{"id":77020,"date":"2015-05-12T20:55:42","date_gmt":"2015-05-13T00:55:42","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-08-10T12:44:41","modified_gmt":"2022-08-10T16:44:41","slug":"what-triggers-a-data-breach","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/what-triggers-a-data-breach\/","title":{"rendered":"What Triggers a Data Breach?"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-106028 size-thumbnail\" title=\"What Triggers a Data Breach?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/insurance.jpg?resize=75%2C71&#038;ssl=1\" alt=\"What Triggers a Data Breach?\" width=\"75\" height=\"71\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/insurance.jpg?resize=75%2C71&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/insurance.jpg?resize=150%2C143&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/insurance.jpg?w=230&amp;ssl=1 230w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/>Cyber-insurer\u00a0<a href=\"https:\/\/www.acegroup.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ace Group<\/a>\u00a0recently published data they say <strong>predicts a data breach<\/strong>. Based on their data (<em>and the need to sell premiums<\/em>) the insurer claims that <strong>all firms are at risk<\/strong> for a data breach. Matthew Prevost, vice president, <a href=\"https:\/\/web.archive.org\/web\/20160617073807\/http:\/\/www.acegroup.com\/us-en\/businesses\/westchester-professional-risk.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">ACE Professional Risk<\/a>\u00a0recently <a href=\"http:\/\/www.claimsjournal.com\/news\/national\/2015\/05\/07\/263249.htm\" target=\"_blank\" rel=\"noopener noreferrer\">claimed<\/a> <strong>data breaches are inevitable<\/strong>.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>When it comes to cyber risk, it is not a question of if or when, but how \u2013 how can an organization proactively prepare for and then quickly respond to cyber-related breaches and interruptions?<\/em><\/p>\n<p><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106030\" title=\"data breaches are inevitable\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cyber-insurance.jpg?resize=100%2C83&#038;ssl=1\" alt=\"data breaches are inevitable\" width=\"100\" height=\"83\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cyber-insurance.jpg?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cyber-insurance.jpg?resize=150%2C124&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cyber-insurance.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/em>ACE has a unique position to speculate, according to <em><a href=\"http:\/\/www.claimsjournal.com\/news\/national\/2015\/05\/07\/263249.htm\" target=\"_blank\" rel=\"noopener noreferrer\">ClaimsJournal<\/a><\/em> ACE has over 15 years of experience with cyber-risk. The firm has cataloged a considerable amount of lost data. They recently shared several key <strong>insights from their proprietary data<\/strong>.\u00a0<em><a href=\"https:\/\/web.archive.org\/web\/20160729153456\/http:\/\/www.fierceitsecurity.com:80\/?\" target=\"_blank\" rel=\"noopener noreferrer\">FierceITSecurity<\/a><\/em> <a href=\"https:\/\/web.archive.org\/web\/20150510195240\/http:\/\/www.fierceitsecurity.com:80\/story\/network-security-attacks-are-top-trigger-data-breaches-says-ace\/2015-05-07\" target=\"_blank\" rel=\"noopener noreferrer\">explains<\/a>\u00a0that based on cyber insurance provider ACE\u00a0data, the top triggers for\u00a0<a title=\"Data breach\" href=\"http:\/\/en.wikipedia.org\/wiki\/Data_breach\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">data <\/a><a title=\"Data breach\" href=\"http:\/\/en.wikipedia.org\/wiki\/Data_breach\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">breaches<\/a>\u00a0are:<\/p>\n<ol>\n<li><strong><a href=\"https:\/\/web.archive.org\/web\/20160318181355\/http:\/\/www.wilmingtonnccomputerrepairs.com:80\/virus-removal\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106032\" title=\"top triggers for\u00a0data breaches\u00a0\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/virus-removal.png?resize=100%2C81&#038;ssl=1\" alt=\"top triggers for\u00a0data breaches\u00a0\" width=\"100\" height=\"81\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/virus-removal.png?resize=75%2C60&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/virus-removal.png?resize=150%2C121&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/virus-removal.png?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a><a title=\"Network security\" href=\"http:\/\/en.wikipedia.org\/wiki\/Network_security\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">Network security<\/a> attacks<\/strong> &#8211;\u00a025%<\/li>\n<li>Lost or stolen devices &#8211;\u00a020%<\/li>\n<li>Human error -16%<\/li>\n<li>Rogue employees &#8211;\u00a015%<\/li>\n<li>Faulty policies &#8211;\u00a09%<\/li>\n<li>Use of paper &#8211;\u00a06%<\/li>\n<li><a title=\"Software bug\" href=\"http:\/\/en.wikipedia.org\/wiki\/Software_bug\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">Software error<\/a>\u00a0&#8211;\u00a03%<\/li>\n<\/ol>\n<p>The firm&#8217;s data says that lost and stolen devices that led to data breaches are:<\/p>\n<ol>\n<li><strong>Laptops<\/strong> &#8211;\u00a070%<\/li>\n<li>Memory devices &#8211; 28%<\/li>\n<li><a title=\"Smart phone\" href=\"https:\/\/web.archive.org\/web\/20180907144717\/http:\/\/www.wikinvest.com:80\/concept\/Smart_phone\" target=\"_blank\" rel=\"nofollow noopener wikinvest noreferrer\">Smartphones<\/a> &#8211;\u00a02%<\/li>\n<\/ol>\n<p><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106034\" title=\"stolen devices\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/stolen-computer.jpg?resize=64%2C100&#038;ssl=1\" alt=\"stolen devices\" width=\"64\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/stolen-computer.jpg?resize=97%2C150&amp;ssl=1 97w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/stolen-computer.jpg?resize=48%2C75&amp;ssl=1 48w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/stolen-computer.jpg?w=371&amp;ssl=1 371w\" sizes=\"auto, (max-width: 64px) 100vw, 64px\" \/>Former employees<\/strong> accounted for 25 percent of insider attacks, and financial incentive was the motive in 72 percent of insider attacks, according to ACE.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>I have written about the cyber insurance market <a href=\"https:\/\/wp.me\/p2wgaW-2QA\" target=\"_blank\" rel=\"noopener\">here<\/a> <a href=\"https:\/\/wp.me\/p2wgaW-2OG\" target=\"_blank\" rel=\"noopener\">and<\/a> <a href=\"https:\/\/wp.me\/p2wgaW-20u\" target=\"_blank\" rel=\"noopener\">here<\/a>. The most surprising factoid to me is that lost or stolen smartphones lead to data breaches 2% of the time. Perhaps the ACE data is old, or the security marketers have spread FUD and hubbub about the need for MDM, EMM, and remote wipes just to make a buck.<\/em><\/p>\n<p><em>Do you agree with ACE&#8217;s stats?\u00a0<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li>Why small businesses should consider cyber liability insurance (hiscoxsmallbizblog.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-insurer Ace Group says that network attacks and lost laptops best predict a data breach.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,2192,2442,125,604,117,951,4],"class_list":["post-77020","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-computer-security","tag-credit-card","tag-data-breach","tag-insurance","tag-laptop","tag-pii","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=77020"}],"version-history":[{"count":17,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77020\/revisions"}],"predecessor-version":[{"id":125339,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77020\/revisions\/125339"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=77020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=77020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=77020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}