Access "What’s to be done about data breach discovery?"
This article is part of the 2 July 2013 issue of Business value from the internet of things
The time from initial compromise by cyber attackers to when the victim first learns of the incident continues to be measured in months and even years, not hours and days, according to Verizon's recently released 2013 Data Breach Investigations Report (DBIR). What does this mean for business? According to the Verizon report, 66% of breaches in the past year took months or more to discover breaches, which means most attackers are able to exfiltrate data and scout around in the IT systems of a targeted business for weeks before they are discovered. While intrusion prevention is crucial, the DIBR says businesses must accept the fact that no barrier is impenetrable. Detection and response represents a critical line of defence. According to Verizon, businesses need to stop treading detection and response like a backup plan if things go wrong. Instead, businesses should make detection and response capabilities a core part of their security plan. Logging and monitoring, for example, are critical to detecting activity that could lead to a breach and preventing or ... Access >>>
Premium Content for Free.
What’s to be done about data breach discovery?
by Warwick Ashford
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days
- What’s to be done about data breach discovery? by Warwick Ashford
Giving UK SMEs the digital tools they need
by Eva Eisenschimmel
It is vital that organisations use the digital tools at their disposal to ensure they are able to take advantage of growth opportunities.
- Giving UK SMEs the digital tools they need by Eva Eisenschimmel
More Premium Content Accessible For Free
In this week’s Computer Weekly, as Scotland goes to the polls to vote on independence, we assess the IT challenges the country would face. We look at...
In this week’s Computer Weekly, we look at how the power of public cloud is helping scientists to tackle diseases such as cancer and malaria. Big ...
This article in our Royal Holloway Security Series analyses the security risks of Vehicular ad-hoc networks (Vanets), an important component of ...