PR Archives:  LatestBy Company By Date

Press Release -- May 20th, 2013
Source: Verizon

DBIR Video Series Part 2: Who Would Attack My Organization?

According to the Verizon 2013 Data Breach Investigations Report, 92 percent of breaches involved outsiders. Among outsiders, the DBIR highlights several prominent groupings of data thieves. The majority are financially-motivated organized criminal rings, one in five is a state-affiliated group conducting espionage campaigns, and the remaining activist attacks seek to disrupt and embarrass their targets.

Seventy-eight percent of breaches took weeks or more to discover, while 84 percent took only hours or less to execute. What does this mean? It means the bad guys are pretty good and the good guys are having a tough time keeping up. How do we address this incongruence? Simple, organizations need to get better at detecting malicious behavior and preventing it.

Depending on the types of data stored by the business or organization, they could be targeted by organized criminals, state-affiliated actors or activists. It is important to match the sophistications of your defenses with the sophistication of your attacker. Verizon’s Log Monitoring Services (MSS) detect when someone is attempting to inflict harm on your organization. As a managed security provider, Verizon manages the security devices that not only serve as sensors (eyes and ears), but that also prevent malicious activity before it impacts a client’s business.

Since most attackers come from the outside (92%) it’s important to have strong perimeter defenses in place. Verizon’s MSEG (Managed Secure Enterprise Gateway) service delivers a “clean pipes” solution to provide secure connectivity to the private network.

As one of the largest and most highly rated MSSPs in the world, Verizon currently manages security devices in more than 50 countries. These devices include Firewalls, IDS, IPS, VPN, NGFW, WAF, etc.

Learn more, view this short video:

PR Archives: Latest, By Company, By Date