Verizon outlines 9 causes of 94% of cyber attacks

An investigation by Verizon shows cyber-espionage is increasing, while POS attacks are falling

Cybercrime

Verizon's 2014 Data Breach Investigations Report has highlighted that the majority of cyber crime incidents are caused by nine identified attack patterns.

Its findings show that 94 per cent of attacks can be attributed to errors such as sending an email to the wrong person, crimeware, insider or privilege misuse, physical theft or loss, web app attacks, Distributed Denial of Service attacks (DDoS), cyber-espionage, point-of-sale intrusions and payment card skimmers.

This is the seventh annual report Verizon has released, analysing more than 1,300 confirmed data breaches and 63,000 reported security incidents.

After analysing ten years of data, Verizon discovered that different industries are open to different threats and each sector's problems can be attributed to just three main attack types.

The report used the example of the financial sector with 75 per cent of the total security incidents starting with web application attacks, DDoS and card skimming.

In contrast, 54 per cent of all attacks in the manufacturing industry stem from cyber-espionage and DDoS attacks.

Wade Baker, principal author of the Data Breach Investigations Report series, said: "By applying big data analytics to security risk management, we can begin to bend the curve and combat cybercrime more effectively and strategically.

"Organisations need to realise no one is immune from a data breach. Compounding this issue is the fact that it is taking longer to identify compromises within an organisation often weeks or months, while penetrating an organisation can take minutes or hours," Baker said.

The good news is that retail point-of-sale (POS) attacks are decreasing, although a larger dataset this year has shown cyber-espionage incidents have increased in comparison to last year's report.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021