Share

Related Stories

  • More breaches caused by staff than hackers
    The 2012 data protection survey undertaken by the Irish Computer Society (ICS) shows that a higher number of data breaches are the result of internal failures and lack of awareness than are the result of external theft.
  • Comment: Information management policies must address risk of human error
    Christian Toon, head of Information Security at Iron Mountain Europe, considers the growing number of avoidable data breaches that involve paper documents and advises businesses how to minimize these risks by getting to grips with information handling, management, storage and secure destruction.
  • DDoS attacks jump to top position on Trustwave’s web hacking report
    Distributed denial of service (DDoS) attacks jumped to the number one place on Trustwave’s Web Hacking Incident Database (WHID) for the second half of 2010, besting SQL injections as the most popular website attack method.
  • Food and beverage industry tops Trustwave list of industry data breaches
    The food and beverage industry is the most breached industry from an information security perspective, making up more than half of all industry data breaches in 2010, according to the Trustwave 2011 Global Security Report.
  • Trustwave report reveals companies making same old mistakes
    Compliance and security service provider Trustwave has released its 2010 Global Security Report. The company has found that companies are still suffering from attacks using familiar exploit types that have been around for years. Organizations are implementing new technologies without securing existing ones, the report found.

Top 5 Stories

News

Food and beverage industry has unsavory history of data breaches

07 February 2012

The food and beverage industry is the top target for cybercriminals for the second year in a row, according to the 2012 Global Security Report by Trustwave SpiderLabs.

The food and beverage industry made up 44% of data breach investigations conducted by SpiderLabs in 2011. The report’s findings are based on more than 300 data breach investigations and 2,000 penetration tests performed last year by SpiderLabs.

“The food and beverage industry was the top target of our investigations. That may be surprising. Most people might think that banks and governments would be at the top of the list”, said Nicholas J. Percoco, head of SpiderLabs.

“The criminal element wants to turn their criminal activity into money as quickly as they can. They go after the food and beverage industry because it tends to have high transaction volume….The criminals have found that those organizations have a low barrier to entry from an infiltration standpoint. Once they are in the environment, the lack of security awareness within those organizations affords them almost unlimited amounts of time to aggregate that data. They are then able to exfiltrate that data out of the environment and use it for fraudulent activities”, Percoco told Infosecurity.

Criminals are able to stay undetected in the breached environment for an average of 173.5 days, he noted.

Trustwave also found that franchise and chain stores are the top targets primarily because franchises often use the same IT systems across stores. If a cybercriminal can compromise a system in one location, they likely can duplicate the attack in multiple locations. More than one-third of 2011 investigations occurred in a franchise business, and this number is expected to rise in 2012.

According to the report, customer records remain a valuable target for attackers, making up 89% of breached data investigated. While trade secrets or intellectual property followed at a distant 6%, highly targeted attacks designed to go after that type of data remain a growing concern.

In addition, SpiderLabs found that global businesses still allow employees and system administrators to use weak passwords. Analyzing the usage and weakness trends of more than two million business passwords, Trustwave found that the most common password used by global businesses is "Password1" as it satisfies the default Microsoft Active Directory complexity setting.

“One of the top problems from an infiltration standpoint is remote access. This is a often the result of weak passwords”, Percoco observed.

Self-detection of compromises decreased in 2011 and only 16% of victimized organizations were able to detect the breach themselves, the report found. The remaining 84% relied on information reported to them by an external entity: regulatory, law enforcement, or the public.

This article is featured in:
Data Loss  •  Identity and Access Management  •  Internet and Network Security  •  IT Forensics  •  Malware and Hardware Security

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×