Human error and social engineering attacks continue to fuel data breaches in 2022, according to Verizon’s Data Breach Investigations Report

The year 2022 was one of the most challenging years for organizations worldwide as cybercriminals continued to target them with sophisticated attack methods. Social engineering attacks, ransomware, and human error continued to be the primary culprits behind data breaches, according to Verizon’s recently released Data Breach Investigations Report (DBIR) for 2022.

The report, which analyzed data from over 84 countries and across more than 100 industries and organizations, provides an in-depth analysis of the current threat landscape, highlighting the latest trends and threats. In this article, we’ll delve into the main findings of the report and explore how organizations can protect themselves against modern-day cyber threats.

Human error is a significant factor in data breaches

One of the key takeaways from the DBIR is that human error is still a major contributor to data breaches. Three-quarters of all data breaches observed in the past year included a significant element of human failure, resulting in sensitive data being accidentally exposed or misconfigured.

The report notes that organizations should prioritize employee training and awareness programs to reduce the likelihood of human error. These programs should focus on key areas, such as password security, phishing awareness, and data handling practices. With this in mind, companies can effectively reduce their risk of becoming another statistic in the DBIR.

Social engineering attacks are on the rise

Social engineering attacks, such as phishing and pretexting, were also significant contributors to data breaches this year. At the forefront of these attacks is pretexting, which involves the use of a fabricated scenario to obtain personal information from the victim. Pretexting now accounts for half of all social engineering attacks, including business email compromise (BEC).

The report also highlights that senior business leaders were particularly at risk of falling victim to this sort of attack due to their perceived authority. This emphasizes the need for increased security awareness across all levels of an organization because even the most senior employees are not immune to social engineering tactics.

Cyber threat actors remain persistent in their attempts to acquire sensitive data

The DBIR noted that cyber threat actors continue their relentless efforts to acquire sensitive consumer and business data, with data theft being the most common motive behind their attacks. These actors use a variety of tactics, such as credential theft, brute-force attacks, and exploiting vulnerabilities in software and systems.

To combat this, organizations must adopt a multi-layered approach that includes regular security assessments, proactive patch management, and the implementation of role-based access controls. Furthermore, increased emphasis should be given to monitoring and detection capabilities to quickly uncover any suspicious behavior or anomalies before they cause significant harm.

Ransomware incidents have doubled in cost since 2022

One of the most concerning revelations from the DBIR is the increasing cost of ransomware incidents. The median loss in a ransomware incident stands at $26,000, and in 95% of incidents where losses occurred, those losses were between $1.00 and $2.25 million. The report also points out that not all ransomware incidents – under 10%, in fact – incurred losses.

To protect against ransomware, organizations should implement robust backup and disaster recovery procedures. Additionally, companies should regularly conduct penetration testing and vulnerability assessments to identify potential entry points for ransomware attacks and address them promptly.

Ransomware attacks have plateaued in the past 12 months

The DBIR observes that the number of ransomware attacks as a percentage of all incidents and breaches has leveled off over the past 12 months. This could be due to companies taking a more aggressive stance against ransomware attackers, such as reporting incidents to law enforcement and implementing improved security measures.

The report highlights significant incidents from the past year, including Log4j

The 2023 version of DBIR also reviews some of the most significant incidents observed during its focus period, including the Log4j vulnerability that affected the industry at the end of 2021. It emphasizes the importance of keeping up-to-date with the latest security trends and adopting a proactive approach to security measures.

The DBIR serves as a reminder that cyber threats are continually evolving, and organizations need to stay vigilant to succeed in today’s digital world. The report emphasizes the need for increased employee training, risk assessments, and proactive security measures to mitigate the risks of social engineering attacks, human error, and other cyber threats.

With this knowledge, businesses can build a robust security posture that enables them to detect, analyze, and respond to threats effectively – ultimately safeguarding their valuable assets. By prioritizing security and continuing to adapt to modern threats, organizations can secure their operations and ensure lasting success.

Explore more

A Beginner’s Guide to Data Engineering and DataOps for 2026

While the public often celebrates the triumphs of artificial intelligence and predictive modeling, these high-level insights depend entirely on a hidden, gargantuan plumbing system that keeps data flowing, clean, and accessible. In the current landscape, the realization has settled across the corporate world that a data scientist without a data engineer is like a master chef in a kitchen with

Ethereum Adopts ERC-7730 to Replace Risky Blind Signing

For years, the experience of interacting with decentralized applications on the Ethereum blockchain has been fraught with a precarious and dangerous uncertainty known as blind signing. Every time a user attempted to swap tokens or provide liquidity, their hardware or software wallet would present them with a wall of incomprehensible hexadecimal code, essentially asking them to authorize a financial transaction

Germany Funds KDE to Boost Linux as Windows Alternative

The decision by the German government to allocate a 1.3 million euro grant to the KDE community marks a definitive shift in how European nations view the long-standing dominance of proprietary operating systems like Windows and macOS. This financial injection, facilitated by the Sovereign Tech Fund, serves as a high-stakes investment in the concept of digital sovereignty, aiming to provide

Why Is This $20 Windows 11 Pro and Training Bundle a Steal?

Navigating the complexities of modern computing requires more than just high-end hardware; it demands an operating system that integrates seamlessly with artificial intelligence while providing robust security for sensitive personal and professional data. As of 2026, many users still find themselves tethered to aging software environments that struggle to keep pace with the rapid advancements in cloud computing and data

Notion Launches Developer Platform for AI Agent Management

The modern enterprise currently grapples with an overwhelming explosion of disconnected software tools that fragment critical information and stall meaningful productivity across entire departments. While the shift toward artificial intelligence promised to streamline these disparate workflows, the reality has often resulted in a chaotic landscape where specialized agents lack the necessary context to perform high-stakes tasks autonomously. Organizations frequently find