Home Business IT Security The Verizon 2012 Data Breach Investigations Report

Get all your tech news delivered to your mail box five days a week
iTWire UPDATE - it's FREE!


Here are the report's recommendations:

Recommendations for Enterprises
1. Eliminate unnecessary data.
Unless there is a compelling reason to store or transmit data, destroy it. Monitor all important data that must be kept.

2. Establish essential security controls. To effectively defend against a majority of data breaches, organisations must ensure fundamental and common sense security countermeasures are in place and that they are functioning correctly. Monitor security controls regularly.

3. Place importance on event logs. Monitor and mine event logs for suspicious activity - breaches are usually identified by analysing event logs.

4. Prioritise security strategy. Enterprises should evaluate their threat landscape and use the findings to create a unique, prioritised security strategy.

Recommendations for Small Organisations
1. Use a firewall.
Install and maintain a firewall on Internet-facing services to protect data. Hackers cannot steal what they cannot reach.

2. Change default credentials. Point-of-sale (POS) and other systems come with pre-set credentials. Change the credentials to prevent unauthorised access.

3. Monitor third parties. Third parties often manage firewalls and POS systems.  Organisations should monitor these vendors to ensure they have implemented the above security recommendations, where applicable.

One final thing.  There is always an intriguing security / encryption puzzle associated with the image on the cover.  This year's report sees no exception to that tradition - Verizon usually offers a prize to the first person to report the solution (how to claim the prize has previously formed part of the final stage of the puzzle).

OWN THE FUTURE OF SOFTWARE

Tomorrow, 26 August we’re delivering a FREE day of high-impact content to give you the know-how to lead in the App Economy. Please don’t be sorry you missed it.

• Keynotes on how software is rewriting businesses the world over, including our own backyard

• View code level details with context and repair problems quickly

• Fix problems in minutes before they wreak havoc

• Streams covering DevOps, Security and Management Cloud from pioneers at the coalface.

Register Now - it's FREE!

CLICK TO REGISTER!

ITWIRE SERIES - IS YOUR BACKUP STRATEGY COSTING YOU CLIENTS?

Where are your clients backing up to right now?

Is your DR strategy as advanced as the rest of your service portfolio?

What areas of your business could be improved if you outsourced your backups to a trusted source?

Read the industry whitepaper and discover where to turn to for managed backup

FIND OUT MORE!

David Heath

joomla statistics

David Heath has over 25 years experience in the IT industry, specializing particularly in customer support, security and computer networking. Heath has worked previously as head of IT for The Television Shopping Network, as the network and desktop manager for Armstrong Jones (a major funds management organization) and has consulted into various Australian federal government agencies (including the Department of Immigration and the Australian Bureau of Criminal Intelligence). He has also served on various state, national and international committees for Novell Users International; he was also the organising chairman for the 1994 Novell Users' Conference in Brisbane. Heath is currently employed as an Instructional Designer, building technical training courses for industrial process control systems.

Connect