Access "What’s to be done about data breach discovery?"
This article is part of the 2 July 2013 issue of Business value from the internet of things
The time from initial compromise by cyber attackers to when the victim first learns of the incident continues to be measured in months and even years, not hours and days, according to Verizon's recently released 2013 Data Breach Investigations Report (DBIR). What does this mean for business? According to the Verizon report, 66% of breaches in the past year took months or more to discover breaches, which means most attackers are able to exfiltrate data and scout around in the IT systems of a targeted business for weeks before they are discovered. While intrusion prevention is crucial, the DIBR says businesses must accept the fact that no barrier is impenetrable. Detection and response represents a critical line of defence. According to Verizon, businesses need to stop treading detection and response like a backup plan if things go wrong. Instead, businesses should make detection and response capabilities a core part of their security plan. Logging and monitoring, for example, are critical to detecting activity that could lead to a breach and preventing or ... Access >>>
Premium Content for Free.
What’s to be done about data breach discovery?
by Warwick Ashford
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days
- What’s to be done about data breach discovery? by Warwick Ashford
Giving UK SMEs the digital tools they need
by Eva Eisenschimmel
It is vital that organisations use the digital tools at their disposal to ensure they are able to take advantage of growth opportunities.
- Giving UK SMEs the digital tools they need by Eva Eisenschimmel
More Premium Content Accessible For Free
Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.
This is the fourth annual Technology Industry Survey, produced by Computer Weekly and Mortimer Spinks. This year, 3,408 technology professionals ...
Warwick Ashford presents five IT security case studies selected from the winners of Computer Weekly's European User Awards.