Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Partner Summit 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM Newsroom Ingram Micro ONE 2019 News Juniper NXTWORK 2019 News Lenovo Newsroom Lexmark Newsroom NetApp Data Fabric NetApp Insight 2019 News Cisco Live Newsroom HPE Zone Intel Tech Provider Zone

Verizon Analysis: Top 10 Causes Behind Data Breaches

Attackers are stealing account credentials and bypassing security systems as valid users, according to Verizon's analysis of 621 breaches that occurred in 2012.

Back 1   2   3   ... 11 Next

photo
10. Shell Services

Once attackers have access to a corporate network, shell services like SSH and RPC are used to move laterally through an organization, Verizon said. The encryption protocols were also used to export stolen data out of a network. Mitigating the threat involves using one of the 20 Critical Controls; organizations can limit network ports, protocols and services, conservatively applying device configuration, Verizon said.

 
 
Back 1   2   3   ... 11 Next

sponsored resources