Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Symantec Threat Report Confirms New Era of ‘Mega Breaches’

Going for gold: Symantec’s Internet Security Threat Report  Volume 19, shows cybercriminals are focusing attention on huge data heists, rather than quick hits with smaller rewards.
Going for gold: Symantec’s Internet Security Threat Report Volume 19, shows cybercriminals are focusing attention on huge data heists, rather than quick hits with smaller rewards.

Symantec’s Internet Security Threat Report (ISTR), Volume 19, shows a significant shift in cybercriminal behaviour, revealing that cybercriminals are plotting for months before pulling off huge data heists, moving away from quick hits with smaller rewards.

“One mega breach can be worth 50 smaller attacks”, said Kevin Haley, director, Symantec Security Response. “While the level of sophistication continues to grow among attackers, what was surprising last year was their willingness to be a lot more patient – waiting to strike until the reward is bigger and better.”

In 2013, there was a 62% increase in the number of data breaches from the previous year, resulting in more than 552 million identities exposed. “Security incidents, managed well, can actually enhance customer perceptions of a company; managed poorly, they can be devastating”, wrote Ed Ferrara, VP and principal analyst, Forrester Research, in a blog. “If customers lose trust in a company because of the way the business handles personal data and privacy, they will easily take their business elsewhere.”

Defence is Harder than Offense

The size and scope of data breaches are exploding, putting the trust and reputation of businesses at risk. Each of the eight top data breaches in 2013 resulted in the loss of tens of millions of data records. By comparison, only one data breach reach that threshold in 2012.

“Nothing breeds success like success – especially if you’re a cybercriminal”, said Haley. “The potential for huge paydays means large-scale attacks are here to stay. Companies of all sizes need to re-examine, re-think and possibly re-architect their security posture.”

Targeted attacks were up 91% and lasted an average of three times longer compared to 2012. Personal assistants and those working in public relations were the two most targeted professions – used as a stepping stone toward higher-profile targets.

Symantec offers advice on how to better protect both consumers and organisations from a mega data breach, targeted attack or common spam. The report recommends the following best practices:

For Businesses:

  • Know your data: Protection must focus on the information – not the device or data centre. Understand where your sensitive data resides and where it is flowing to help identify the best policies and procedures to protect it.
  • Educate employees: Provide guidance on information protection, including company policies and procedures for protecting sensitive data on personal and corporate devices.
  • Implement a strong security posture: Strengthen your security infrastructure with data loss prevention, network security, endpoint security, encryption, strong authentication and defensive measures, including reputation-based technologies.

For Consumers:

  • Be security savvy: Passwords are the keys to your kingdom. Use password management software to create strong, unique passwords for each site you visit and keep your devices – including smartphones – updated with the latest security software.
  • Be vigilant: Review bank and credit card statements for irregularities, be cautious when handling unsolicited or unexpected emails and be wary of online offers that seem too good to be true – they usually are.
  • Know who you work with: Familiarize yourself with policies from retailers and online services that may request your banking or personal information. As a best practice, visit the company’s official website directly (as opposed to clicking on an emailed link) if you must share sensitive information.

 

What’s Hot on Infosecurity Magazine?