Upload
verizon-enterprise-solutions
View
228.370
Download
2
Embed Size (px)
Citation preview
This document and any attached materials are the sole property of Verizon and are not to be used by you other than to evaluate Verizon’s service.
© 2016 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its a�liates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners.
Proprietary statement.
Are you doing cybersecurity wrong?
The Data BreachInvestigations ReportThe 2016 Data Breach Investigations Report (DBIR) provides insights based on over 100,000 incidents, including analysis of 2,260 confirmed data breaches to reveal what’s really happening in cybercrime.
There are many myths surrounding cybersecurity. Fortunately, the DBIR is here toshine a light on the misnomers and half truths.
Join us as we set the record straight on cybersecurity.
MYT
HS
TruthMost attacks are opportunistic, indiscriminate and exploit known vulnerabilities.
The top 10 vulnerabilities account for 85% of successful exploit tra�c. And the remaining 15% consists of over 900 Common Vulnerabilities and Exposures (CVEs).
TruthThe gap between compromise and detection is widening.
In 93% of breaches attackers take minutes or less to compromise systems.
But four out of five victims don’t realize they’ve been attacked for weeks or longer. And in 7% of cases, the breach goes undiscovered for more than a year.
DATA
Admin
P4ssw0rd
Password
Username
Truth63% of confirmed data breaches leverage a weak, default or stolen password.
TruthPhishing is on the rise.
30% of phishing emails are opened. And about 12% of targets go on to click the link or attachment.
TruthMoney remains the main motive for attacks.
80% of analyzed breaches had a financial motive.
Make your defenses good enough and attackers will move on to easier targets.
Truth95% of breaches fit into just nine attack patterns. Understand them and you’ll be better able to make the right investments and protect your organization.
BANK
00
00
00
We use the insights from the DBIR to shape our own security portfolio. That way, we can deliver the best possible protection to our customers.
You can use it too.
Drive your security decisions with the DBIR.
BANK
00
00
00
We wrote the book on cybersecurity. �Read the 2016 DBIR to understand what you’re up against:
www.VerizonEnterprise.com/DBIR2016
© 2016 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. PTE16717 04/16
Contact us >