
{"id":510,"date":"2009-04-17T10:10:28","date_gmt":"2009-04-17T13:10:28","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=510"},"modified":"2009-07-01T08:50:49","modified_gmt":"2009-07-01T11:50:49","slug":"publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/","title":{"rendered":"Publicado el informe 2009 de Verizon sobre fugas de informaci\u00f3n"},"content":{"rendered":"<p>La semana, <a onclick=\"javascript:pageTracker._trackPageview('\/outbound\/article\/isc.sans.org');\" href=\"http:\/\/isc.sans.org\/diary.html?storyid=6193\">adem\u00c3\u00a1s de los parches de Microsoft<\/a> (incluyendo un evento cr\u00c3\u00adtico de <a onclick=\"javascript:pageTracker._trackPageview('\/outbound\/article\/www.microsoft.com');\" href=\"http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS09-012.mspx\">escalada de privilegios en el sistema<\/a>, <a onclick=\"javascript:pageTracker._trackPageview('\/outbound\/article\/www.microsoft.com');\" href=\"http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS09-009.mspx\">exploits p\u00c3\u00bablicos para Excel<\/a> y hasta <a onclick=\"javascript:pageTracker._trackPageview('\/outbound\/article\/www.microsoft.com');\" href=\"http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS09-010.mspx\">para el mism\u00c3\u00adsimo Wordpad<\/a>), ha tra\u00c3\u00addo otras muchas novedades.<\/p>\n<p><a onclick=\"javascript:pageTracker._trackPageview('\/outbound\/article\/isc.sans.org');\" href=\"http:\/\/isc.sans.org\/diary.html?storyid=6202\">Me quedo con el informe 2009 de Verizon<\/a>, todo un cl\u00c3\u00a1sico a la hora de informar sobre incidentes relacionados con la fuga y\/o exposici\u00c3\u00b3n de informaci\u00c3\u00b3n sensible. Este documento se ha publicado recientemente bajo el t\u00c3\u00adtulo <a onclick=\"javascript:pageTracker._trackPageview('\/outbound\/article\/www.verizonbusiness.com');\" href=\"http:\/\/www.verizonbusiness.com\/resources\/security\/reports\/2009_databreach_rp.pdf\">Verizon 2009 Data Breach Investigation Report<\/a>, y francamente, creo que es un buen <em>input<\/em> para documentarse sobre la tipolog\u00c3\u00ada de los incidentes que provocan la exposici\u00c3\u00b3n no deseada de informaci\u00c3\u00b3n confidencial.<\/p>\n<p>La portada, adem\u00c3\u00a1s de bonita y bien elaborada, incluye un dato que resume en cifras lo que ha sido 2008: 285 millones de registros quedaron expuestos, considerando los incidentes de los que Verizon tiene conocimiento (evidentemente, no todos los incidentes de este tipo se revelan)<\/p>\n<p>52 p\u00c3\u00a1ginas repletas de datos interesantes, como por ejemplo, un 74% de incidentes protagonizados por agentes externos a las organizaciones. Los atacantes internos suben un 2% en el interanual, siendo responsables de un 20% de los casos, mientras que desciende el n\u00c3\u00bamero de incidentes con <em>business partners<\/em> y contratas externas involucradas, cayendo la cifra hasta un 32%. En el 39% de los casos documentados se ha determinado que las fugas de informaci\u00c3\u00b3n estuvieron protagonizadas por m\u00c3\u00baltiples partes.<\/p>\n<p>M\u00c3\u00a1s datos: El 30% de los incidentes estuvo causado por el <em>malware<\/em> (y es que los troyanos de Windows son conflictivos, peligrosos y hacen sudar la gota gorda a los usuarios de estas plataformas, pero el mundo gira alrededor de m\u00c3\u00a1s cosas que Windows). La palma se la lleva, como siempre, la comisi\u00c3\u00b3n de errores operacionales severos, presentes en un 67% de los casos, seguido muy de cerca de incidentes soportados en <em>hacking<\/em> (un 64% de las casu\u00c3\u00adsticas)<\/p>\n<p>Creo que el texto puede ayudar a comprender qu\u00c3\u00a9 se cuece realmente ah\u00c3\u00ad fuera cuando hablamos de incidentes en los que se doblega la confidencialidad, m\u00c3\u00a1s all\u00c3\u00a1 de las c\u00c3\u00a1balas y aproximaciones hechas desde sillones desconectados de la realidad. El informe se puede descargar gratuitamente en <a onclick=\"javascript:pageTracker._trackPageview('\/outbound\/article\/www.verizonbusiness.com');\" href=\"http:\/\/www.verizonbusiness.com\/resources\/security\/reports\/2009_databreach_rp.pdf\">http:\/\/www.verizonbusiness.com\/resources\/security\/reports\/2009_databreach_rp.pdf<\/a>.<\/p>\n<p>Fuente: www.sahw.com\/wp\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La semana, adem\u00c3\u00a1s de los parches de Microsoft (incluyendo un evento cr\u00c3\u00adtico de escalada de privilegios en el sistema, exploits p\u00c3\u00bablicos para Excel y hasta para el mism\u00c3\u00adsimo Wordpad), ha tra\u00c3\u00addo otras muchas novedades. Me quedo con el informe 2009 de Verizon, todo un cl\u00c3\u00a1sico a la hora de informar sobre incidentes relacionados con la [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-510","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Publicado el informe 2009 de Verizon sobre fugas de informaci\u00f3n<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Publicado el informe 2009 de Verizon sobre fugas de informaci\u00f3n\",\"datePublished\":\"2009-04-17T13:10:28+00:00\",\"dateModified\":\"2009-07-01T11:50:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/\"},\"wordCount\":383,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Publicado el informe 2009 de Verizon sobre fugas de informaci\u00f3n\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2009-04-17T13:10:28+00:00\",\"dateModified\":\"2009-07-01T11:50:49+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Publicado el informe 2009 de Verizon sobre fugas de informaci\u00f3n","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Publicado el informe 2009 de Verizon sobre fugas de informaci\u00f3n","datePublished":"2009-04-17T13:10:28+00:00","dateModified":"2009-07-01T11:50:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/"},"wordCount":383,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/","url":"https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Publicado el informe 2009 de Verizon sobre fugas de informaci\u00f3n","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2009-04-17T13:10:28+00:00","dateModified":"2009-07-01T11:50:49+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/publicado-el-informe-2009-de-verizon-sobre-fugas-de-informacion\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=510"}],"version-history":[{"count":2,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/510\/revisions"}],"predecessor-version":[{"id":549,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/510\/revisions\/549"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}