Monday, July 28 2014 6:52 PM EDT2014-07-28 22:52:27 GMT
Only final arguments and a ruling remain in the trial to determine whether Donald Sterling's estranged wife can sell the Los Angeles Clippers to former Microsoft CEO Steve Ballmer for $2 billion.More >>
A judge ruled against Los Angeles Clippers owner Donald Sterling on Monday in his attempt to block the $2 billion sale of the Los Angeles Clippers to former Microsoft CEO Steve Ballmer.More >>
Monday, July 28 2014 6:51 PM EDT2014-07-28 22:51:13 GMT
Israel and Hamas have lowered the pace of the fighting in the three-week-old Gaza war as international efforts intensify to end the conflict that has already killed 1,030 Palestinians and 43 Israeli soldiers.More >>
Signaling an escalation of Israel's Gaza operation, Prime Minister Benjamin Netanyahu told Israelis Monday to be ready for a "prolonged" war, and the military warned Palestinians in three large neighborhoods to leave...More >>
Monday, July 28 2014 6:37 PM EDT2014-07-28 22:37:39 GMT
Alex City animal control officer Kelly Cotney still doesn't believe Nick Patterson when Patterson apparently told investigators in early June he could no longer care for his championship Collie show dogsMore >>
An Alex City animal cruelty suspect is facing dozens of additional felony charges. More >>
PHOENIX (CBS5/AP) -
Verizon's 2013 Data Breach Investigations Report studied roughly 50,000 security incidents in dozens of countries, gathering data from 19 different groups, including the Secret Service.
Although the results are concerning, a local expert isn't shocked by the findings.
"This is absolutely a sign of the times and I don't care who you are, you can say, 'I'm never going to get on the internet, I'm never going to buy a smartphone,' it does not matter. You're still going to be the victim of a breach because you're doing business with companies who are being targeted," said Ken Colburn of Data Doctors.
The report finds that financially motivated cyber crime holds the top spot for all breaches.
Specifically, 92 percent of breaches came from outsiders, which means some of these breaches are coming from inside the organization.
"It's generally not because somebody is after you, it's just mistakes people are making internally that allow these breaches to happen," said Colburn.
About 76 percent of network breaches were due to weak or stolen usernames or passwords.
"If you really want to increase the security level of a password, don't make it real complicated, make it long. Fifteen characters or more is going to bypass a lot of the password breaking tools that are out there," said Colburn.
And 66 percent of breaches took months or more to discover. Such was the case with Basha's Supermarkets back in February.
"It's real easy to get fooled today. People are used to having machines that are a little slow, it's taking a little longer. These are indications that somebody needs to look at your equipment," Colburn said.
Colburn added that one of the biggest challenges businesses have today is what he calls BYOD, or "bring your own device." That's because an infected laptop, smartphone or thumb drive from home can ultimately infect the businesses' entire network.