Enterprises fall behind on protecting against phishing, detecting breaches

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report came out this morning with bad news on multiple fronts

The ninth annual Verizon Data Breach Report came out this morning with bad news on multiple fronts, including click-through rates on phishing messages, how long it takes companies to detect breaches, and even whether companies spot the breaches at all.

Phishing emails continued to be a primary starting point for attacks, said Bryan Sartin, executive director, global security services at Verizon.

The number of phishing email messages that were opened hit 30 percent in this year's report, up from 23 percent last year.

In addition, 12 percent of users don't just open the email but open the attachment as well, while 11 percent follow links in the email to online forms where they then input sensitive data such as login credentials.

[ MORE FROM VERIZON: Verizon provides a behind the scenes look at data breaches ]

The median time for the first user of a phishing campaign to open the malicious email was 1 minute, 40 seconds and the median time to the first click on the attachment was 3 minutes, 45 seconds.

The vast majority of the attacks, or 89 per cent, were by financially-motivated crime syndicates, and the other 9 per cent by state-affiliated actors.

Another problem that continues to plague enterprises is the lack of basic two-factor authentication, said Sartin. "It would mitigate an entire swathe of these breaches."

In fact, 63 per cent of all breaches included the use of stolen credentials, up from 51 per cent in last year's report.

Sartin suggested that enterprises might be getting buried in all the complexity of operational security management, or be too driven by compliance.

"Sometimes people get lost and can't see the forest through the trees," he said.

Then, once the attacker is in the system, enterprises are actually getting worse at detecting the problem.

In 92 per cent of breaches, it took attackers just minutes to get into a company after the first attempt, with 30 per cent able to exfiltrate the first data within hours, and another 68 pe rcent able to get data out within days. But the number of enterprises that were able to spot a breach as it was happening in "days or less" was less than 25 percent.

In fact, the gap between the time to compromise and the time to discovery rose from 62 per cent in last year's report to 84 per cent this year.

In fact, the number of breaches detected internally, or via fraud detection mechanisms such as those in the credit card industry, have also fallen. Instead, most breaches are now detected by law enforcement authorities or other third parties.

"Third-party detection and law enforcement collaboration is getting better," said Sartin.

Once security experts take down one command and control server, for example, they may find that the same infrastructure was used to go after a number of victims. They also spot sensitive information as it shows up for sale on the dark web, he said.

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags phising


EDGE 2023

EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.


ARN has celebrated gender diversity and recognised female excellence across the Australian tech channel since first launching WIICTA in 2012, acknowledging the achievements of a talented group of female front runners who have become influential figures across the local industry.

ARN Innovation Awards 2023

Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.

Show Comments