Data Breach Threat Intelligence By The Numbers

Third-Party IT Operations Contributed To Breaches

The firm said outsourced, third-party IT operations contributed to some breaches, introducing security deficiencies easily exploited by hackers. Remote access tools are commonly used by remote IT operations. Third parties were responsible for system support, development and maintenance in 63 percent of investigations conducted by the Trustwave forensics team.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.