.st0{fill:#FFFFFF;}

Our takeaways from the 2023 VDBIR – Ep 417 

 July 28, 2023

By  Donna Grindle

Verizon has released their 2023 Data Breach Investigations Report (DBIR). This year they focused more on an analysis of actual data breaches – the types of incidents causing the breaches, the motivations of bad actors, how they tend to carry out their attacks and what data they are grabbing. We always look forward to reading this report because it not only has a lot of great information, but also because it contains a good bit of humor. You know we like that.

A 5 star review is all we ask from our listeners.
1x
Free HIPAA Training
Subscribe to the weekly email update from HMWH

I have read and agreed to your Privacy Policy

In this episode:

Our takeaways from the 2023 VDBIR- Ep 417

Today’s Episode is brought to you by:

Kardon 

and 

HIPAA for MSPs with Security First IT

 Subscribe on Apple Podcast. Share us on Social Media. Rate us wherever you find the opportunity. 

Great idea! Share Help Me With HIPAA with one person this week!

Learn about offerings from the Kardon Club 

and HIPAA for MSPs

Thanks to our donors.  We appreciate your support! 

If you would like to donate to the cause you can do that at HelpMeWithHIPAA.com

Like us and leave a review on our Facebook page: www.Facebook.com/HelpMeWithHIPAA

If you see a couple of numbers on the left side you can click that and go directly to that part of the audio. Get the best of both worlds from the show notes to the audio and back!

Thanks to our donors.


HIPAA Briefs

[04:11] What is an NPP, who needs them and where should you be able to find it?

The Notice of Privacy Practices (NPP) is a requirement under the HIPAA Privacy Rule for covered entities to disseminate to their patients. Most people think of the NPP as that HIPAA thing you sign at the doctor.

There is an NPRM out there with a proposal to get rid of having to have patients sign that they’ve seen the NPP if the CE makes sure that they have placed it prominently in their public areas like they’re supposed to. When you go to the doctor’s office and should see it easily available in the waiting room and you should be able to get a copy. Also, if the CE has an informational website, it should be posted there and easy to find.

HIPAA Say What!?!

[07:27] So, we’ve come up with a new acronym (that we are going to try to sneak by our internal FCC) that we will use to describe an incident or breach that was a “totally unnecessary royal disaster”… TURD. 

So, this goes into the rest of our specific nomenclature with “stay out of my breaches”, “knock me down and steal my teeth”, and now we have “it’s a situation that is a turd”.

Our takeaways from the 2023 VDBIR

[10:16] The 2023 Verizon Data Breach Investigations Report (DBIR) is out. Get your copy at the link below. 

We always love to read this report because not only is it packed full of a lot of great information on the status of cybercrime and what we’ve learned in the past year, but it is also well written and quite funny at times. You know we are always down with funny.

2023 Data Breach Investigations Report | Verizon

It is no surprise that social engineering is the most effective and extremely lucrative attack method by cyber criminals. In fact, Business Email Compromise (BEC) has almost doubled across all industries and all sizes of organizations.  Social engineering is all about treating an individual like somebody you wanna trick. It goes beyond just phishing. All of social engineering involves the human element.

74% of all breaches include the human element, with people being involved either via Error, Privilege Misuse, Use of stolen credentials or Social Engineering. 

83% of breaches involved External actors, and the primary motivation for attacks continues to be overwhelmingly financially driven, at 95% of breaches. 

The three primary ways in which attackers access an organization are stolen credentials, phishing and exploitation of vulnerabilities.


[16:18] Stolen credentials and phishing from social engineering attacks is nothing new. We’ve been talking about that for 10 years or so. The exploitation of vulnerabilities is not new either and we are seeing it a lot more now. Unlike even 5 years ago, smaller organizations can now actually afford to implement true vulnerability management. You’ve gotta to have good patching policies and although some IT companies wait to roll out newly released patches for a week or two so they can test them to make sure they aren’t going to break all of the machines they are deployed on, with the zero day vulnerabilities (like Log4j), patches have to be done much quicker to prevent those vulnerabilities from being exploited.

