{"id":595,"date":"2016-04-29T11:34:03","date_gmt":"2016-04-29T11:34:03","guid":{"rendered":"http:\/\/www.securityinshredding.com\/blog\/?p=595"},"modified":"2018-07-02T12:43:47","modified_gmt":"2018-07-02T12:43:47","slug":"minutes-to-happen-data-breaches","status":"publish","type":"post","link":"https:\/\/www.securityinshredding.com\/blog\/minutes-to-happen-data-breaches\/","title":{"rendered":"Minutes To Happen &#038; Weeks To Realise; Data Breaches"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-medium wp-image-596\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/04\/PhishingCartoon-300x225.jpg\" alt=\"Phising Most Common Data Breach \" width=\"300\" height=\"225\" srcset=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/04\/PhishingCartoon-300x225.jpg 300w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/04\/PhishingCartoon-400x300.jpg 400w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/04\/PhishingCartoon.jpg 500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>At Security In Shredding we ensure that all data processed by us is confidentially and securely destroyed. <strong>Data destruction<\/strong> is vital part of business practice. <strong>Data security<\/strong> is paramount to us and the success of a business. Preventative methods to improve your data security comes in many forms. IT security is an area that can overlooked due to newer technologies and people not aware of IT pitfalls.<\/p>\n<p>A report from Siliconrepiblic writes about a common data breach method and is important that people are aware of such an attack. Knowing these potential risks is important is today&#8217;s high tech world. The article writes:<\/p>\n<h1>&#8220;Phising&#8221; What Is It ?<\/h1>\n<p>A Google search will give you the following definition:<\/p>\n<blockquote><p><b>&#8220;Phishing<\/b> is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.&#8221;<\/p><\/blockquote>\n<p>Phishing is still the No 1 cause of data breaches and hackers are getting faster at breaking in, but firms are struggling and usually only find out weeks and even months later they have been breached, according to the 2016 Verizon Data Breach Investigations Report.<\/p>\n<p>According to the <a href=\"https:\/\/www.verizonenterprise.com\/verizon-insights\/articles\/\" target=\"_blank\" rel=\"nofollow\">report<\/a>, in 93% of cases it took attackers minutes or less to compromise systems.Meanwhile, it took companies weeks or more to discover that an incident had even occurred.Worse, it was typically customers or law enforcement that sounded the alarm and not the organisation\u2019s security measures.<\/p>\n<blockquote><p>\u2018A test we ran last year found that 23% of people that opened a message went on to open the attachment. In our latest report that has increased to 30%\u2019<br \/>\n<sup>\u2013 LAURANCE DINE, VERIZON<\/sup><\/p><\/blockquote>\n<p>According to the report, most reasons for breaches are money-related and cyber-attackers are indiscriminate and motivated by greed rather than revenge or some crusade.<\/p>\n<h2>Gone Phishing, Gone Data<\/h2>\n<p>Laurance Dine, managing principal in charge of investigative response with Verizon, told Siliconrepublic.com that phishing is still the chief method hackers use to attack organisations.<\/p>\n<p>The report found that, in 2016, some 63% of confirmed data breaches involved leveraging weak, default or stolen passwords. Passwords such as &#8220;123456&#8221; and or &#8220;password&#8221; are used more often than you think\u00a039% of breaches originate from victims\u2019 own work areas and 34% from employees\u2019 work vehicles.<\/p>\n<p>Some 70% of data breaches involving insider misuse took months or years to discover.The report also revealed that new technologies like mobile and the internet of things are providing hackers with more ways of breaching an organisation\u2019s systems.The industries most affected by data breaches are the public sector, healthcare and information.<\/p>\n<p>Dine told <a href=\"https:\/\/www.siliconrepublic.com\/\" rel=\"nofollow\">Siliconrepublic.com<\/a> that the data information was gathered from more than 67 partners worldwide and involved the analysis of 2,260 confirmed data breaches.<\/p>\n<p>\u201cThere is still a serious information deficit when it comes to attacks. Attackers are getting into environments in minutes or days and it could be months and years down the line before anyone is aware of it and they usually hear it from law enforcement.<\/p>\n<p>\u201cPhishing is still the principal method of attack. A test we ran last year found that 23% of people that opened a message went on to open the attachment. In our latest report that has increased to 30%.\u201d<\/p>\n<p>\u201cBut if you are after the low-hanging fruit, the No 1 motivation for data breaches is still financial. Any data worth any value is a target.\u201d<\/p>\n<p>Read Siliconrepublic full article here:\u00a0<a href=\"https:\/\/www.siliconrepublic.com\/enterprise\/2016\/04\/25\/verizon-data-breach-report-2016\" rel=\"nofollow\">https:\/\/www.siliconrepublic.com\/enterprise\/2016\/04\/25\/verizon-data-breach-report-2016<\/a><\/p>\n<p>At Security In Shredding we strive to ensure that all documents and its data is processed <strong>securely destroyed<\/strong> on site or off site. <strong>Confidential shredding<\/strong> services are available throughout Ireland and we regularly operate in the <strong>Dublin<\/strong>, <strong>Galway<\/strong>, <strong>Limerick<\/strong>, <strong>Cork<\/strong> areas. Please visit:\u00a0<a href=\"https:\/\/www.securityinshredding.com\/\">https:\/\/www.securityinshredding.com\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Security In Shredding we ensure that all data processed by us is confidentially and securely destroyed. Data destruction is vital part of business practice. Data security is paramount to us and the success of a business. Preventative methods to &hellip; <a href=\"https:\/\/www.securityinshredding.com\/blog\/minutes-to-happen-data-breaches\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7,9,5,6,32,26],"tags":[37,12,58,28,49,35,23,33,57,27],"_links":{"self":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/595"}],"collection":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/comments?post=595"}],"version-history":[{"count":6,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/595\/revisions"}],"predecessor-version":[{"id":1302,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/595\/revisions\/1302"}],"wp:attachment":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/media?parent=595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/categories?post=595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/tags?post=595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}