<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DBIR Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/dbir/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/dbir/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 28 May 2020 15:36:51 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>DBIR Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/dbir/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 029 Data Breach Investigations Report 2020</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-029-data-breach-investigations-report-2020/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 22 May 2020 08:40:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach Investigations Report 2020]]></category>
		<category><![CDATA[DBIR]]></category>
		<category><![CDATA[DBIR 2020]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Verizon DBIR]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2007</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 29. This week we&#8217;re going to talk about data breach investigations report 2020 from Verizon. What was the data breach investigations report 2020 based on? Every year Verizon, the large US telecommunications company, produces its data breach investigations report or DBIR. And in this they look at cyber security incidents that&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-029-data-breach-investigations-report-2020/">#WeekendWisdom 029 Data Breach Investigations Report 2020</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 29. This week we&#8217;re going to talk about data breach investigations report 2020 from Verizon.<span id="more-2007"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2007-1" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/05/WeekendWisdom-029-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/05/WeekendWisdom-029-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/05/WeekendWisdom-029-lo.mp4</a></video></div>
<h3>What was the data breach investigations report 2020 based on?</h3>
<p>Every year Verizon, the large US telecommunications company, produces its data breach investigations report or DBIR. And in this they look at cyber security incidents that are reported by their customers all across the globe and they get into some great detail on these incidents. This year it&#8217;s based on 32,000 cyber security incidents, where there was nearly 4,000 data breaches involved.</p>
<h3>So for big businesses, yeah?</h3>
<p>So you might think, &lt;sigh&gt; this is a big business thing, it&#8217;s not for small companies. But 28% of the incidents of data breaches affected small businesses.</p>
<p>And you&#8217;ll be wondering why that might be? Well the greatest motivation for these data breaches was financial. They want money and that was 86% of the data breaches were financially motivated. So they just want money. They don&#8217;t care how big or small you are.</p>
<h3>Anything else?</h3>
<p>Some other interesting figures in there, while 70% were carried out by external actors, 30% were internal. So that could be maybe a disgruntled employee may have carried out the data breach or perhaps staff could have made mistakes. Which is possible because 22% of data breaches were as a result of a mistake being made.</p>
<p>So make sure your staff are properly trained in how to handle data, to protect it at all costs and if there is a breach, to report it appropriately and get it handled.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<h3>Follow us on Social media:</h3>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-029-data-breach-investigations-report-2020/">#WeekendWisdom 029 Data Breach Investigations Report 2020</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/05/WeekendWisdom-029-lo.mp4" length="23754919" type="video/mp4" />

			</item>
		<item>
		<title>The Annual Data Breach report is out.</title>
		<link>https://www.l2cybersecurity.com/annual-data-breach-report/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 02 May 2017 15:41:30 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[DBIR]]></category>
		<category><![CDATA[Verizon]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=634</guid>

					<description><![CDATA[<p>This probably won&#8217;t have shown up in your mailbox or in the media that you consume, whether virtual or physical. In the Cyber Security game, the annual Data Breach Investigation Report (DBIR) from Verizon is required reading. This is it&#8217;s tenth year in circulation and it grows every year. It&#8217;s nothing like the typical surveys&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/annual-data-breach-report/">The Annual Data Breach report is out.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="size-thumbnail wp-image-635 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/2017-DBIRcover-150x150.png" alt="Data Breach Investigation Report" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/2017-DBIRcover-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/2017-DBIRcover.png 300w" sizes="(max-width: 150px) 100vw, 150px" />This probably won&#8217;t have shown up in your mailbox or in the media that you consume, whether virtual or physical. In the Cyber Security game, the annual Data Breach Investigation Report (DBIR) from <a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/">Verizon</a> is required reading. This is it&#8217;s tenth year in circulation and it grows every year. It&#8217;s nothing like the typical surveys that you will see from consulting or security companies that are trying to scare you into doing business with them. No. The DBIR is about what has actually happened across a large selection of disparate industries.</p>
<p>So this is all about the facts, Mam. ?</p>
<p><span id="more-634"></span></p>
<p>At it&#8217;s heart, this report is made of data from 65 organizations, which in 2016 had just over 42,000 incidents ?, which resulted in some 1,935 breaches ?. It&#8217;s a fairly global picture too, with the incidents and breaches coming from 84 countries.</p>
<p>Just for clarity, they define these terms as follows:</p>
<blockquote><p><em><strong>Incident:</strong></em> A security event that compromises the integrity, confidentiality or availability of an information asset.</p>
<p><em><strong>Breach:</strong></em> An incident that results in the confirmed disclosure &#8211; not just potential exposure &#8211; of data to an unauthorised party.</p></blockquote>
<p>So here are some of the highlights from this data breach report:</p>
<ul>
<li>The top industries affected were Financial Services (24%), Healthcare (15%), Retail/Accomodation (15%) and Public Sector (12%).</li>
<li>66% of malicious software (malware) was installed via e-mail attachments.</li>
<li>Hacking was used in 62% of the breaches and of these, <strong>81% leveraged stolen and/or weak passwords</strong>. Come on folks. Seriously &#8211; <a href="http://www.l2cybersecurity.com/viii-never-reveal-your-password-to-anyone/">Commandment 8</a> anybody?</li>
<li>75% of the breaches were carried out by people external to the victim companies and half of them were affiliated with organised criminal groups.</li>
<li>27% of the breaches were uncovered by third parties, so in over a quarter of the cases, the victims were unaware until somebody else told them.</li>
</ul>
<p>Other interesting facts from the report highlight the types of incident/breach which is most targeted at different industries:</p>
<ul>
<li>Accommodation/Food was mainly targeted for Point-of-Sale (POS) breaches, which is purely financially motivated.</li>
<li>Financial/Insurance were targeted by Denial-of-Service attacks, however there was also a large incidence of Banking passwords being stolen and ATM cards being skimmed (see my <a href="http://www.l2cybersecurity.com/payment-card-breach-ihg-hotels/">previous</a> blog post for more on skimming). So again these breaches are of the financial type.</li>
<li>Manufacturing was interesting. The greatest number of breaches in this sector were for espionage purposes. So in this case, the evil doers were using a data breach to mine information from their target.</li>
</ul>
<p>Finally, Ransomware (the type of malicious software (malware) that scrambles all of your files and demands you pay money to get the key to unscramble them) has gone from being the 22nd most common malware in 2014 to being the 5th most prevalent in 2016. Ransomware campaigns targeted Public Sector, Healthcare and Financial Services (in that order) in 2016. All I can advise is that you follow <a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/">Commandment 4</a> and <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> and you should not be overly concerned about Ransomware.</p>
<p>Have you any concerns about any of the above? If so, then pop an e-mail to <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a> and we will make contact to discuss in simple terms what you need to do to help allay your worries.</p>
<p>The post <a href="https://www.l2cybersecurity.com/annual-data-breach-report/">The Annual Data Breach report is out.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
