Close Menu
Innovation Village | Technology, Product Reviews, Business
    Facebook X (Twitter) Instagram
    Monday, May 12
    • About us
      • Authors
    • Contact us
    • Privacy policy
    • Terms of use
    • Advertise
    • Newsletter
    • Post a Job
    • Partners
    Facebook X (Twitter) LinkedIn YouTube WhatsApp
    Innovation Village | Technology, Product Reviews, Business
    • Home
    • Innovation
      • Products
      • Technology
      • Internet of Things
    • Business
      • Agritech
      • Fintech
      • Healthtech
      • Investments
        • Cryptocurrency
      • People
      • Startups
      • Women In Tech
    • Media
      • Entertainment
      • Gaming
    • Reviews
      • Gadgets
      • Apps
      • How To
    • Giveaways
    • Jobs
    Innovation Village | Technology, Product Reviews, Business
    You are at:Home»News»New Era of ‘Mega Breaches’ Signals Bigger Payouts and Shifting Behavior for Cybercriminals

    New Era of ‘Mega Breaches’ Signals Bigger Payouts and Shifting Behavior for Cybercriminals

    0
    By Staff Writer on April 11, 2014 News

    After lurking in the shadows for the first ten months of 2013, cybercriminals unleashed the most damaging series of cyberattacks in history. Symantec’s Internet Security Threat Report (ISTR), Volume 19, shows a significant shift in cybercriminal behavior, revealing the bad guys are plotting for months before pulling off huge heists – instead of executing quick hits with smaller rewards.

    “One mega breach can be worth 50 smaller attacks,” said Sheldon Hand, regional manager for Rest of Africa, Symantec. “While the level of sophistication continues to grow among attackers, what was surprising last year was their willingness to be a lot more patient – waiting to strike until the reward is bigger and better.”

    In 2013, there was a 62 percent increase in the number of data breaches from the previous year, resulting in more than 552 million identities exposed – proving cybercrime remains a real and damaging threat to consumers and businesses alike.

    “Security incidents, managed well, can actually enhance customer perceptions of a company; managed poorly, they can be devastating,” wrote Ed Ferrara, VP and principal analyst, Forrester Research. “If customers lose trust in a company because of the way the business handles personal data and privacy, they will easily take their business elsewhere.” (1)

    Defense is Harder than Offense

    The size and scope of breaches is exploding, putting the trust and reputation of businesses at risk, and increasingly compromising consumers’ personal information – from credit card numbers and medical records to passwords and bank account details. Each of the eight top data breaches in 2013 resulted in the loss of tens of millions of data records. By comparison, 2012 only had a single data breach reach that threshold.

    “Nothing breeds success like success – especially if you’re a cybercriminal,” said Hand. “The potential for huge paydays means large-scale attacks are here to stay. Companies of all sizes need to re-examine, re-think and possibly re-architect their security posture.”

    Targeted attacks were up 91 percent and lasted an average of three times longer compared to 2012. Personal assistants and those working in public relations were the two most targeted professions – cybercriminals use them as a stepping stone toward higher-profile targets like celebrities or business executives.

    For information on steps businesses and consumers can take to better protect themselves – whether it be from a mega data breach, targeted attack or common spam, click here: http://www.symantec.com/security_response/publications/threatreport.jsp.

    Related

    cyber attacks Internet Security Symantec
    Share. Facebook Twitter Pinterest LinkedIn Email
    Staff Writer
    • Website

    I am a staff at Innovation Village.

    Related Posts

    How to Take a Screenshot on a Laptop: Step-by-Step Guide for Windows, Mac, and Chromebook

    9mobile Loses 300K Users Amid MTN Deal Delay

    FG Launches Data Protection Academy to Train Workers and Job Seekers on Privacy

    Leave A Reply Cancel Reply

    You must be logged in to post a comment.

    Copyright ©, 2013-2024 Innovation-Village.com. All Rights Reserved

    Type above and press Enter to search. Press Esc to cancel.