Access "What’s to be done about data breach discovery?"
This article is part of the 2 July 2013 issue of Business value from the internet of things
The time from initial compromise by cyber attackers to when the victim first learns of the incident continues to be measured in months and even years, not hours and days, according to Verizon's recently released 2013 Data Breach Investigations Report (DBIR). What does this mean for business? According to the Verizon report, 66% of breaches in the past year took months or more to discover breaches, which means most attackers are able to exfiltrate data and scout around in the IT systems of a targeted business for weeks before they are discovered. While intrusion prevention is crucial, the DIBR says businesses must accept the fact that no barrier is impenetrable. Detection and response represents a critical line of defence. According to Verizon, businesses need to stop treading detection and response like a backup plan if things go wrong. Instead, businesses should make detection and response capabilities a core part of their security plan. Logging and monitoring, for example, are critical to detecting activity that could lead to a breach and preventing or ... Access >>>
Premium Content for Free.
What’s to be done about data breach discovery?
by Warwick Ashford
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days
- What’s to be done about data breach discovery? by Warwick Ashford
Giving UK SMEs the digital tools they need
by Eva Eisenschimmel
It is vital that organisations use the digital tools at their disposal to ensure they are able to take advantage of growth opportunities.
- Giving UK SMEs the digital tools they need by Eva Eisenschimmel
More Premium Content Accessible For Free
In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...
Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014.
This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of ...