
{"id":2859,"date":"2014-06-09T00:00:00","date_gmt":"2014-06-09T00:00:00","guid":{"rendered":"http:\/\/otava.test\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/"},"modified":"2014-06-09T00:00:00","modified_gmt":"2014-06-09T00:00:00","slug":"what-took-so-long-how-data-breaches-can-go-months-without-being-detected","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/","title":{"rendered":"What took so long? How data breaches can go months without being detected"},"content":{"rendered":"<p>After the recent eBay data breach in which more than 145 million user records were reportedly compromised by hackers, the internet is once again full of stories about consumers demanding better protection, analysts blaming organizations for not following basic cybersecurity protocol, and tales of hackers that are simply out-sophisticating sophisticated security (eBay used <a href=\"https:\/\/onlinetech.com\/secure-hosting\/technical-security\/two-factor-authentication\">two-factor authentication<\/a> and <a href=\"https:\/\/onlinetech.com\/secure-hosting\/technical-security\/encryption\">encryption<\/a>, which did protect users\u2019 financial information).<\/p>\n<p>There are the standard tips for consumers: change your passwords, don\u2019t use the same password on multiple sites and watch out for phishing scams.<\/p>\n<p><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/ebaylogo\/\" rel=\"attachment wp-att-15182\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-15182\" title=\"eBaylogo\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/eBaylogo.jpg\" alt=\"\" width=\"200\" height=\"83\" \/><\/a>But a less-discussed nugget of information to emerge in coverage of the eBay breach is that hackers compromised its network in late February or early March, but the breach wasn\u2019t uncovered until May. That \u201cis a LOT of time for an attacker to be roaming around your network and systems,\u201d Forrester analyst Tyler Shields told <em>USA Today<\/em>.<\/p>\n<p>But eBay isn\u2019t alone. A Verizon Data Breach Investigation Report says 66 percent of breaches took months or even years to discover. Why the delay? 1) Because it&#8217;s very difficult to monitor everything in a large and complex environment. 2) Cyber criminals benefit from being camouflaged as long as possible. DDoS attacks are usually just a distraction to cover real targets.<\/p>\n<p>Cybercrime is not just a bored hacker with some aberrant happenstances getting the connections. It is a highly-organized, collaborative effort. According to Interpol, cybercrime has surpassed the total global sales of cocaine, heroin, and marijuana combined. It\u2019s unimaginably lucrative and frustratingly difficult to police \u2013 particularly since cyber criminals don\u2019t have the exposure of drug runners. They don\u2019t grow anything or transport anything.<\/p>\n<p>They\u2019re also good at not leaving clues behind. Cybercrime is an invisible crime. There\u2019s no trail of broken glass signaling a network break-in when you walk into your office on Monday morning.<\/p>\n<p>In a 2012 Online Tech <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/upcoming-webinar-healthcare-security-vulnerabilities\/\">webinar titled \u201cHealthcare Security Vulnerabilities<\/a>,\u201d security expert Adam Goslin of <a href=\"https:\/\/www.gettct.com\/\">Total Compliance Tracking<\/a> pointed out that breaches don\u2019t just go unidentified for months \u2026 they more often are never discovered.<\/p>\n<p>\u201cThe bottom line is there are organizations that get breached every day that don\u2019t have any idea it has happened. The hacker is gaining access to the system &#8212; seriously, what better way to just continue to get a stream of data? You find a vulnerability that you exploit,\u201d Goslin said.<\/p>\n<p>\u201cYou get in there, you pull the data that you want, on your way out the door you go ahead and wipe off all the fingerprints and everything like that, and you walk away. Then, you come back another two months later, three months later, when there\u2019s some more data and go do it again. There are many organizations just because of their lack of internal vigilance that don\u2019t even know that they\u2019ve been breached.\u201d<\/p>\n<p>There are reports that the government intends to question eBay about how hackers bypassed security to gain personal information from users, so we\u2019ll learn more about this specific incident at that time. When data breach details become part of a court case or official inquiry, the reasons behind delayed detection become a matter of public record.<\/p>\n<p>Thankfully we have attorney Tatiana Melnik, a frequent contributor to the Online Tech \u2018Tuesdays at Two\u2019 <a href=\"https:\/\/onlinetech.com\/events\/webinars\">webinar series<\/a>, who took a keen interest in a court case involving Wyndham Worldwide Corporation, which was arguing that the Federal Trade Commission couldn\u2019t prosecute them for data breaches.<\/p>\n<p>That case ended in an important decision that Melnik evaluated during a May 29 webinar session titled <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\"><em>Is the FTC Coming After Your Company Next<\/em><\/a>? (and is discussed further <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/federal-court-upholds-ftcs-authority-to-penalize-lax-cyber-security-measures-protecting-personal-information-and-credit-card-numbers\/\">here<\/a> and <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/is-the-ftc-enforcing-better-cybersecurity-for-data-protection-in-non-regulated-industries\/\">here<\/a>).