• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Healthcare • Ransomware • Retail/Manufacturing • Security  /  Why Data Breaches should make you rethink your IT Strategy
Why Data Breaches should make you rethink your IT Strategy
07 September 2017

Why Data Breaches should make you rethink your IT Strategy

Written by Rajib Singha
Rajib Singha
Healthcare, Ransomware, Retail/Manufacturing, Security

In this post, we give you an insight into data breach – a point-blank catastrophe that looms over most organizations.

What is Data Breach?
Data breach occurs when confidential data of an organization is lost or illegally obtained by miscreants for financial gains or another purpose. A data breach can have a paralyzing effect on any organization in the form of impaired operations, lawsuits, customer loss, and brand erosion to name a few.

Based on a study conducted in cooperation with 65 organizations, the 2017 Verizon Data Breach Investigation report presents the following sets of statistics:

Who’s behind data breaches?

• 75% of data breaches are caused by external threats (outsiders)
• 25% involved insiders
• 18% were state-sponsored
• 3% features multiple parties
• 2% involved partners of the affected organization
• 51% of the breaches were the result of organized cyberattack campaigns

The report further delves into the type of businesses who had their data breached – 61% of the victims are firms with under 1000 employees.

Furthermore, 95% of phishing attacks that caused a data breach were followed by some sort of software installation.

The motives behind data breach?
Motives that drive criminals to initiate data breach attacks are diversified. Top motives in a descending order are:

  1. Financial gain
  2. Espionage
  3. FIG (fun, ideology, and grudge)
  4. Other (errors, glitches, etc.)

93% of data breaches are brewed by financial interests.

Who are the Victims?
There is this common belief that small organizations are too small to attract hackers’ attention. But, this belief is purely a misconception and probably, a dangerous one too. No industry, big or small, is spared from such information security threats.

As quoted by the 2017 Verizon Data Breach Investigation report,

• 24% of breaches affected the financial industry
• 15% involved healthcare
• 12% of the victims included the public sector
• 15% accounted for retail and accommodation

Tactics used by attackers for staging data breaches

  • In 81% of data breach incidences, criminals used stolen (or weak) passwords
  • 62% involved hacking techniques
  • 51% used malware for stealing data
  • 43% leveraged social engineering tactics
  • 14% involved misuse or abuse of privileges by people within the organization
  • 8% featured physical actions

What can be done?
With diverse motives that miscreants have behind data breaching, we cannot ignore the evolving nature of the threat landscape. Threats are becoming advanced, persistent, and particularly, more targeted than ever. Thus, evaluation of the threat landscape and adopting a methodical approach should form the core of the counterattack strategy.

But at the same time, formulating a data protection strategy also depends on what organizations want to protect; the type of data, its sensitivity, what are the odds of the data being targeted by criminals, and so on. In other words, one cannot have a fixed protocol or standards for information security. Otherwise, it would be like prescribing a one-pill-cures-all-illnesses treatment plan.

One rational approach could be using multilayered protection. It’s like putting up a barricade surrounding your property and then securing your windows and doors and chimneys too, if you will.

Employing a reliable unified threat management (UTM), coupled with endpoint security solutions, can give organizations what they need to reduce the risk of data breaches. However, it would not be practical to label such measures as a ‘foolproof’ system to deal with such threats. As mentioned, it all depends on what organizations intent to protect, their understanding of the current threat landscape, and up to what extent they can go to secure their infrastructure.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

Source:
https://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/

 Previous PostCVE-2017-9805 – Apache Struts 2 Remote Code Execution Vulne...
Next Post  Business security in the era of connected things
Rajib Singha

About Rajib Singha

Rajib is an IT security news junkie and a computer security blogger at Quick Heal. He is passionate about promoting cybersecurity awareness, content and digital...

Articles by Rajib Singha »

Related Posts

  • The DPDP Act 2023 Guide for Healthcare Leaders

    April 25, 2025
  • Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

    March 11, 2025
  • How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

    March 11, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies