• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Human Error Driving Data Breaches, Studies Find

    April 11, 2018 Alex Woodie

    Preventable errors – including clicking on malicious links sent as part of a phishing attack and misconfiguring servers and network devices – account for a large number of data breaches, according to a pair of studies released last week by IBM and Baker Hostetler.

    In IBM‘s annual X-Force Threat Intelligence Index 2018, the company concluded that “inadvertent insiders” — or employees who unwittingly cause security incidents through negligent actions – accounted for two-thirds of all the records that were comprised in 2017. IBM says nearly 3 billion records were compromised last year, which is actually down from the 4 billion records breached in 2016.

    Misconfigured cloud storage servers, databases, network, and backup gear accounted for 70 percent of all lost data, IBM says in its report. The number of records breached due to misconfigured cloud servers, in particular, shot up by 424 percent compared to the previous year, IBM concludes. There’s “a growing awareness among cybercriminals of the existence of misconfigured cloud servers,” IBM says.

    Last fall’s disclosure of the massive Equifax data breach, which compromised the data of 143 million consumers, is a good example of this phenomenon in action. An unpatched Apache Struts server was fingered as the main culprit in that breach. The patch had been available for months, yet Equifax personnel apparently had failed to apply it in a timely manner.

    IBM says the other one-third of breached data can be traced back to phishing attacks. In particular, IBM X-Force spotted a lot of activity coming from the Necurs botnet, which it says was used to distribute millions of spam messages during short periods of time.

    Ransomware also reared its ugly little head in a big way. “Last year, there was a clear focus by criminals to lock or delete data, not just steal it, through ransomware attacks,” Wendi Whitmore, Global Lead, IBM X-Force Incident Response and Intelligence Services (IRIS). “These attacks are not quantified by records breached, but have proven to be just as, if not more, costly to organizations than a traditional data breach.”

    How data breaches occurred in 2017. Source: Baker Hostetler’s 2018 Data Security Incident Response Report

    This data jibes with another report issued recently. Baker Hostetler‘s 2018 Data Security Incident Response Report found that “phishing remained prevalent and successful, and employees and their vendors made common mistakes that placed sensitive information at risk.”

    Phishing remained the number one cause of data breaches in 2017, accounting for 34 percent of data breaches, according to the New York law firm. The second most common cause of data breaches was network intrusion, accounting for 19 percent of incidents, followed by inadvertent disclosure (17 percent); stolen or lost devices or records (11 percent); and system misconfiguration (6 percent).

    Baker Hostetler says phishing is a tool wielded by sophisticated and unsophisticated hackers alike. The hackers use phishing “to obtain direct network access, convince employees to wire money, enable remote access with compromised credentials, or deploy malware and ransomware,” the group says. “These incidents can be costly and difficult to investigate.”

    What can organizations and users do about this? Baker Hostetler recommends a mix of techniques, including educating people about how to protect themselves from phishing attempts. But that’s not enough. “Because people are fallible, training is not enough and technological safety nets are needed,” the group says.

    For incident prevention, a strong training and technology mix includes phishing training, educating employees to not use the same credentials for multiple sites or services; enabling multi-factor authentication (MFA) throughout the organization; the deployment of endpoint security agents and advanced email threat protection tools; and developing effective network segmentation.

    It’s all about preparing your organization to be ready for a compromise, says Theodore J. Kobus III, leader of Baker Hostetler’s privacy and data protection practice. “The stakes are higher than ever, but some entities still are not executing on the basics,” Kobus says. “Many have made great strides in their cybersecurity planning, but as threats evolve and entities change, they must also keep their security protocols current. It takes an ‘all-in’ approach from boards to senior management to entry-level employees for best-in-class breach prevention and response planning.”

    Kobus recommends that organizations should follow the principles of Compromise Response Intelligence, which includes: gaining executive support for security spending; educating key stakeholders; fine-tuning incident response plans; working more efficiently with forensic firms; assessing and reducing risk; building scenarios for tabletop exercises; and determining cyber liability insurance needs.

    You can access Baker Hostelter’s report here.

    RELATED STORIES

    Reckless or Riskless: IBM i App Dev Experts Talk Security

    Three Lessons IBM i Shops Can Learn From The Equifax Hack

    Keeping Ransomware Out of the VAULT

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: Equifax, IBM i, X-Force Threat Intelligence Index 2018

    Sponsored by
    Software Concepts

    Distribution and financial software that provides efficiency without complexity

    Bigger isn’t always better. Not only are high end “out of the box” packages costly, they just aren’t built to handle the uniqueness of smaller businesses. Rather than investing in a complicated ERP solution with hopes that you’ll grow into it, we’ve architected our DS90 iSeries distribution software solution as an affordable ERP software offering that caters to your increased needs as your business matures.

    Feature-rich functionality

    • Modern Windows-based GUI or traditional character-based green screen
    • Includes key capabilities of high-end ERP applications
    • Adapts to handle the unique workflows of smaller businesses
    • Robust functionality right out of the box
    • Seamless integrations with other technologies and services

    Expert guidance from technology experts – we’ve got your back

    • Efficient, affordable customizations: We’ll offer innovative (yet economical) customizations to support your in-house workflows, improve production and increase yield.
    • Training, support and diagnostics: Everything you need to sleep better at night. Worry about your business goals – not your technology!
    • Responsive, skilled and accessible support: One phone call gets you the answers you need without all the technical jargon. No “blame game” or finger-pointing with us as your solutions provider.

    Software Concepts  978.584.0400

    Products  –  Schedule A Demo  –  Contact

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Four Hundred Monitor, April 11 Jack Henry Banking On De Novos Surge

    Leave a Reply Cancel reply

TFH Volume: 28 Issue: 28

This Issue Sponsored By

  • Maxava
  • COMMON
  • Software Concepts
  • WorksRight Software
  • UCG TECHNOLOGIES

Table of Contents

  • Profound Rolls Out Node.js Development Services
  • Jack Henry Banking On De Novos Surge
  • Human Error Driving Data Breaches, Studies Find
  • Four Hundred Monitor, April 11
  • IBM i PTF Guide, Volume 20, Number 14

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Moving Off Big Iron? Be Very Careful, Gartner Says
  • Thoroughly Modern: More Than Just A Pretty Face
  • Guru: More End Of Year Feedback
  • As I See It: When Gates Was Young
  • Servers Cool A Bit In Q3, But The Market Is Still Hot
  • Join Us For The IBM i On The Public Cloud Webinar
  • Nagios Solidifies Role in IBM i Monitoring
  • HelpSystems Bolsters Data Loss Prevention with Clearswift Buy
  • Samba Patch Caps Busy Year for IBM i Security
  • Four Hundred Monitor, December 4

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2019 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.