Cyber Security & Big Data Analytics

Cyber Security & Big Data Analytics

I recently attended a symposium on “New Strategies for Encryption and Protection against Data Breaches”. The keynote speaker was: Steve Lutinski, Director, Cyber Security Services, Verizon Enterprise Solutions. Steve introduced Verizon’s DBIR Report (Data Breach Investigation Report) for 2017. You may view it here:

Some of the points that were brought out by Steve were based on mid to large size companies but the same points remain for all size businesses.

  • It takes 208 days for a company to discover a data breach.
  • 82% of bad actors (data hackers) hack in in minutes.

The three most vulnerable areas according to the report are:

  • Education

Who – 71% External Hackers (data mining)

What – 56% Personal

Why – 45% Money (Intellectual Property)

How – 67% Breaches


  • Health Care

Who – 32% *External Hackers

What – 69% Medical Records

Why – 64% Financial

How – 81% Breaches

*Most breaches are from internal people – 68%


  • Public Sector

Ransom Wear Attacks Are #1 among All Industries

2015 – 1000 Attacks

2017 – 8000+ Attacks

26% of all Security Incidents Were DOS Attacks


Human error is still the number one cause for hackers breaching web sites, mail servers and data bases. Verizon is going to be pushing two step verification for every level.

Google and Google Chrome is going to start to block http in the next several months. Certificates for https will be mandatory in order to be found in the Google searches.

EU Compliance Evolves. General Data Protection Regulation (GDPR) proposed by the European Commission will strengthen and unify data protection for individuals within the European Union (EU), whilst addressing the export of personal data outside the EU. This will effect American companies within the next 100 days.

Verizon is recommending that when possible even in local communities, IT personnel should, PREPARE – be PROACTIVE – PARTNER with fellow companies and professionals.

Jim Mahlmann


NetCetra LLC

Posted in Security and tagged , , , , , , , , , .