The actor analysis from the report shows that 83% of breaches were caused by external actors, while internal actors account for 19% of breaches. Not very surprising there, but the fact that “partners” make up an even small percentage of breaches is startling. They’re not talking about your supply chain vendor being hit by a bad actor and the blast filtered to your organization here. They’re talking about a business partner being the initiator of the attack themselves. That’s scary that a partner you have some level of trust with is attacking organizations itself.

Ransomware

[27:28]  Almost a quarter of breaches are caused by ransomware. It’s not going away folks.

That almost a quarter of breaches involve a Ransomware step continues to be a staggering result. However, we had been anticipating that Ransomware would soon be hitting its theoretical ceiling, by which we mean that all the incidents that could have Ransomware, would have. Ransomware is present today in more than 62% of all incidents committed by Organized crime actors and in 59% of all incidents with a Financial motivation, so sadly there is still some room for growth.
 

You know how we say from time to time “it’s the CIA of the PHI you CReMaTe”? Here’s a quote from the report that reiterates that:

The next time you meet an incident responder in the wild, know that all that goes through their mind is, “Did the asset or a copy of the data get out the door” (Confidentiality), “was it changed from a known and trusted state” (Integrity) and “do we still have access to it ourselves?” (Availability). Please offer them a word of kindness and a beverage, because it is a very tortured existence. If you are feeling cold, they are cold too.

One more thing about ransomware, that again is not surprising, is that email tops the list of the #1 action vector that precipitated ransomware attacks. That’s the action someone took that triggered the ransomware attack. Desktop sharing software and web applications are up there too, but email… it’s the people, people.

Healthcare

[33:45] The headline under the healthcare section says it all:

A sector under siege

The Healthcare vertical is highly targeted by ransomware gangs, which results in both the loss of use of their systems—potentially with life-threatening consequences—as well as data breaches. While the number of ransomware incidents peaked in this industry in 2021, the last three years have seen a jump in data breaches (where the data is confirmed to have been stolen as well as the encryption triggered) caused by ransomware. This combination of attacks by adversaries is resulting in more data being compromised in addition to the usual chaos of staff being forced to do their jobs without the systems they rely upon.
 

For several years, healthcare was the industry that had more attacks and more data breaches from insiders than any other industry. And I think that’s leveled out a little bit and has a lot to do with uptick in monitoring user logins and access, which wasn’t happening for a long time. But, the report did point out:

 Where’s my gruntle?

Ah, the disgruntled employee The industry’s only defense for when someone loses their gruntle is fast detection of unusual data access patterns. This remains a challenge for any industry where internal actors are motivated to cause trouble.

See… humor.

You can just monitor for people who are using the front door with a key. You can’t just monitor for login attempt problems. You have to also monitor for things like what people are accessing and what times of day/night they are accessing data, is that typical behavior for that user, etc. You have to monitor for unusual data access and download patterns, too.

If you assume, just because somebody’s worked at your organization for 10 years or more, that they are not going to for some reason no longer be a gruntle. You’re not paying attention. So, please accept that not all employees are gruntle. 

SMBs

[40:34] SMBs are no different than any other business. 

…SMBs and large organizations have increasingly become similar to each other. This phenomenon began several years ago, and by now there is so little difference based on organizational size that we were hard-pressed to make any distinctions whatsoever. Therefore, this year we decided to look at these a bit differently by looking at the implementation of security controls for various size SMBs (smaller, midsize and larger) and how they may overlap or differ.

So, they recommend that if you are a SMB with limited resources for implementing security controls, start with the CIS control, control group 1, which consists of security awareness training, data recovery and access control management.  The same things we talk about.

Finally, typically you will see that what motivates bad actors is financial gain or espionage purposes. But one of the things we found interesting in the report about actor motives was that 1% of the data breaches occur because People just said it was fun. That’s just disturbing.

Cybersecurity is a collective effort. Everyone is on the cybersecurity team. The responsibility to protect networks and data does not solely fall on IT. We must do our part in recognizing social engineering attacks and training ourselves to remain security conscious to reduce our cybersecurity risk. 

Remember to follow us and share us on your favorite social media site. Rate us on your podcasting apps, we need your help to keep spreading the word. As always, send in your questions and ideas!

HIPAA is not about compliance,

it’s about patient care.TM

Special thanks to our sponsors Security First IT and Kardon.

HelpMeWithHIPAA.com Is A
Collaborative Project

Created & Sponsored By: