Better safe than sorry

May 2013
Urgent Communications;May2013, Vol. 31 Issue 5, p9
Trade Publication
The article discusses the "2013 Data Breach Investigations Report" from Verizon. Data showed that hacking was a factor in 52 percent of data breaches covered by the study. Malware played a role in 40 percent of data breaches. Small businesses are affected more by hacking and malware than large businesses, according to Verizon's senior analyst Marc Spitler.


Related Articles

  • Verizon Reports Rise In Cyber Espionage And Phishing Attacks.  // Defense Daily;5/6/2013, Vol. 258 Issue 27, p3 

    The article presents information on the Data Breach Investigations Report from Verizon Communications Inc., according to which data breaches resulting from phishing attacks have increased four times during 2012. The company says that the increase in phishing activity has been due to rising cases...

  • Data Breaches in 2011 Dominated by Malware, Hacking.  // CIO Insight;3/1/2012, p1 

    The article focuses on the 2012 Data Breach Investigation Report (DBIR) conducted by Verizon Communications, Inc. It mentions that hacking and malware are the most common attack vectors encountered by the company. It reveals several severs that are breached in 2011 including database servers,...

  • Malware Antimalware Games. Singh, Anshuman; Lakhotia, Arun; Walenstein, Andrew // Proceedings of the International Conference on Information Warfa;2010, p319 

    Game theory has been used to model several areas of information security like network security, intrusion detection, information warfare and security investment. We first survey the game theoretical approaches in these areas of information security. We then explore the role of game theory in...

  • If hackers don't exist governments would have to invent them.  // Flare (Pakistan);8/15/2012, p49 

    The article reports on the factors contributing to the occurrence of data breaches, as identified by the Private Rights Clearinghouse. The clearinghouse asserts that data-breach incidents were usually caused by the loss or improper disposal of paper records, portable devices and desktop...

  • Data Breaches Increase, but Data Loss Drops. Eddy, Nathan // Channel Insider;4/19/2011, p1 

    The article focuses on the 2011 Data Breach Investigations Report (DBIR) of Verizon Communications Inc. and the U.S. Secret Service which indicates for the increase of data breaches but low volume of data loss. It states that the contradiction of records stems from the tactical change of...

  • E-Mail Scams Target Deep-Pocketed Victims. Larkin, Erik // PCWorld;Sep2007, Vol. 25 Issue 9, p65 

    The article focuses on different electronic mail scams that target executives and other high-level employees. Victims who open attachments or follow download links pick up a malware infection and may surrender control of their computers, hand over the keys to their corporate banking network,...

  • Lessons in Securing Data. Amato-McCoy, Deena M. // Chain Store Age;May2008, Vol. 84 Issue 5, p130 

    The article discusses several lessons from the breach of security at Hannaford Bros. As more details about the attack surfaced, however, reports implied that savvy outside hackers were behind the attack. By somehow installing damaging malware on the chain's servers, the thieves intercepted...

  • Threat Stats.  // SC Magazine: For IT Security Professionals (15476693);Nov2013, Vol. 24 Issue 11, p10 

    Several charts and graphs are presented that offer cyber security data including a chart on the encounter rate in October 2013 of web malware across a selection of industry verticals, a graph showing the spam rate volume by month for each region, and a list of top 5 attacks used by foreign hackers.

  • Find out who's trying to find you. Irvine, Robert // Web User;8/13/2014, Issue 351, p3 

    An introduction is presented in which the editor discusses articles within the issue on topics including who is searching for one online, hacking windows 8's start screen, and how to prevent computers from malware.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics