Human error and social engineering attacks continue to fuel data breaches in 2022, according to Verizon’s Data Breach Investigations Report

The year 2022 was one of the most challenging years for organizations worldwide as cybercriminals continued to target them with sophisticated attack methods. Social engineering attacks, ransomware, and human error continued to be the primary culprits behind data breaches, according to Verizon’s recently released Data Breach Investigations Report (DBIR) for 2022.

The report, which analyzed data from over 84 countries and across more than 100 industries and organizations, provides an in-depth analysis of the current threat landscape, highlighting the latest trends and threats. In this article, we’ll delve into the main findings of the report and explore how organizations can protect themselves against modern-day cyber threats.

Human error is a significant factor in data breaches

One of the key takeaways from the DBIR is that human error is still a major contributor to data breaches. Three-quarters of all data breaches observed in the past year included a significant element of human failure, resulting in sensitive data being accidentally exposed or misconfigured.

The report notes that organizations should prioritize employee training and awareness programs to reduce the likelihood of human error. These programs should focus on key areas, such as password security, phishing awareness, and data handling practices. With this in mind, companies can effectively reduce their risk of becoming another statistic in the DBIR.

Social engineering attacks are on the rise

Social engineering attacks, such as phishing and pretexting, were also significant contributors to data breaches this year. At the forefront of these attacks is pretexting, which involves the use of a fabricated scenario to obtain personal information from the victim. Pretexting now accounts for half of all social engineering attacks, including business email compromise (BEC).

The report also highlights that senior business leaders were particularly at risk of falling victim to this sort of attack due to their perceived authority. This emphasizes the need for increased security awareness across all levels of an organization because even the most senior employees are not immune to social engineering tactics.

Cyber threat actors remain persistent in their attempts to acquire sensitive data

The DBIR noted that cyber threat actors continue their relentless efforts to acquire sensitive consumer and business data, with data theft being the most common motive behind their attacks. These actors use a variety of tactics, such as credential theft, brute-force attacks, and exploiting vulnerabilities in software and systems.

To combat this, organizations must adopt a multi-layered approach that includes regular security assessments, proactive patch management, and the implementation of role-based access controls. Furthermore, increased emphasis should be given to monitoring and detection capabilities to quickly uncover any suspicious behavior or anomalies before they cause significant harm.

Ransomware incidents have doubled in cost since 2022

One of the most concerning revelations from the DBIR is the increasing cost of ransomware incidents. The median loss in a ransomware incident stands at $26,000, and in 95% of incidents where losses occurred, those losses were between $1.00 and $2.25 million. The report also points out that not all ransomware incidents – under 10%, in fact – incurred losses.

To protect against ransomware, organizations should implement robust backup and disaster recovery procedures. Additionally, companies should regularly conduct penetration testing and vulnerability assessments to identify potential entry points for ransomware attacks and address them promptly.

Ransomware attacks have plateaued in the past 12 months

The DBIR observes that the number of ransomware attacks as a percentage of all incidents and breaches has leveled off over the past 12 months. This could be due to companies taking a more aggressive stance against ransomware attackers, such as reporting incidents to law enforcement and implementing improved security measures.

The report highlights significant incidents from the past year, including Log4j

The 2023 version of DBIR also reviews some of the most significant incidents observed during its focus period, including the Log4j vulnerability that affected the industry at the end of 2021. It emphasizes the importance of keeping up-to-date with the latest security trends and adopting a proactive approach to security measures.

The DBIR serves as a reminder that cyber threats are continually evolving, and organizations need to stay vigilant to succeed in today’s digital world. The report emphasizes the need for increased employee training, risk assessments, and proactive security measures to mitigate the risks of social engineering attacks, human error, and other cyber threats.

With this knowledge, businesses can build a robust security posture that enables them to detect, analyze, and respond to threats effectively – ultimately safeguarding their valuable assets. By prioritizing security and continuing to adapt to modern threats, organizations can secure their operations and ensure lasting success.

Explore more