Our Latest Online Backup Reviews:Vembu SyncBlaze
Industry LinksTools and Graphs
Symantec Report Reveals the Number of Mega Data Breaches went from 1 in 2012 to 8 in 2013; 552 Million Identities Exposed in 2013
MOUNTAIN VIEW, CA – April 8, 2014 – /BackupReview.info/ — After lurking in the shadows for the first ten months of 2013, cybercriminals unleashed the most damaging series of cyberattacks in history. Symantec’s Internet Security Threat Report (ISTR), Volume 19, shows a significant shift in cybercriminal behavior, revealing the bad guys are plotting for months before pulling off huge heists – instead of executing quick hits with smaller rewards.
“One mega breach can be worth 50 smaller attacks,” said Kevin Haley, director, Symantec Security Response. “While the level of sophistication continues to grow among attackers, what was surprising last year was their willingness to be a lot more patient – waiting to strike until the reward is bigger and better.”
In 2013, there was a 62 percent increase in the number of data breaches from the previous year, resulting in more than 552 million identities exposed – proving cybercrime remains a real and damaging threat to consumers and businesses alike.
“Security incidents, managed well, can actually enhance customer perceptions of a company; managed poorly, they can be devastating,” wrote Ed Ferrara, VP and principal analyst, Forrester Research. “If customers lose trust in a company because of the way the business handles personal data and privacy, they will easily take their business elsewhere.”1
Defense is Harder than Offense
“Nothing breeds success like success – especially if you’re a cybercriminal,” said Haley. “The potential for huge paydays means large-scale attacks are here to stay. Companies of all sizes need to re-examine, re-think and possibly re-architect their security posture.”
Targeted attacks were up 91 percent and lasted an average of three times longer compared to 2012. Personal assistants and those working in public relations were the two most targeted professions – cybercriminals use them as a stepping stone toward higher-profile targets like celebrities or business executives.
How to Maintain Cyber Resiliency
Symantec will be hosting a webinar on this year’s ISTR results on Tuesday, April 15, 2014 from 10:00 to 11:00 a.m. PDT. For more information or to register, please go here.
About the Internet Security Threat Report
NOTE TO U.S. EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in U.S. dollars and are valid only in the United States.
Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
FORWARD-LOOKING STATEMENTS: Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.
1 New Research: CISOs Need To Add Customer Obsession To Their Job Description, Ed Ferrara Forrester Research, Inc. Blog Post, March 2014
Gerritt Hoekman, Edelman PR,
General Tags: backing up online, online backup providers directory, SaaS, data security, online backup reviews, online file storage, cloud computing, online backup companies, software as a service, online backup, online backup news, online backup services, CEO interviews, online file backup, compare online backups, online data backup, data storage, top rated online backups
Like us on Facebook
Sponsored Links:Data Deposit Box Asigra Bacula Systems