Critical Read

Verizon tracks trends in data breaches

report cover

What: Verizon's 2013 Data Breach Investigations Report released April 23

Why: The annual report shows why cybersecurity is top of mind among policymakers, network managers, and intelligence professionals. The report analyzes more than 47,000 security incidents, including 621 confirmed data breaches which yielded more than 44 million compromised records. The report indicates that the majority of confirmed data breaches (as opposed to overall incidents) are coming from outside of targeted networks, not from inside jobs or internal security lapses.

The victims: Retailers are typically targeted for credit card information. Manufacturers are being hacked for their intellectual property. Overall, organized crime entities lead others in perpetrating financially motivated breaches. State affiliated actors appear more interested in espionage. The "hacktivist" threat is relatively minimal, with politically motivated activists responsible for an estimated 2 percent of breaches by external actors. Overall, the report found that about 78 percent of attacks required low or very low skills on the part of perpetrators. Fewer than 1 percent of breaches required advanced skills, according to the report.

Verbatim: "State-affiliated actors tied to China are the biggest mover in 2012. Their efforts to steal IP comprise about one-fifth of all breaches in this dataset."

Click here to access the full report.

About the Author

Adam Mazmanian is executive editor of FCW.

Before joining the editing team, Mazmanian was an FCW staff writer covering Congress, government-wide technology policy and the Department of Veterans Affairs. Prior to joining FCW, Mazmanian was technology correspondent for National Journal and served in a variety of editorial roles at B2B news service SmartBrief. Mazmanian has contributed reviews and articles to the Washington Post, the Washington City Paper, Newsday, New York Press, Architect Magazine and other publications.

Click here for previous articles by Mazmanian. Connect with him on Twitter at @thisismaz.


Featured

  • IT Modernization
    Eisenhower Executive Office Building (Image: Wikimedia Commons)

    OMB's user guide to the MGT Act

    The Office of Management and Budget is working on a rules-of-the-road document to cover how agencies can seek and use funds under the MGT Act.

  • global network (Pushish Images/Shutterstock.com)

    As others see us -- a few surprises

    A recent dinner with civil servants from Asia delivered some interesting insights, Steve Kelman writes.

  • FCW Perspectives
    cloud (Singkham/Shutterstock.com)

    A smarter approach to cloud

    Advances in cloud technology are shifting the focus toward choosing the right tool for the job and crafting solutions that truly modernize systems.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.