<\/p>\n<p>However, it also shed some light on how a data breach can go months without being detected. Filings included issues the FTC highlighted as being problematic for Wyndham, which suffered three separate data breaches. Particularly, Wyndham did not have an inventory in place of computers and mobile devices from its chain of hotels and resorts that were connecting to its network. Nor did it have an intrusion detection system or intrusion response system in place.<\/p>\n<p>Quoting Melnik, from her webinar:<\/p>\n<blockquote><p>Wyndham suffered three data breaches. The first one happened in April 2008. It was a brute force attack. It caused multiple user lockouts. I think we all know that when we start seeing all of the lockouts come up that there is definitely something going on in the system and we need to start investigating, because why would all of a sudden half the staff members be locked out and not able to get into their computers? This is where the issue of not having an adequate inventory comes in. Even though they were able to determine that the account lockout was coming from two computers on their network, they were not able to physically locate those computers. They didn\u2019t know where they were. As a result, they didn\u2019t find out that their network was compromised until four months later. That is a really, really long time to have some hacker from Russia in your network stealing all your data. That\u2019s quite problematic.<\/p>\n<p>The next attack happened in March 2009. This is where we\u2019re reminded that you have to limit people\u2019s access. This happened because someone gained access to the networks through a service provider\u2019s administrator account in their Phoenix data center. This is again why somebody who is working at the data center level, do they need access to your PHI? Should they have access into that system? No, absolutely not. More problematically here, Wyndham didn\u2019t find out until customers started complaining. They didn\u2019t even know their systems were breached. They searched the network and they found the same malware that was used in attack No. 1. Think about it. Okay, well, you\u2019ve been attacked. You were breached. Don\u2019t you think that you would have some process in place to now gain your systems or at least the malware that was used the first time around so that if you see it again, you know that there\u2019s something going on, something fishy there?<\/p>\n<p>Then their final attack happened in late 2009, and again, they did not learn of their attacks from their internal processes and controls. They learned about the attack from a credit card issuer when they got a call saying, \u201cHey, listen, we are seeing a lot of frauds from credit cards that were used at your facility.\u201d Certainly not the best way to find out that there is an incident.<\/p><\/blockquote>\n<p>In June 2013, respected cyber security blog <em>Dark Reading<\/em> published a comprehensive article titled \u2018Why Are We So Slow to Detect Data Breaches?\u2019 In it, author Ericka Chikowski writes that poor instrumenting of network sensors, bad security information and event management (SIEM) tuning, and a lack of communication within security teams allow breaches to fester.<\/p>\n<p><strong>Instrumenting:<\/strong> Analysts told <em>Dark Reading<\/em> that most network monitoring sensor infrastructure is poorly instrumented, defending the enterprise like a bank vault with one big door rather than protecting an entire city. Mike Lloyd of RedSeal Networks made three recommendations: 1) Map infrastructures to help place sensors. 2) Identify obvious weak points. 3) Start designing zones into the infrastructure so monitoring can be done more easily at zone boundaries.<\/p>\n<p><strong>SIEM tuning:<\/strong> Threat and vulnerability expert James Phillippe from Ernst &amp; Young calls a well-tuned SIEM \u201cthe heart of a security operations center and enables alerting to be accurate and complete.\u201d The tools that detect breaches are important, but how the people running those tools put them to use is critical.<\/p>\n<p><strong>Communication:<\/strong> Streamlining the collaboration between various security and operations team members proves to be a difficult task, <em>Dark Reading<\/em> writes: \u201cEven with all of the right data residing within the organization as an aggregate, it is very easy to fail to put all of the puzzle pieces together due to a lack of coordination.\u201d Jason Mical of AccessData says disparate teams using disparate tools causes \u201cdangerous delays in validating suspected threats or responding to known threats.\u201d<\/p>\n<hr \/>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/after-target-breach-cios-under-more-scrutiny-getting-more-support\/download-pci\/\" rel=\"attachment wp-att-9200\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-9200\" title=\"Download PCI Hosting White Paper\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-pci.png\" alt=\"Download PCI Hosting White Paper\" width=\"314\" height=\"142\" \/><\/a>Related:<\/strong><br \/>\n<a href=\"https:\/\/web.otava.com\/is-your-encryption-providing-the-right-protection\">Encryption of Cloud Data white paper<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/\">Mobile Security white paper<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/tag\/cybersecurity\/\">Data breaches ending careers \u201cright to the top\u201d of C-suite<\/a><\/p>\n<hr \/>\n<p><strong>Resources:<\/strong><br \/>\n<strong>Online Tech webinar:<\/strong> <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">Is the FTC Coming After Your Company Next? Court Confirms that the FTC Has Authority to Punish Companies for Poor Cyber Security Practices<\/a><br \/>\n<strong>Online Tech webinar:<\/strong> <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/upcoming-webinar-healthcare-security-vulnerabilities\/\">Healthcare Security Vulnerabilities<\/a><br \/>\n<strong>Dark Reading: <\/strong><a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/why-are-we-so-slow-to-detect-data-breaches\/d\/d-id\/1139970\">Why are we so slow to detect data breaches?