Most data breaches are not sophisticated and could be avoided by using security protocols that are already in place, according to new research from Verizon. You don’t have to be very smart to be a black hat hacker. That’s the conclusion of a new report out from Verizon which found that the bad guys used relatively simple methods for 97 percent of data breaches last year. For the most part cybercriminals seem to behave like their real world counterparts. They are looking for easy prey and not targeting a particular company. Nearly 80 percent of victims became victims because they were found to possess an often easily exploitable weakness. As the 2012 Breach Investigation Report states: “Whether targeted or not, the great majority of victims succumbed to attacks that cannot be described as highly difficult.” (Note to Verizon: You’ve got to come up with a better name for this report.) The report is based on the investigations into more than 850 data breaches and was compiled with the help of the U.S. Secret Service and law enforcement agencies in the United Kingdom, The Netherlands, Ireland and Australia. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe While companies spent heavily on expensive security systems designed to counter “evil genius” type plans, the bad guys took the easy way in. It’s not that those state-of-the-art attacks didn’t get used but, according to the report, those were mostly used after the hackers found the front door was unlocked. This was true regardless of the size of the company being attacked. “So, what about larger organizations? Surely they’re a lot more difficult to infiltrate, right? Sadly, our data seems to suggest otherwise; it does not appear that cybercriminals have to work much harder to compromise larger organizations than they do for smaller ones.” This information should – but likely won’t – have a drastic impact on security budgeting priorities. Money would be better spent on training and re-training people on the basics, like changing your password regularly, than on protection from the latest hot hack vector. Related content opinion Why Bitcoins are Just as Viable as Any Other Currency The true value of any currency is a reflection of how much people believe it's worth, according to CIO blogger Constantine von Hoffman. But it's wise to remember just how fast beliefs can change. By Constantine von Hoffman Apr 15, 2013 4 mins Government Technology Industry opinion No Surprise: Docs Show Obama Administration Lying About Drones President Obama has repeatedly said drones would only be used against members of al Qaida and allied groups. However, leaked intelligence documents show the administration has been using them to settle political and tribal feuds for at least four yea By Constantine von Hoffman Apr 10, 2013 3 mins Regulation Government opinion How Big Data Can Quickly Become Big Garbage The bigger the data the bigger the chance of mistakes or inaccuracies. In that vein, a large database used by retailers to screen people accused of stealing from employers is identifying innocent people and could result in major lawsuits, according t By Constantine von Hoffman Apr 04, 2013 2 mins Big Data opinion Why Crazy Trumps Logic on the Internet The earth is flat. Vaccines cause autism. 9/11 was a government conspiracy. These are just a few of the many ideas that continue to find adherents online despite overwhelming proof that they're not based on fact. CIO.com blogger Constantine von By Constantine von Hoffman Apr 02, 2013 3 mins Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe