Blog
What can we learn from Verizon Data Breach Investigation Report (DBIR)
By BUFFERZONE Team, 12/06/2023
Target: Consumers
Tags: Threat Intelligence, Malware, Phishing, Insider Threat, Vulnerabilities, Ransomware, Credentials
The 2023 Data Breach Investigations Report (DBIR) by Verizon Business has yielded several important insights into the current state of cybersecurity. The report is based on data collected from November 1, 2021, till October 31, 2022.
The report indicates that 83% of the breaches involve external actors, most of whom are financially motivated. The report emphasizes that the human element is a key contributor that is responsible for 74% of all breaches. Those human element faults are caused by social engineering attacks, errors, or misuse while social engineering nearly doubled since last year. When analyzing the percentage of non-error and non-misuse breaches we can learn that stolen credentials, phishing and vulnerability exploitation lead the category.
The report highlights that the cost of ransomware incidents has more than doubled over the past two years and 24% of all breaches are caused by ransomware while the cost to the organization ranges between $1 to $2.25 million.
The report reveals that Denial of Service (DOS), Ransomware, and instances of lost or stolen credentials – typically through phishing attacks – are the predominant security incident threats. Moreover, the report highlights that web applications, email, carelessness, and desktop sharing emerge as the most significant breach-related attack vectors.
At BUFFERZONE®, we are driven by the conviction that establishing a straightforward, uncomplicated set of controls is the optimal path towards safeguarding an organization. Admittedly, we could restrict user access to browsing, file downloads, and opening attachments – all of which are recognized as potent attack vectors. However, such measures would severely compromise the user experience at work. Therefore, our security approach takes a distinctively different route.
BUFFERZONE® Safe Workspace® is a suite of prevention capabilities based on application isolation technology that includes Safe Browsing, SafeBridge® (Content Disarm and Reconstruction capabilities), Safe Removable (USB attack prevention), all combined with clipboard security. Safe Workspace® virtual container is created by a kernel driver, which virtually separates the operating system into two logical zones. The first zone is the trusted zone, which is connected to all the organization’s networks and the operating system’s files. The second zone is called the untrusted zone, which acts as a buffer zone where different applications can securely run isolated from the trusted zone’s memory, files, registry, and processes. This method offers advantages such as low CPU and memory footprint, high quality of experience, and the ability to seamlessly work inside the virtual container without noticing that you are protected from browsing and USB threats. BUFFERZONE® is the only virtual containment solution that works based on six patented technologies. By using Safe Workspace® you are protected against phishing attacks, malicious downloaded files, and Email attachments and links (using outlook extension). Security must be simple and intuitive.
Try us now!