

    Joe Maglitta: Jessica, one of the most dramatic numbers that jumped out from the report was the number of mistakes made by people mailing or e-mailing information to the wrong recipient. That seems so human and so common. We've all done it.

    Jessica Hill: The difference is when you're talking about the public sector, we're talking about very sensitive data that covers every U.S. citizen, potentially national security. Those kind of mistakes have big consequences. Just as in other sectors, you really want to limit the use of paper data. You don't want things lying around that are sensitive or potentially unsecured. I think that the usage of data loss prevention software helps lock down the e-mail capabilities to make sure that files are scanned, sensitive information is prevented from just being inadvertently sent out to the wrong recipient. So a few more points to consider is really understanding your data, understanding whether it's classified data, sensitive data, contains user records, financial records, citizen data or national and public security kinds of data. Knowing where that is in your network, who has access to it, how you protect it, and even more importantly how you dispose of that kind of data is really critical for the agencies to know, implement, and keep very strict policies around. I think that it really isn't an issue of if a breach is going to happen, but when it's going to happen, how do you mitigate it, how do you detect it? And then how do you make sure that the impact is minimal? The government is under everybody's scrutiny to make sure that they're protecting the citizens, they're protecting the borders, and any breach is seen as important and worrisome. So the government has probably the biggest mandate to ensure that all the data that they have is secure and any breach that happens is understood quickly and mitigated immediately.

    Joe Maglitta: That's about all we have time for. Thanks to our guests, Bryan Sartin, Executive Director of Verizon Global Security Services. And to Jessica Hill, Verizon's Manager of Professional Services for the Public Sector. And of course thanks to you, our listeners for joining us today. To get your copy of the Verizon 2016 Data Breach Investigations Report, visit VerizonEnterprise.com/DBIR2016. That's VerizonEnterprise.com/DBIR2016. As always, find us on Twitter @VZEnterprise, or on LinkedIn. Have a great rest of your day.

  • Manufacturing

    Bryan Sartin and Chintan Gohil lift the lid on what manufacturers should be doing to protect their data.

    Bryan Sartin & Chintan Gohil talk Manufacturing Security

    Smarter Manufacturing Security in 7 Minutes

    Download MP3View Transcript

    Smarter Manufacturing Security in 7 Minutes

    Joe Maglitta: You're listening to the Verizon Insights podcast. The thoughts and opinions expressed in this podcast are those of the individual speakers and do not necessarily reflect the views of Verizon or any other entity mentioned in the podcast.

    Joe Maglitta: Hello everyone, I'm Joe Maglitta, principal at Maglitta Communications, former vice president of the Market Experts Group at Ziff Davis Enterprise, and a contributing editor for CIO Magazine. Joining us today is Bryan Sartin, Executive Director of Verizon Global Security Services. In the next few minutes we'll highlight findings from the Verizon 2016 Data Breach Investigations Report and offer some ways to better protect your organization. The 2016 report covers over 100,000 incidents, and 2,260 analyzed breaches from 82 countries. Bryan, welcome.

    Bryan Sartin: Good morning, Joe, thank you.

    Joe Maglitta: So let's get down to it. What are some of the headlines from this year's report, Bryan?

    Bryan Sartin: It's our ninth and every year we try to take a little bit of a different slice at the threat landscape. There's no question about the role of spear phishing and how that is playing a big part especially on the initial intrusions of most types of cyber attacks these days. The use of malware in conjunction with phishing is starting to really illustrate to us that humans are now the slowest in the herd, if you will, from a vulnerability perspective. In other words, people are the easiest targets in a cyber attack. So, we talk a lot about that and really lay out the science on what that means today, and, of course, what to do about it. But for real statisticians and data gurus, we have the use of the attack this year. In this case you can start to look at the total dataset, hundreds of thousands of incidents, more than 2,000 confirmed data breaches. And we found a scientific way to boil those down to a series of playbooks, if you will, meaning the sequential sets of moves from pre attack research to initial point of intrusion to identifying targets of interest within the victim's enterprise to finding ways to exfiltrate that data, subsequent points of entry, and so forth. And we have a brilliant visual method of illustrating those in true color. And it's fantastic. I hope our readers have as much fun reading as we did putting it together.

    Joe Maglitta: So now that we've got a general overview of this year's findings, let's bring in Chintan Gohil, Verizon's Manager of Professional Services for Manufacturing, to help take a closer look at the particular challenges to the manufacturing industry. Chintan, welcome.

    Joe Maglitta: We’ll use a tag team approach here. Bryan Sartin will highlight the challenges in manufacturing, and Chintan will suggest some ways to counter this year's most pressing threats.

