Go to listing page

Key Trends in The Verizon Data Breach Investigation Report 2022

Key Trends in The Verizon Data Breach Investigation Report 2022
Verizon has released its 2022 Data Breach Investigations Report (DBIR) which examines more than 5,212 breaches and 23,896 security incidents that took place between November 2020 and October 2021. The report provides a glimpse into the global trends and patterns that were responsible for a vast majority of cyber incidents and data breaches.

Key findings

  • According to the report, ransomware attacks continue to mount pressure on organizations worldwide as researchers recorded a 13% increase in such attacks. This represented a huge jump when compared to the combined figures from the last five years.
  • While 40% of ransomware incidents were executed via desktop sharing software, 35% involved the use of email. 
  • Social engineering became an overwhelming problem in 2021, highlighting the surge in repeated cybercrime tactics. Among these, human errors and misuse of privileges were responsible for 82% of breaches reported last year.
  • Cyberattacks for financial motives remained the top priority for threat actors, accounting for around 89% of the total breaches reported. 
  • Poor security implemented across supply chains was attributed to the rise in system intrusions recorded last year. Around 62% of system intrusions were carried out by exploiting the supply chain that involved the use of web applications or software. 
  • In addition, organized crime also continued to be a pervasive force in the world of cybersecurity, Roughly 4 in 5 breaches witnessed last year were launched by organized crime. 
  • Stolen or compromised credentials were used in roughly 50% of all breaches, making it easy for attackers to intrude into networks. 
  • Phishing, previously known vulnerabilities, and malware downloaders were also leveraged in many cases to launch a vast majority of breaches. 

Conclusion

Verizon reports that organizations must take necessary steps to address four main avenues—credentials, phishing, exploitation of vulnerabilities, and botnets—that lead to initial access to networks. Additionally, it is important that organizations focus on imparting cybersecurity awareness to their employees to ensure that their business operations remain secure. 

Cyware Publisher

Publisher

Cyware