Are You Having A Technology Emergency?

Network Computing Technologies Blog

What Can Be Learned from the Most Recent DBIR

What Can Be Learned from the Most Recent DBIR

Since 2008, Verizon has released an annual report that details the cybersecurity incident trends from the beginning of the year. As usual, this year’s edition provided some insights into the patterns witnessed in 2019, hopefully giving us a greater appreciation for how cybercriminals are shaping their attacks. Let’s go over some of the trends that the Verizon Business 2020 Data Breach Investigations Report (DBIR) revealed to us.

Small Businesses are a Target

While this should go without saying, there is still the assumption in many smaller organizations that they are simply too small to be of any interest to a cybercriminal. This is a flawed assumption, and here’s why: data is data, regardless of where it comes from, which means that its value to a cybercriminal is left unaffected.

This assumption adds a significant shortcoming to the small business’ security by giving small businesses a false sense of their safety. With so many cyberattacks requiring very little (if any) effort into their execution, there is no reason that cybercriminals wouldn’t include small businesses. A bigger target list, taken care of through automated attacks, is only going to net the person responsible a greater payday.

Furthermore, many small businesses possess precisely the kind of data that would be of interest to a cybercriminal. Many doctors’ offices are relatively small operations but contain significantly valuable medical and payment information.

The Human Element is Often Involved

Based on the results outlined in the DBIR, a significant portion of successful attacks relied on a business’ biggest weakness: the relatively fallible and error-prone humans sitting at the controls. From the phishing attacks that bamboozle so many to the honest mistakes that we can all make; cybercriminals actively seek out opportunities to take advantage of these moments of vulnerability.

Proactive Upkeep is Half the Battle

To protect your business from threats, you need to keep up with these kinds of trends and work to resolve these issues proactively. Network Computing Technologies can help with this part. To learn what we can do to help your business, reach out to us at (214) 544-3982.

You Need to Focus on Your Cybersecurity on Three F...
Tip of the Week: Streamlining Your Workstation for...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Monday, December 06 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://nctnet.net/

Contact Us

Learn more about what Network Computing Technologies can do for your business.

Call Us Today
Call us today
(214) 544-3982

22 Prestige Circle #300
Allen, Texas 75002

Latest Blog

When it comes to software solutions, many companies don’t have as much freedom as they might like to pick and choose the highest quality solutions available. Some companies might even opt to take advantage of free, open-source software simp...
TOP