    Bryan Sartin: So if you look from a broader incident angle, denial of service and cyber espionage are unquestionably the greatest threats that you see in manufacturing. However, when you go into breaches, you see cyber espionage, privilege misuse—the misuse and abuse of privileges. And, of course, web application issues, particularly your Internet facing web applications being the greatest source of the problem there. And now cyber espionage: you're talking about specialty threat actors coming from far more different types of pockets around the world these days. Generally they're after data that gives them some form of leverage or advantage. And anybody who has trade secrets, intellectual property in large quantities, these are those traditional victims. But it's not just the IT or information technology sides of these enterprises that are the targets. It's also critical infrastructure, especially in manufacturing. It's not just IT; it's OT. It's the smart sensors, the devices, the robotics and so forth that control, operate and manage the manufacturing floors, the supervisory control and data acquisition or SCADA. And you have attacks that target the IT end of the business. But if they find their way into the OT side of a manufacturer, it sets the stage for not only a data breach, but also the ability for the threat actors to deny, disrupt or destroy that victim's ability to do business. And when that happens, that's a huge concern.

    Chintan Gohil: As companies deploy smart sensors, these smart sensors and smart controls are going to be able to impact things like flow and pressure in the critical infrastructure space. And companies are deploying these technologies to improve operating equipment efficiency. And what they want to do is bring in an ecosystem of players to be able to control their processes, both of their OEM manufacturers, people that are making these controls and flow devices and smart sensors. They want to give them access to an unprecedented level of data and to the environment so that they can tell third party analytics to say, "Hey, you know that boiler over there, that may be experiencing some problems and you may need to look at it right away." And in that case, the web app attack is also an area of concern for manufacturers because it's going to increase in the ability or the surface area because manufacturers are now going to give access to a whole bunch of information through web environments to partners and other third party providers.

    Joe Maglitta: So from what you're saying, it seems like this is an area that ought to be of increasing concern to manufacturers as we add smarter controls into processes.

    Bryan Sartin: It is unquestionably. You have new types of technologies: Internet of Things, OT (operational technology), industrial control systems into the manufacturing enterprise. These new technologies, be it sensors or otherwise are getting connected. They're hyper-connected. That connectivity naturally brings with it the potential avenue of intrusion and vulnerabilities. And most concerning in manufacturing are when you start looking at connecting new devices and new technologies into the OT end of the enterprise. Suddenly you're also adding connectivity and making older conventional applications. Sometimes, industrial control systems that have been there and operational at the enterprise for years, you know, you're making those suddenly visible to the outside world and the rest of your IT environments. These are ten- and fifteen year old applications. So just massive vulnerabilities.

    Joe Maglitta: So let's turn to solutions here for a moment. What are some steps that organizations and people listening today can take to begin to better protect themselves?

    Chintan Gohil: So, manufacturers are asking us to go from a few hundred connected devices to thousands, and in some cases, even millions of devices. And even if a very small percentage of those potentially millions of end points are smart, they have a potential to be breached. End point protection in that case becomes very, very critical. What tools are you going to need in terms of monitoring and responding? You need very specific end-point protection capabilities in a manufacturing environment. Then number two, you need the ability to integrate your network monitoring in your SOC—in your security monitoring. And then be able to make sense of the logging that you're pulling from these two environments.

    Joe Maglitta: Well that's about all we have time for. Thanks to our guests, Bryan Sartin, Executive Director of Verizon Global Security Services. And to Chintan Gohil, Verizon's Manager of Professional Services for Manufacturing. And of course thanks to you, our listeners, for joining us today. To get your copy of the Verizon 2016 Data Breach Investigations Report, visit VerizonEnterprise.com/DBIR2016. VerizonEnterprise.com/DBIR2016. As always, find us on Twitter @VZEnterprise, or on LinkedIn. Have a great rest of your day.

  • Retail

    Is shoppers'€™ data at risk? Bryan Sartin and Brad Rossiter describe the current threat landscape for retailers.

    Bryan Sartin & Brad Rossiter talk Retail Security

    Verizon Retail Cybersecurity Roundtable

    Download MP3View Transcript

    Verizon Retail Cybersecurity Roundtable

    Joe Maglitta: You're listening to the Verizon Insights podcast. The thoughts and opinions expressed in this podcast are those of the individual speakers and do not necessarily reflect the views of Verizon or any other entity mentioned in the podcast.

    Joe Maglitta: Hello everyone, I'm Joe Maglitta, principal at Maglitta Communications, former vice president of the Market Experts Group at Ziff Davis Enterprise, and a contributing editor for CIO Magazine. Joining us today is Bryan Sartin, Executive Director of Verizon Global Security Services. In the next few minutes we'll highlight findings from the Verizon 2016 Data Breach Investigations Report and offer some ways to better protect your organization. The 2016 report covers over 100,000 incidents, and 2,260 analyzed breaches from 82 countries. Bryan, welcome.

    Bryan Sartin: Good morning, Joe, thank you.

