According to Breach Level Index of 2018 First Half Review report, records breached in the first half of 2018 are 4,553,172,708. In 2018, more data were stolen than ever before. The major source of these data breaches result from human errors and poor security practices . Especially insecure mobile devices constitute a significant number of breaches. “Mobile Security researchers observed this trend in action when they found that the Firebase databases for thousands of Android and iOS apps were unprotected and had thereby exposed approximately 100 million data records” (Gemalto NV, 2018).
Malicious outsiders and accidental loss were at the top of the list in the first half of 2018 In terms of data breach sources. “ Those forces accounted for some of the biggest security incidents reported including Twitter and Under Armour … The accidental loss, in particular, was the leading factor behind several breaches where data records were disclosed because organizations didn’t take proper action to secure their cloud-based assets. One of the largest of these leaks involved the exposure of 48 million records belonging to LocalBlox, a personal and business data search service. Then there was Bongo International, a company acquired by FedEx in 2014 which misconfigured an Amazon S3 bucket containing 119,000 scanned documents including individual passports, driving licenses and security IDs.”(Gemalto NV, 2018).
In the report, it was stated “ Given the rationale for GDPR and other data protection regulations, it’s no wonder that privacy took centre stage in the first half of 2018. That was the case especially with instances where companies violated users’ privacy. Such was the case in a data scandal where the political consulting firm Cambridge Analytica improperly harvested the data of 87 million Facebook users”(Gemalto NV, 2018).
Malicious outsiders constituted a significant source of data breaches
Malicious outsiders constituted a significant source of data breaches in the first half of 2018. The number of records exposed by external attackers rose to 3,648,160,927 records breached. (Gemalto NV, 2018).
The Domination of Identity Theft social engineering stats
Identity theft was once again the most prevalent data breach type tracked. It accounted for 3,972,437,893 compromised records. social engineering stats
The social media industry ranks first in terms of a breach in the first half of 2018. Then, other industries subsequently follow it: government sector, other industries, retail, technology, industrial and education.
The healthcare industry ranks first in terms of the number of breach incidents by industry in the first half of 2018. Then, other industries subsequently follow it: other industries, Financial Services, Education, Professional Services, Government, Retail, Technology, Industrial. social engineering stats
See the number of the breach by industry over time in the following picture.
Solutions to Prevent Data Loss
There are a number of causes of data loss such as human error, computer viruses, natural disasters, hardware or system problem and software corruption or program problems which makes data loss a reality. It is not a matter of time that data loss will occur. Therefore, users cannot rely upon their technological solution alone. They must adopt and implement some holistic solutions in order to prevent data loss.
People, Process and Technology- Keepnet Labs cybersecurityDue to the intensification and variation of cyber attacks, the wide range of victims, the role of an outsider as well as the insider threats, it’s been clear that the technology cannot alone address the number of cyber attacks those threat organizations. Therefore it is important for organizations to employ a holistic approach to cybersecurity defence posture. A holistic approach incorporates technical, human and process phenomenon that is projected to detect, prevent, and remove the cybersecurity threats.
Keepnet Labs uses threat simulation and threat intelligence to unleash real risks that affect users for the “first-line-of-defence technology”, which is against email-origin malware, especially phishing attacks, and allows them to take measures against threats. social engineering stats
When technology investments are inadequate to counteract cyber attacks, the human factor is considered the most effective means of security and data defence. With phishing simulation, online training and incident response features, Keepnet Labs transforms users into proactive agents who can actively identify and fight against cyber attacks. social engineering stats
Firms divided into dozens of departments generate difficulties and the problems of integrating separate departments with one another lead to a delay in cyber attacks awareness and blocking. It’s difficult for organisations to measure the real benefits of investing in human-based cybersecurity — and as long as there isn’t any damage — firms fall into an artificial sense of confidence. Keepnet Labs fixes these issues with the “process solution”, which enables companies to their own security processes and execute them — as well as create real-time development charts, monitor compliance with standards and live this life cycle.
“This post is originally published at www.keepnetlabs.com”
Teknoloji Haberleri
- Lost'ta gizlenen Star Wars sürprizi: The Force Awakens'a yedi yıl önce selam çakmışLost’un 4. sezonunda yer alan ve Star Wars’un ikonik repliğine yapılan bir gönderme, J.J. Abrams’ın iki evren arasındaki bağını gözler önüne seriyor. Bu detay, Abrams’ın Star Wars sevgisini yansıtırken, The Force Awakens’ın vizyona girmesinden yedi yıl önceki bir işaret niteliği taşıyor.
- Saç dökülmesine çare, "yanlışlıkla bulunan" bu jel olabilirÇığır açan şeker jeli, erkekler ve kadınlar için mucizevi bir saç dökülmesi çözümü olabilir. İşin ilginç tarafıysa, bu jelin aslında saç dökülmesine karşı geliştirilmemiş olması...
- Yaklaşan TikTok yasağı, bu Çinli uygulamaları "uçurdu"ABD'de TikTok yasağı yaklaşırken, Çinli sosyal medya uygulaması RedNote bir numaralı uygulama olmayı başardı. Ama hepsi onunla da sınırlı değil. Az bilinen bir grup Çinli uygulama, uygulama mağazası sıralamalarının en üst sıralarına yerleşmiş durumda.
- Concorde'dan yıllar sonra, süpersonik ticari uçuşlar geri dönüyorSon uçuşunu 2003 yılında gerçekleşen efsanevi süpersonik yolcu uçağı Concorde'dan bu yana ilk kez, sesten hızlı ticari uçuşlar geri dönmeye bu kadar yakın görünüyor.
- Microsoft, Phoneix projesiyle Edge tarayıcısını yeniliyorMicrosoft'un Phoenix Projesi, web tarayıcısı Edge'in Windows 11'de hiç olmadığı kadar iyi görünmesini sağlayacak. Peki bu güncelleme, Chrome ile rekabet etmesi için yeterli olacak mı?