Categories: Technology

Key findings from the DBIR: The most common paths to enterprise estates

[ad_1]

We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 – 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!


Today, Verizon released the 2022 Data Breach Investigations Report (DBIR), analyzing over 5,212 breaches and 23,896 security incidents. 

The report highlights that attackers have four key paths to enterprise estates; credentials, phishing, exploiting vulnerabilities, and malicious botnets. 

Hackers can use any of these entry points to gain access to a protected network and launch an assault. Generally, they’ll do this by exploiting the human element (including errors, miuse, and social engineering), which accounted for 82% of intrusions this year. 

More specifically, the research also shows that 50% of breaches revolve around remote access and web applications, while 25% were contributed to by social engineering, and credential reuse was involved in 45% of breaches. 

The new threat landscape: ‘breaches beget breaches’ 

One of the most important revelations of the report is that supply chain incidents are providing threat actors with the materials they need to access downstream enterprise’s systems, which explains why 97% of firms have reported being negatively impacted by a supply chain security breach in the past. 

Verizon’s DBIR suggests that threat actors use supply chain breaches because they act as a force multiplier, enabling them to breach upstream organizations and service providers before using the access and information they’ve gained to break into the systems of downstream organizations.  

Or as Senior Information Security Data Scientist on the Verizon Security Research Team, Gabriel Bassett describes it, “breaches beget breaches.” “Breaches at a partner can lead to your own breach, as with supply chain breaches. Access paths can be acquired by threat actors and sold on criminal marketplaces.”

Bassett explains that most of the time, hackers exploit the human element to gain initial access, through the use of phishing scams or credential theft and reuse. 

“After purchasing the access, the new attacker monetises it with another breach, often with ransomware (which increased 13% in breaches this year, more than the last 5 years combined,” Bassett said. 

Reflecting on the DBIR: best practices for enterprises

While mitigating the human element can be challenging for organizations, Bassett highlights some core tools that enterprises have at their disposal to secure the four access paths to their estates. 

Taking simple steps like deploying two-factor authentication and providing users with password managers to avoid reusing credentials can reduce the likelihood of attackers being able to exploit poor passwords to gain access to internal systems. 

Likewise, organizations can mitigate phishing by implementing strong mail filters and developing clear phishing reporting processes, so that security teams are ready to act whenever users report a suspicious email, while using antivirus tools to stave off botnet threats and prevent malicious software from infecting endpoints. 

Then for vulnerability management, organizations can develop a repeatable asset management process, installing vendor patches when possible, and not attempting to patch a new issue every time it arrives. 

Above all, the key to successful defense is efficiency. “An important point for organizations is that attackers have repeatable processes for all of these methods of access. The attackers are efficient in these attacks so we have to be efficient in our defenses.” 

VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn more about membership.

[ad_2]
Source link
Admin

Recent Posts

Why Open-Minded Couples Prefer Swingers Style: An In-Depth Look at the Leading Swinger Site

Safety and Discretion: The Cornerstones of Swingers Style In the world of alternative lifestyles, safety,…

21 hours ago

Top Chewing Gums for Jawline Definition

Hey there! Can chewing gum help you achieve that chiseled jawline you've been dreaming of?…

1 day ago

Often the Evolution of Tumi123 Games Experience

Hey there, fellow games enthusiasts! Have you ever wondered just how your favorite gaming platform,…

2 days ago

Top Benefits of Choosing Epoxy Flooring for Homes and Businesses in Rockford, IL

When it comes to durable, stylish, and cost-effective flooring solutions, epoxy flooring stands out as…

4 days ago

Studying the World of Kenzo188 Games

Hi there, fellow gaming enthusiasts! Regardless of whether you're a seasoned player or perhaps dipping…

5 days ago

Affordable Furniture Shopping in Fort Worth

Hey there, furniture lovers of Fort Worth! Whether you're setting up a new home or…

5 days ago