One of the best reports in the industry, the Verizon DBIR is jam packed with insights on network security and data breaches.
See the top three attacks that cause data breaches. Also check out the one thing used by 80% of successful hackers, and find out what attackers want most.Continue reading
Verizon released its 2016 Data Breach Investigations Report, and along with it some astonishing facts about the prevalence and success of phishing attacks.
See why you shouldn’t be deceived by the simple nature of phishing emails and how they can worm their way into your company’s data.Continue reading
Russian cyber gangs, Chinese state actors, the hacker group Anonymous – who is the main source of security incidents? The answer might surprise you.
See the top five actors behind security incidents in the retail and consumer industries. You’ll get stats and analysis with a description of each source.Continue reading
There is no denying it: cloud services are popular. But even if you feel that they are the best fit for your company, you should know that they do not come without risk.
See the top five risks of cloud computing, and see how sending your tasks to the sky might impact your data security, availability, and compliance.Continue reading
See which threats are growing fastest, which industries are targeted the most, and how one in four data breaches last year hit a POS system.
You’ll get this and more in our summary of the Verizon 2015 Data Breach Investigations Report. The report is a whopper at 60+ pages. We highlight our 10 favorite charts to get you up to date and save you time.Continue reading
Did you know more than 75% of phishing emails seen by Mandiant last year impersonated the IT staff or an antivirus solution? Scarey, right?
Learn more about this threat and others highlighted in Mandiant's latest report. You'll also see which industries are attacked most (not the ones you think) and why VPN is a growing target for attackers.Continue reading
PCI compliance is rising across the industry, but did you know that four out of five organizations that achieve compliance fail an assessment less than a year later? That finding and more comes from Verizon’s 2015 PCI Compliance Report.
In this post, see which PCI requirements are most correlated with having a data breach. You’ll also see why we expect a rise in card-not-present fraud and why maintaining compliance is so difficult.Continue reading
The top cause of security vulnerabilities are outdated and unpatched systems. See the data to prove it, and know which types of systems are more commonly out of date.
Inside you'll see the top 10 external security vulnerabilities, the top 10 internal vulnerabilities, and the most common causes, all found in the 2014 Global Threat Intelligence Report.Continue reading
This year's Verizon Data Breach Investigations Report has a lighter tone, but its data and analysis are as sobering as ever.
Get insights and charts from the report, and see which types of security incidents happen most often in your clients' industries.Continue reading