Tag archive for : research
Tag archive for : research

Top 4 Insights from Verizon Data Breach Report 2017

verizon-dbir-2017-threat-actions

One of the best reports in the industry, the Verizon DBIR is jam packed with insights on network security and data breaches.

See the top three attacks that cause data breaches. Also check out the one thing used by 80% of successful hackers, and find out what attackers want most.

Continue reading

Filled under : Malware , Research , Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : malware , research , top threats

Phishing Attacks: 30% will open a scam email

computer-security-incident-oops

Verizon released its 2016 Data Breach Investigations Report, and along with it some astonishing facts about the prevalence and success of phishing attacks.

See why you shouldn’t be deceived by the simple nature of phishing emails and how they can worm their way into your company’s data.

Continue reading

Filled under : Research , Top threats
Author : Calyptix
Comment Number : No Comment Yet

Top 5 Sources of Security Incidents in Retail

computer-security-incident-oops

Russian cyber gangs, Chinese state actors, the hacker group Anonymous – who is the main source of security incidents? The answer might surprise you.

See the top five actors behind security incidents in the retail and consumer industries. You’ll get stats and analysis with a description of each source.

Continue reading

Filled under : pci dss , Research
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : PCI DSS , research , retail

Top 5 Risks of Cloud Computing

Everything-is-fine-office-cloud-fire

There is no denying it: cloud services are popular. But even if you feel that they are the best fit for your company, you should know that they do not come without risk.

See the top five risks of cloud computing, and see how sending your tasks to the sky might impact your data security, availability, and compliance.

Continue reading

Filled under : Research
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : research

Verizon Data Breach Report 2015: Top 10 Charts and Summary

DBIR chart significant threat actions over time by percent

See which threats are growing fastest, which industries are targeted the most, and how one in four data breaches last year hit a POS system.

You’ll get this and more in our summary of the Verizon 2015 Data Breach Investigations Report. The report is a whopper at 60+ pages. We highlight our 10 favorite charts to get you up to date and save you time.

Continue reading

Filled under : Research
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : research

Security Trends 2015: Mandiant threat report highlights

security-trends-attacked-industries-mandiant

Did you know more than 75% of phishing emails seen by Mandiant last year impersonated the IT staff or an antivirus solution? Scarey, right?

Learn more about this threat and others highlighted in Mandiant's latest report. You'll also see which industries are attacked most (not the ones you think) and why VPN is a growing target for attackers.

Continue reading

Filled under : Research , Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : research

PCI Compliance: 80% of merchants fail to maintain it

PCI-compliance-requirements-post-breach

PCI compliance is rising across the industry, but did you know that four out of five organizations that achieve compliance fail an assessment less than a year later? That finding and more comes from Verizon’s 2015 PCI Compliance Report.

In this post, see which PCI requirements are most correlated with having a data breach. You’ll also see why we expect a rise in card-not-present fraud and why maintaining compliance is so difficult.

Continue reading

Filled under : Regulations , Research
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : PCI DSS , research

Top 10 Security Vulnerabilities of 2013

top-10-external-security-vulnerabilities

The top cause of security vulnerabilities are outdated and unpatched systems. See the data to prove it, and know which types of systems are more commonly out of date.

Inside you'll see the top 10 external security vulnerabilities, the top 10 internal vulnerabilities, and the most common causes, all found in the 2014 Global Threat Intelligence Report.

Continue reading

Filled under : Research
Author : Calyptix
Comment Number : 2 Comments
Tagged on : research , vulnerabilities