This yearly report is becoming the Gold standard in the information Security field.
It can be used to Identify real threats to any organizations data and data systems.
For example, one recent finding concerns Malware Customization: "We are not so happy to say that the increase in customized malware we reported last year appears not to be a fluke limited to 2008. 2009 revealed a similar proportion of breaches (54% of those involving malware) and an incredible 97% of the 140+ million records were compromised through customized malware across the Verizon-USSS caseload."
What this means is that traditional signature based Malware detection is becoming much less effective. Look to replace these systems as part of your systems life cycle with Global Threat intelligence products like Cisco's ASA botnet filter
http://tinyurl.com/chbutg or Mcafees Global Threat intelligence products http://tinyurl.com/297yqjpor other similar products.
You need to be a member of Classroom 2.0 to add comments!
Join Classroom 2.0