Human error and social engineering attacks continue to fuel data breaches in 2022, according to Verizon’s Data Breach Investigations Report

The year 2022 was one of the most challenging years for organizations worldwide as cybercriminals continued to target them with sophisticated attack methods. Social engineering attacks, ransomware, and human error continued to be the primary culprits behind data breaches, according to Verizon’s recently released Data Breach Investigations Report (DBIR) for 2022.

The report, which analyzed data from over 84 countries and across more than 100 industries and organizations, provides an in-depth analysis of the current threat landscape, highlighting the latest trends and threats. In this article, we’ll delve into the main findings of the report and explore how organizations can protect themselves against modern-day cyber threats.

Human error is a significant factor in data breaches

One of the key takeaways from the DBIR is that human error is still a major contributor to data breaches. Three-quarters of all data breaches observed in the past year included a significant element of human failure, resulting in sensitive data being accidentally exposed or misconfigured.

The report notes that organizations should prioritize employee training and awareness programs to reduce the likelihood of human error. These programs should focus on key areas, such as password security, phishing awareness, and data handling practices. With this in mind, companies can effectively reduce their risk of becoming another statistic in the DBIR.

Social engineering attacks are on the rise

Social engineering attacks, such as phishing and pretexting, were also significant contributors to data breaches this year. At the forefront of these attacks is pretexting, which involves the use of a fabricated scenario to obtain personal information from the victim. Pretexting now accounts for half of all social engineering attacks, including business email compromise (BEC).

The report also highlights that senior business leaders were particularly at risk of falling victim to this sort of attack due to their perceived authority. This emphasizes the need for increased security awareness across all levels of an organization because even the most senior employees are not immune to social engineering tactics.

Cyber threat actors remain persistent in their attempts to acquire sensitive data

The DBIR noted that cyber threat actors continue their relentless efforts to acquire sensitive consumer and business data, with data theft being the most common motive behind their attacks. These actors use a variety of tactics, such as credential theft, brute-force attacks, and exploiting vulnerabilities in software and systems.

To combat this, organizations must adopt a multi-layered approach that includes regular security assessments, proactive patch management, and the implementation of role-based access controls. Furthermore, increased emphasis should be given to monitoring and detection capabilities to quickly uncover any suspicious behavior or anomalies before they cause significant harm.

Ransomware incidents have doubled in cost since 2022

One of the most concerning revelations from the DBIR is the increasing cost of ransomware incidents. The median loss in a ransomware incident stands at $26,000, and in 95% of incidents where losses occurred, those losses were between $1.00 and $2.25 million. The report also points out that not all ransomware incidents – under 10%, in fact – incurred losses.

To protect against ransomware, organizations should implement robust backup and disaster recovery procedures. Additionally, companies should regularly conduct penetration testing and vulnerability assessments to identify potential entry points for ransomware attacks and address them promptly.

Ransomware attacks have plateaued in the past 12 months

The DBIR observes that the number of ransomware attacks as a percentage of all incidents and breaches has leveled off over the past 12 months. This could be due to companies taking a more aggressive stance against ransomware attackers, such as reporting incidents to law enforcement and implementing improved security measures.

The report highlights significant incidents from the past year, including Log4j

The 2023 version of DBIR also reviews some of the most significant incidents observed during its focus period, including the Log4j vulnerability that affected the industry at the end of 2021. It emphasizes the importance of keeping up-to-date with the latest security trends and adopting a proactive approach to security measures.

The DBIR serves as a reminder that cyber threats are continually evolving, and organizations need to stay vigilant to succeed in today’s digital world. The report emphasizes the need for increased employee training, risk assessments, and proactive security measures to mitigate the risks of social engineering attacks, human error, and other cyber threats.

With this knowledge, businesses can build a robust security posture that enables them to detect, analyze, and respond to threats effectively – ultimately safeguarding their valuable assets. By prioritizing security and continuing to adapt to modern threats, organizations can secure their operations and ensure lasting success.

Explore more

Closing the Feedback Gap Helps Retain Top Talent

The silent departure of a high-performing employee often begins months before any formal resignation is submitted, usually triggered by a persistent lack of meaningful dialogue with their immediate supervisor. This communication breakdown represents a critical vulnerability for modern organizations. When talented individuals perceive that their professional growth and daily contributions are being ignored, the psychological contract between the employer and

Employment Design Becomes a Key Competitive Differentiator

The modern professional landscape has transitioned into a state where organizational agility and the intentional design of the employment experience dictate which firms thrive and which ones merely survive. While many corporations spend significant energy on external market fluctuations, the real battle for stability occurs within the structural walls of the office environment. Disruption has shifted from a temporary inconvenience

How Is AI Shifting From Hype to High-Stakes B2B Execution?

The subtle hum of algorithmic processing has replaced the frantic manual labor that once defined the marketing department, signaling a definitive end to the era of digital experimentation. In the current landscape, the novelty of machine learning has matured into a standard operational requirement, moving beyond the speculative buzzwords that dominated previous years. The marketing industry is no longer occupied

Why B2B Marketers Must Focus on the 95 Percent of Non-Buyers

Most executive suites currently operate under the delusion that capturing a lead is synonymous with creating a customer, yet this narrow fixation systematically ignores the vast ocean of potential revenue waiting just beyond the immediate horizon. This obsession with immediate conversion creates a frantic environment where marketing departments burn through budgets to reach the tiny sliver of the market ready

How Will GitProtect on Microsoft Marketplace Secure DevOps?

The modern software development lifecycle has evolved into a delicate architecture where a single compromised repository can effectively paralyze an entire global enterprise overnight. Software engineering is no longer just about writing logic; it involves managing an intricate ecosystem of interconnected cloud services and third-party integrations. As development teams consolidate their operations within these environments, the primary source of truth—the