<\/a><br \/>\n<strong>USA Today:<\/strong> <a href=\"https:\/\/www.usatoday.com\/story\/tech\/2014\/05\/21\/ebay-breach\/9368969\/\">eBay urging users to change passwords after breach<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After the recent eBay data breach in which more than 145 million user records were reportedly compromised by hackers, the internet is once again full of stories about consumers demanding better protection, analysts blaming organizations for not following basic cybersecurity protocol, and tales of hackers that are simply out-sophisticating sophisticated security (eBay used two-factor authentication and encryption, which did protect users\u2019 financial information). There are the standard tips for consumers: change your passwords, don\u2019t use the same password on multiple sites and watch out for phishing scams. But a less-discussed nugget of information to emerge in coverage of the eBay breach is that hackers compromised its network in late February or early March, but the breach wasn\u2019t uncovered until May. That \u201cis a LOT of time for an attacker to be roaming around your network and systems,\u201d Forrester analyst Tyler Shields told USA Today. But eBay isn\u2019t alone. A Verizon Data Breach Investigation Report says 66 percent of breaches took months or even years to discover. Why the delay? 1) Because it&#8217;s very difficult to monitor everything in a large and complex environment. 2) Cyber criminals benefit from being camouflaged as long as possible. DDoS attacks are usually just a&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2859","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What took so long? How data breaches can go months without being detected | OTAVA<\/title>\n<meta name=\"description\" content=\"66 percent of breaches took months or even years to discover. Why? Comprehensive monitoring. Plus DDoS attacks are a distraction to cover real targets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What took so long? How data breaches can go months without being detected\" \/>\n<meta property=\"og:description\" content=\"66 percent of breaches took months or even years to discover. Why? Comprehensive monitoring. Plus DDoS attacks are a distraction to cover real targets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-09T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/eBaylogo.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"What took so long? How data breaches can go months without being detected\",\"datePublished\":\"2014-06-09T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/\"},\"wordCount\":1417,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/eBaylogo.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/\",\"url\":\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/\",\"name\":\"What took so long? How data breaches can go months without being detected | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/eBaylogo.jpg\",\"datePublished\":\"2014-06-09T00:00:00+00:00\",\"description\":\"66 percent of breaches took months or even years to discover. Why? Comprehensive monitoring. Plus DDoS attacks are a distraction to cover real targets.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/eBaylogo.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/eBaylogo.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What took so long? How data breaches can go months without being detected\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What took so long? How data breaches can go months without being detected | OTAVA","description":"66 percent of breaches took months or even years to discover. Why? Comprehensive monitoring. Plus DDoS attacks are a distraction to cover real targets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/","og_locale":"en_US","og_type":"article","og_title":"What took so long? How data breaches can go months without being detected","og_description":"66 percent of breaches took months or even years to discover. Why? Comprehensive monitoring. Plus DDoS attacks are a distraction to cover real targets.","og_url":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/","og_site_name":"OTAVA","article_published_time":"2014-06-09T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/eBaylogo.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"What took so long? How data breaches can go months without being detected","datePublished":"2014-06-09T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/"},"wordCount":1417,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/eBaylogo.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/","url":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/","name":"What took so long? How data breaches can go months without being detected | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/eBaylogo.jpg","datePublished":"2014-06-09T00:00:00+00:00","description":"66 percent of breaches took months or even years to discover. Why? Comprehensive monitoring. Plus DDoS attacks are a distraction to cover real targets.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/eBaylogo.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/eBaylogo.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/what-took-so-long-how-data-breaches-can-go-months-without-being-detected\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"What took so long? How data breaches can go months without being detected"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2859"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2859\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2859"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}