©2010Verizon.AllRightsReserved.PTE1462607/102010DataBreachInvestigationsReport2HackingTypes3HackingPathways4MalwareInfectionVector5MalwareFunctionality6MalwareCustomization8MisuseTypes9TimelineofEvents10Assets&Data11Assets&Data12Conclusions&Recommendations13Conclusions&RecommendationsAssetsMostdatacompromisedfromservers&appsDesktops/laptopsincreasing;relatedtostolencredentialsMostcriminalsinterestedincashableformsofdataDiscovery&ResponseDiscoverystilltakesalongtimeandislargelyduetothirdpartiesResponseandcontainmentslowandpronetomishapMitigationThebasics–ifdoneconsistently–aresufficientinmostcasesKeepoutsidersout;theyareincreasinglydifficulttocontrolonceinRestrictandmonitorinsiders;disableaccesswhentheyleaveInmonitoringevents:lookoutforhaystacks–notneedlesPlan,prepare,train,andtestforatimelyandeffectiveresponse14DBIR:::securityblog.verizonbusiness.comEmail:dbir@lists.verizonbusiness.com