Human error and social engineering attacks continue to fuel data breaches in 2022, according to Verizon’s Data Breach Investigations Report

The year 2022 was one of the most challenging years for organizations worldwide as cybercriminals continued to target them with sophisticated attack methods. Social engineering attacks, ransomware, and human error continued to be the primary culprits behind data breaches, according to Verizon’s recently released Data Breach Investigations Report (DBIR) for 2022.

The report, which analyzed data from over 84 countries and across more than 100 industries and organizations, provides an in-depth analysis of the current threat landscape, highlighting the latest trends and threats. In this article, we’ll delve into the main findings of the report and explore how organizations can protect themselves against modern-day cyber threats.

Human error is a significant factor in data breaches

One of the key takeaways from the DBIR is that human error is still a major contributor to data breaches. Three-quarters of all data breaches observed in the past year included a significant element of human failure, resulting in sensitive data being accidentally exposed or misconfigured.

The report notes that organizations should prioritize employee training and awareness programs to reduce the likelihood of human error. These programs should focus on key areas, such as password security, phishing awareness, and data handling practices. With this in mind, companies can effectively reduce their risk of becoming another statistic in the DBIR.

Social engineering attacks are on the rise

Social engineering attacks, such as phishing and pretexting, were also significant contributors to data breaches this year. At the forefront of these attacks is pretexting, which involves the use of a fabricated scenario to obtain personal information from the victim. Pretexting now accounts for half of all social engineering attacks, including business email compromise (BEC).

The report also highlights that senior business leaders were particularly at risk of falling victim to this sort of attack due to their perceived authority. This emphasizes the need for increased security awareness across all levels of an organization because even the most senior employees are not immune to social engineering tactics.

Cyber threat actors remain persistent in their attempts to acquire sensitive data

The DBIR noted that cyber threat actors continue their relentless efforts to acquire sensitive consumer and business data, with data theft being the most common motive behind their attacks. These actors use a variety of tactics, such as credential theft, brute-force attacks, and exploiting vulnerabilities in software and systems.

To combat this, organizations must adopt a multi-layered approach that includes regular security assessments, proactive patch management, and the implementation of role-based access controls. Furthermore, increased emphasis should be given to monitoring and detection capabilities to quickly uncover any suspicious behavior or anomalies before they cause significant harm.

Ransomware incidents have doubled in cost since 2022

One of the most concerning revelations from the DBIR is the increasing cost of ransomware incidents. The median loss in a ransomware incident stands at $26,000, and in 95% of incidents where losses occurred, those losses were between $1.00 and $2.25 million. The report also points out that not all ransomware incidents – under 10%, in fact – incurred losses.

To protect against ransomware, organizations should implement robust backup and disaster recovery procedures. Additionally, companies should regularly conduct penetration testing and vulnerability assessments to identify potential entry points for ransomware attacks and address them promptly.

Ransomware attacks have plateaued in the past 12 months

The DBIR observes that the number of ransomware attacks as a percentage of all incidents and breaches has leveled off over the past 12 months. This could be due to companies taking a more aggressive stance against ransomware attackers, such as reporting incidents to law enforcement and implementing improved security measures.

The report highlights significant incidents from the past year, including Log4j

The 2023 version of DBIR also reviews some of the most significant incidents observed during its focus period, including the Log4j vulnerability that affected the industry at the end of 2021. It emphasizes the importance of keeping up-to-date with the latest security trends and adopting a proactive approach to security measures.

The DBIR serves as a reminder that cyber threats are continually evolving, and organizations need to stay vigilant to succeed in today’s digital world. The report emphasizes the need for increased employee training, risk assessments, and proactive security measures to mitigate the risks of social engineering attacks, human error, and other cyber threats.

With this knowledge, businesses can build a robust security posture that enables them to detect, analyze, and respond to threats effectively – ultimately safeguarding their valuable assets. By prioritizing security and continuing to adapt to modern threats, organizations can secure their operations and ensure lasting success.

Explore more

Trend Analysis: Agentic Commerce Protocols

The clicking of a mouse and the scrolling through endless product grids are rapidly becoming relics of a bygone era as autonomous software entities begin to manage the entirety of the consumer purchasing journey. For nearly three decades, the digital storefront functioned as a static visual interface designed for human eyes, requiring manual navigation, search, and evaluation. However, the current

Trend Analysis: E-commerce Purchase Consolidation

The Evolution of the Digital Shopping Cart The days when consumers would reflexively click “buy now” for a single tube of toothpaste or a solitary charging cable have largely vanished in favor of a more calculated, strategic approach to the digital checkout experience. This fundamental shift marks the end of the hyper-impulsive era and the beginning of the “consolidated cart.”

UAE Crypto Payment Gateways – Review

The rapid metamorphosis of the United Arab Emirates from a desert trade hub into a global epicenter for programmable finance has fundamentally altered how value moves across the digital landscape. This shift is not merely a superficial update to checkout pages but a profound structural migration where blockchain-based settlements are replacing the aging architecture of correspondent banking. As Dubai and

Exsion365 Financial Reporting – Review

The efficiency of a modern finance department is often measured by the distance between a raw data entry and a strategic board-level decision. While Microsoft Dynamics 365 Business Central provides a robust foundation for enterprise resource planning, many organizations still struggle with the “last mile” of reporting, where data must be extracted, cleaned, and reformatted before it yields any value.

Clone Commander Automates Secure Dynamics 365 Cloning

The enterprise landscape currently faces a significant bottleneck when IT departments attempt to replicate complex Microsoft Dynamics 365 environments for testing or development purposes. Traditionally, this process has been marred by manual scripts and human error, leading to extended periods of downtime that can stretch over several days. Such inefficiencies not only stall mission-critical projects but also introduce substantial security