Friday, August 19, 2022

Flashpoint’s report shows data theft incidents take place frequently due to hacking

Flashpoint, a global platform dealing in risk intelligence for organizations, release a report which says during the first half of 2022, the most serious breaches dropped as compared to last year. The report shows that 1,980 breaches occurred due to glitches and web-related errors have fallen from 27.3 billion in 2021 to 1.4 billion in 2022.

While this indicates that businesses would have set their priorities to prevent data breaches and still organizations need to become active in dealing with cyber threats efficiently. Most of the data breaches recognized in the report are due to hacking, with 60 percent of cybercrimes aroused from illegitimate access to software systems. This is essentially crucial to take steps to minimize web exposure as well as organizations will need to pay attention to stopping cybercriminals. Moreover, security teams within organizations need to focus on vulnerability management strategies with improved intelligence. Talking about vulnerability management, it is the cyber activity that is based on efficient assessment and detailed report of susceptible actions in IT. Vulnerability is the major issue that organizations are worried about. Because of this organizations must become proactive in closing loopholes and insecure setups.


Flashpoint’s study also reveals that only 23 percent of data breaches initiated from within the victim enterprise and mostly (61 percent) of breaches were mainly due to data handling errors. The state of data breach intelligence study identified 54 breaches aroused from Turncloak (malicious insider) referring to someone who illegally uses credentials for financial or personal benefits. In addition, the occurrence of ordinary events of cybercrime to minor stealing of credit card data from people during purchasing.

Finally, Flashpoint’s mid-year report depicts how firms should learn security measures accordingly and address the significant threats that often take place when defending against, or getting back to normal circumstances after a data breach.

Read next: 265 Brands Impersonated in Credential Phishing Attacks in the First Half of 2022
by Arooj Ahmed via Digital Information World

No comments:

Post a Comment