<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insider Fraud Spotlight &#187; threat vectors</title>
	<atom:link href="http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/tag/threat-vectors/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.attachmate.com/blogs/insider-fraud-spotlight</link>
	<description>Attachmate Luminet</description>
	<lastBuildDate>Mon, 05 Aug 2013 19:58:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
		<item>
		<title>Check out the new 2011 Verizon Data Breach Report</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/check-out-the-new-2011-verizon-data-breach-report/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/check-out-the-new-2011-verizon-data-breach-report/#comments</comments>
		<pubDate>Fri, 07 Oct 2011 23:15:47 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[threat vectors]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=27</guid>
		<description><![CDATA[The new Verizon report came out this week. Always a favorite, this report highlights insider fraud, breach risks and other useful data. Here are some of my favorite stats: • 83% of attacks were classified as “opportunistic” meaning the victim was identified because they exhibited a weakness or vulnerability that the attacker could exploit. (pg. 52) [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>The new Verizon report came out this week. Always a favorite, this report highlights <a title="insider fraud" href="http://www.attachmate.com/solutions/managing-enterprise-fraud/overview.htm">insider fraud</a>, breach risks and other useful data. Here are some of my favorite stats:</p>
<p>• 83% of attacks were classified as “opportunistic” meaning the victim was identified because they exhibited a weakness or vulnerability that the attacker could exploit. (pg. 52)<br />
• 74% of breaches in the study take weeks or months to discover (after point of compromise). (pg. 55)<br />
• 30% of fraud is discovered when there is a notification by law enforcement; 6% were reported to the organization by the affected customer or partner. (pg. 59)<br />
• 1/3 of the breaches studied in the report showed evidence of anti-forensics. (pg. 61)<br />
• A recommendation to restrict and monitor privileged users and conducting annual user account reviews were cited among the best ways to prevent or curtail fraud. (pg. 68)</p>
<p>You can find the full <a href="http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf" target="_blank">2011 Data Breach Investigations Report here</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/check-out-the-new-2011-verizon-data-breach-report/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>