Access "What’s to be done about data breach discovery?"
This article is part of the 2 July 2013 issue of Business value from the internet of things
The time from initial compromise by cyber attackers to when the victim first learns of the incident continues to be measured in months and even years, not hours and days, according to Verizon's recently released 2013 Data Breach Investigations Report (DBIR). What does this mean for business? According to the Verizon report, 66% of breaches in the past year took months or more to discover breaches, which means most attackers are able to exfiltrate data and scout around in the IT systems of a targeted business for weeks before they are discovered. While intrusion prevention is crucial, the DIBR says businesses must accept the fact that no barrier is impenetrable. Detection and response represents a critical line of defence. According to Verizon, businesses need to stop treading detection and response like a backup plan if things go wrong. Instead, businesses should make detection and response capabilities a core part of their security plan. Logging and monitoring, for example, are critical to detecting activity that could lead to a breach and preventing or ... Access >>>
Premium Content for Free.
What’s to be done about data breach discovery?
by Warwick Ashford
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days
- What’s to be done about data breach discovery? by Warwick Ashford
Giving UK SMEs the digital tools they need
by Eva Eisenschimmel
It is vital that organisations use the digital tools at their disposal to ensure they are able to take advantage of growth opportunities.
- Giving UK SMEs the digital tools they need by Eva Eisenschimmel
More Premium Content Accessible For Free
FT sold on cloud benefits
In this week's Computer Weekly, we talk to the Financial Times CTO about the publisher's successful move to the public cloud and plans for further ...
The Global Risk Report 2015
Large-scale cyber attacks are among the prominent risks in 2015 in the 10th Global Risks report from the World Economic Forum.
CW Buyer's Guide: Emerging technologies in networking
Check out this extensive buyer's guide to explore technologies designed to improve networking and for an inside glance at what established suppliers ...