Six need-to-know takeaways from the Verizon breach report

Six need-to-know takeaways from the Verizon breach report

Phishing attacks and stolen credentials have become attackers’ most popular avenues of network compromise, and employee errors are helping pave the way according to Verizon’s newly released 2020 Data Breach Investigations Report (DBIR).


Verizon researchers analyzed 157,525 known “incidents” (defined as a security event that results in the compromise of an information asset) and 3,950 confirmed breaches (meaning data exposure to an unauthorized party was officially disclosed) — all taking place from Nov. 1, 2018 through Oct. 31, 2019. From this data set, the researchers gleaned a trove of insights into recent cybercriminal activity and behavior. Here are six of the more insightful findings from the report.


1. As stated above, the most common threat actions that led to an organizational breach were phishing and the use of stolen credentials.


Phishing campaigns and other social engineering scams were delivered primarily via email — a whopping 96 percent of the time — while the reminder arrived via website or phone/SMS.


“The good news is that click rates are as low as they ever have been (3.4 percent), and reporting rates are rising, albeit slowly,” the report states. Indeed, social engineering scams were actually down 6.6 percent ov ..

Support the originator by clicking the read the rest link below.