Malware An Increasingly Efficient, Effective Way To Perpetrate Data Breaches

 Wednesday, June 29, 2016

 Canadian Underwriter

Everything is going automatic — and those looking to perpetrate data breaches with malware are no different — emphasizing the need for individuals and organizations to be better prepared to keep the cyber door closed to potential threats. With the change in methodology used by threat actors, moving from manual manipulation to malware, the change greatly widens the pool of targets and enhanced effectiveness, suggests David Ostertag, global investigation manager for Verizon’s investigative response unit. “What we see now is the use of malware in these breaches as opposed to manual processes,” Ostertag said last week during a Verizon presentation in downtown Toronto.
TechnologyRisk Management