The retail industry reported 15 per cent more data breaches in 2012 compared to the previous year but what could be more alarming is that it is taking longer for organizations to detect that their systems have been breached, according to a report released yesterday by data security firm, Trustwave Inc.
“Five per cent took more than three years to identify the criminal activity,” the company’s report said. “Most victim organizations rely on third parties, customers, law enforcement or regulatory bodies to notify them a breach has occurred.”
Business, the Chicago-based security company said, are rapidly adopting an outsourced, third party information technology (IT) model and this is not very good because in 63 per cent of its investigations revealed a third party responsible for system support, development of maintenance, “introduced security deficiencies easily exploited by hackers.”
“Cyber criminals will never stop trying to compromise systems to obtain valuable information such as customer and private user data, corporate trade secrets and payment cart information,” said Robert McCullen, CEO of Trustwave.
He said the most common methods of intrusion were: SQL injection and remote access attacks which made up 73 per cent of the infiltrations in 2012. Malware found on Android devices grew from 50,000 samples in 2011 to 200,000 last year.
Out of the 450 cases investigated last year, about 40 variations of malware were found and attributed to six main criminal groups. Russia and the United States were found to be the largest contributors to malware attacks accounting for 39.4 per cent and 19.7 per cent of hosted malware, respectively.
Understanding how IBM Spectrum Protect enables hybrid data protection
Abdicating your company’s data protection responsibilities to the first cloud solution provider you encounter is just as unwise as doing nothing at all to leverage the cloud. On the other hand, it can be a wise decision to investigate what results you might achieve by choosing a backup technology that is capable of supporting a hybrid protection approach capable of covering both on-premises technology and offsite cloud capabilities.