Access "What’s to be done about data breach discovery?"
This article is part of the 2 July 2013 issue of Business value from the internet of things
The time from initial compromise by cyber attackers to when the victim first learns of the incident continues to be measured in months and even years, not hours and days, according to Verizon's recently released 2013 Data Breach Investigations Report (DBIR). What does this mean for business? According to the Verizon report, 66% of breaches in the past year took months or more to discover breaches, which means most attackers are able to exfiltrate data and scout around in the IT systems of a targeted business for weeks before they are discovered. While intrusion prevention is crucial, the DIBR says businesses must accept the fact that no barrier is impenetrable. Detection and response represents a critical line of defence. According to Verizon, businesses need to stop treading detection and response like a backup plan if things go wrong. Instead, businesses should make detection and response capabilities a core part of their security plan. Logging and monitoring, for example, are critical to detecting activity that could lead to a breach and preventing or ... Access >>>
Premium Content for Free.
What’s to be done about data breach discovery?
by Warwick Ashford
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days
- What’s to be done about data breach discovery? by Warwick Ashford
Giving UK SMEs the digital tools they need
by Eva Eisenschimmel
It is vital that organisations use the digital tools at their disposal to ensure they are able to take advantage of growth opportunities.
- Giving UK SMEs the digital tools they need by Eva Eisenschimmel
More Premium Content Accessible For Free
Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps ...
This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM ...
This document discusses the different purposes of the two standards, how to reconcile the two with regard to terminology and process, and combine the...