• Sign In
  • Create Account
  • Sign Out
  • My Account
  • Home
  • News
    • Security Newswire
    • Industry Innovations
    • Security Blog
    • eNewsletter
  • Management
    • Enterprise Services
    • Leadership Management
    • Logical Security
    • Security & Business Resilience
    • Security Education & Training
    • Leadership & Management Column
    • Overseas and Secure Column
    • Profiles in Excellence
    • Security Talk Column
  • Physical
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • New Technology Products
    • Case Studies
    • Surveillance Strategies
  • Cyber
    • Cyber Security News
    • New Cyber Security Products
    • Case Studies
    • Cyber Tactics
  • Services
    • New Services Products
    • Case Studies
  • Sectors
    • Arenas / Stadiums / League / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Critical Infrastructure
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Ports: Sea, Land, & Air
    • Retail, Restaurants, Convenience Stores
    • Transportation/Supply Chain/Warehousing
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
    • Web Exclusives
  • Events
    • Industry Events
    • Webinars
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
    • Videos
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
  • Contact
  • Advertise
  • Subscribe
Home » 97 Percent of Attacks Were Avoidable
Cyber Security News

97 Percent of Attacks Were Avoidable

Generic Image for Cyber Security
March 22, 2012
Reprints
No Comments

A security report released by Verizon that studied 855 breach incidents from last year concluded that 97 percent of them could have been avoided by "simple and intermediate controls."

The report also found that 58 percent of these breaches were done by online "hacktivists" -- those who attacked in social protest, retaliation, activism or simply to pull a prank on unsuspecting users. Verizon's report indicated that it's harder to prepare for the next attack in cases where the hacks weren't done for monetary gain.

"Doubly concerning for many organizations and executives was that target selection by these groups didn't follow the logical lines of who has money and/or valuable information," said the report. "Enemies are even scarier when you can't predict their behavior."

Much of the 97 breaches -- especially those that came from hactivists --  could have just been avoided if users kept in mind that if you are online, you are always susceptible to attacks, said Rapid 7's security researcher Marcus Carey.

As for the types of attacks used, Verizon found that incidents that utilized a hacking tool or skill constituted 81 percent of attacks, with 69 percent of those attacks employing the help of malware to pull off the breach.

Verizon said the types of attacks used has changed little over the past few years because hackers continue to get the same results with known attack vectors.

While Verizon found that the majority of incidents studied were caused by hacktivists, it noted that the more traditional attacks from criminal organizations were focused on smaller corporate targets in 2011.  The report found that attacks on businesses in the accommodation and food service industries made up 54 percent of the 855 breaches studied. It found that 85 percent of those businesses employed less than 1,000 personnel.

Attacks against small corporations consist mostly of using malware and finding vulnerabilities in Web sites. By contrast, when larger companies are attacked, the hacks tend to be done using phishing and social engineering.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Related Articles

Internet Security Threat Report Reveals 81 Percent Increase in Malicious Attacks

95% of Successful Security Attacks are the Result of Human Error

Cyberattacks Produce 1,425-Percent ROI for Attackers

3 Questions to Determine your Enterprise’s Cyber Attack Defenses

Related Products

The Database Hacker's Handbook: Defending Database Servers

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws 2E

Related Events

Before the Shots were Fired – Surviving an Active Shooter at Florida State University

Happy Birthday, NIST Cybersecurity Framework

Top 5 Indicators of Evil on Windows hosts: How Endpoint Threat Detection & Response methods meet the challenge

AVHS: Server Software for Hosting of Video Monitoring Services

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Events

October 15, 2015

Top 5 Indicators of Evil on Windows hosts: How Endpoint Threat Detection & Response methods meet the challenge

ON DEMAND | In this webinar, A.N. Ananth, CEO of industry award winning EventTracker, shows you how a blend of technology, experts and process simplify your already complex life.

December 17, 2015

Record locally, View centrally, Manage remotely

ON DEMAND In this webinar we will show you a cost-effective system to protect all of your assets no matter how remote they are.

View All Submit An Event

Poll

Security Conference Value

As an enterprise security leader, what do you look for most at security conferences?
View Results Poll Archive

Products

Effective Security Management, 5th Edition

Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

Security Magazine

Security Magazine February 2016 cover, Security Leadership: Breaking Stereotypes to Find the Next Great CISO

2016 February

In the hunt for the next great cybersecurity leaders, are enterprises neglecting an under-tapped source? More women are joining the cybersecurity industry, but there are still myriad opportunities for enterprise security leaders to be advocates and mentors to up-andcoming talent.

View More Subscribe
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
  • Want More
    • Connect
    • Partners

Copyright ©2016. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing