• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Ransomware • Security  /  5 key takeaways from major data breaches
18 September 2017

5 key takeaways from major data breaches

Written by Seqrite
Seqrite
Ransomware, Security
Estimated reading time: 3 minutes

Cyber-attacks, hacks or data breaches have become common in recent times. Be it large scale businesses or a startup; no one is safe from the ever-growing cyber threat landscape. While keeping track of all cyber-attacks is not possible for companies, it is important for them to be updated with a history of attacks and learn from the mistakes of self and others.

Confidentiality is a desirable trait for any organization, and a breach can readily compromise the same. While the likes of Equifax and CeX data breaches call for functional laws and better reforms, there are certain takeaways which can help enterprises formulate holistic cyber security solutions. We are sharing some key takeaways from the recently released Verizon Data Breach report, let’s have a look.

Takeaway 1: Phishing continues to grow

Most data breaches have already established the popularity of phishing as the ‘go-to’ hacking method. This approach allows hackers to access sensitive data, via malicious emails and a host of other techniques. Almost 66 percent of malware installations happen this way, and around 43 percent of global data breaches involve phishing as the precursor.

Enterprises must, therefore, train their employees regarding suspicious links and other forms of clickbaits. It is also important to conduct stimulated campaigns concerning anti-phishing activities. With companies witnessing financially motivated attacks, security awareness focused at this malicious form of data breach should improve.

Read more: How Ransomware works: Understanding the strategy behind cyberattacks

Takeaway 2: Ransomware isn’t leaving anytime soon

Lately, ransomware has been the face of cyber-attacks, and in 2017 it has evolved into an overpowering abomination. Be it the social engineering crusades or phishing emails, data thefts are quite common and comprise of 21 percent of the existing ransomware incidents. These figures are at least 8 percent higher as compared to the DBIR reports released for 2016.

While it is hard to stem the growth of ransomware, vigilance is something that keeps malware and other malicious entrants out of the system. There are organizations which conduct ransomware awareness training programs to educate their employees. To mitigate the global crisis, a dynamic program might work best.

Takeaway 3: Healthcare is a vulnerable sector

DBIR reports suggest that almost 15 percent of the recent data breaches targeted the healthcare industry which is a worrying sign. When it comes to analyzing the cyber threats concerning the healthcare sector, the DBIR data reveals a two-fold issue. The first concern happens to be the inadvertency where employees play a pivotal role in compromising the confidentiality. It is an alarming concern that almost 80 percent of healthcare-specific breaches have miscellaneous errors and privilege misuse as the primary reasons.

The other aspect of the two-fold problem is the growth of ransomware that is specifically detrimental to the medical and healthcare sector. Believe it or not, almost 72 percent of malware incidents related to this sector, comprises of ransomware attacks.

Takeaway 4: Password laziness is predominant

Based on the 2017 DBIR data, 80 percent of data breaches that involve hacking, use stolen passwords. This has resulted in a form of security fatigue with password laziness at the helm. Organizations should look to value passwords and the strategies behind their selections. Security awareness campaigns are great ideas for improving password-centric training reinforcements. Moreover, it must be understood that password strength is a repeated issue and should be handled with extreme care.

Takeaway 5: Ignore pretexting at your own peril

While malware, malicious emails, phishing attacks and ransomware threats are real, pretexting is more like a slow poison when it comes to impairing the cyber space. A pretext is more of a persuasive scenario, created by hackers for influencing targets. Almost 88 percent of pretexting incidents involving financial shortfalls, make use of emails – a popular avenue for sending forth pretexts. That said, educating employees about the risk-based approach can help them segregate pretexts from original requests. This method calls for the inclusion of knowledge assessments which is a handful when it comes to determining threats and mitigating them.

Data breaches are common and will continue bothering us moving further into the future. However, it is important to process the takeaways and inferences in the best possible manner for keeping threats, risks, and damages to a minimum.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostHow is new technology bringing risk to the Government?
Next Post  Impact of malware/ransomware attacks on Government data
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • BEC and Ransomware attacks unsettle businesses globally.

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Thanos Ransomware adopts hyper-weaponized RIPlace tactics — collects huge pay-offs.

    Thanos Ransomware Evading Anti-ransomware Protection With RIPlace Tactic

    November 18, 2020
  • Hackers ransack businesses by riding on the modern-day Trojan Horse.

    PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

    August 26, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.