    Joe Maglitta: So let's get down to it. What are some of the headlines from this year's report, Bryan?

    Bryan Sartin: It's our ninth report and every year we try to take a little bit of a different slice at the threat landscape. There's no question about the role of spear phishing and how that is playing a big part especially on the initial intrusions of most types of cyber attacks these days. The use of malware in conjunction with phishing is starting to really illustrate to us that humans are now the slowest in the herd, if you will, from a vulnerability perspective. In other words, people are the easiest targets in a cyber attack. So, we talk a lot about that and really lay out the science on what that means today, and, of course, what to do about it. But for real statisticians and data gurus, we have the use of the attack this year. In this case you can start to look at the total dataset, hundreds of thousands of incidents, more than 2,000 confirmed data breaches. And we found a scientific way to boil those down to a series of playbooks, if you will, meaning the sequential sets of moves from pre attack research to initial point of intrusion to identifying targets of interest within the victim's enterprise to finding ways to exfiltrate that data, subsequent points of entry, and so forth. And we have a brilliant visual method of illustrating those in true color. And it's fantastic. I hope our readers have as much fun reading as we did putting it together.

    Joe Maglitta: So now that we've got a general overview of this year's findings, let's bring in Brad Rossiter, Verizon's Manager of Professional Services for Retail. Brad, welcome.

    Joe Maglitta: We'll be using a tag team approach here. Bryan Sartin will highlight the challenges in retail, and Brad will suggest some ways to counter this year's most pressing threats.

    Bryan Sartin: Yeah, absolutely. In retail, if you look at incidents spanning all situations that we see inclusive of breaches, denial of service attacks are a huge percentage of the attack surface. So you're getting upwards of,45, 50 percent in terms of total numbers. So something critical to understand of course … the impact that these have to deny, disrupt and destroy the victim's ability to conduct business. But then point of sale attacks within incidence pull up a very close second in the mid 30s. But if you focus almost entirely on breaches, which denial of service attacks are not, take the incidents off the table and just focus on those scenarios that lead to the theft of information, then suddenly what you see is that point of sale intrusions climb massively up into the 90 plus percentile range for retail.

    Joe Maglitta: So, I want to go to the solution side of this, Brad Rossiter, given limited resources, and given a range of threats here, where should retail companies be focusing?

    Brad Rossiter: Well certainly, but we have to understand what the retailer's motivations are, and where they're going with their businesses today? So they're trying to create a unified shopping experience—where it's all one seamless customer experience. So whether or not these attacks are one form or another, everything is sort of symbiotically connected. Brand reputation is really something that can be hurt through a DOS attack? If your brand suffers reputation damage, you're not going to able to inspire the confidence in your customers. If you're losing data or their personal identifiable information or payment card information, you're going to lose reputation there as well. I believe that there needs to be a two pronged attack here against these incidents that are happening. Within a DDOS, or a Distributed Denial of Service attack, what we need to do is understand our attack surface. We need to isolate our key assets to help prevent devices from being used to launch attacks. And bottom line: if you don't need it, turn it off? If it's not necessary to do business, make sure that that is turned off. Also when you prepare for potential attacks you need to patch your servers, you need to patch your third party plug ins within your applications. You need to use your traditional IPS/IVS to identify when to block traffic. You need to monitor what's going on at all times. And you need to have a plan for when something does happen, what are you going to do about it? Do you have a playbook that will allow you to take the necessary actions so that you can minimize risk and maximize the business that you would otherwise be doing?

    I know some organizations are fearful of adding extra layers between their customers and selling things. But I think what's important to understand is that from a security perspective, we need to change the conversation … security is like the brakes on a racecar. They're not there to stop or slow anything down. They're there to allow the driver to get around the track faster. Just like businesses need to operate faster, but safely, because their competition is right there to take on their customer when they're not fulfilling that customer needs.

    Joe Maglitta: Well said. There's lots more in this year's report. Unfortunately that's all we have time for right now. I want to thank our guests, Bryan Sartin, Executive Director of the Verizon Global Security Services. And to Brad Rossiter, Verizon's Manager of Professional Services for Retail. And of course thanks to you all, our listeners, for joining us today. To get your copy of the Verizon 2016 Data Breach Investigations Report visit VerizonEnterprise.com/DBIR2016. That's VerizonEnterprise.com/DBIR2016. As always, find us on Twitter @VZenterprise, or on LinkedIn. Have a great rest of your day.

  • Myth busting with the DBIR team.

    The Data Breach Investigations Report (DBIR) has a long history of lifting the lid on the main causes of cybersecurity breaches. And the 2016 edition is no different. Our SlideShare leans on the DBIR to reveal the truth behind some common cybersecurity myths. Are attackers really that fast? Do people still fall for phishing? And is cybersecurity simply too difficult? Find out in the SlideShare.

    View the 2016 DBIR SlideShare


.