May 13, 2019 By Shane Schick 2 min read

The prospect of financial gain drove 71 percent of cyberattacks in 2018, followed by the potential to conduct espionage or gain some other strategic advantage, according to a new data breach report.

Based on an analysis of more than 41,000 security incidents and more than 2,000 data breaches, Verizon’s “2019 Data Breach Investigations Report” revealed that small businesses accounted for 43 percent of all attacks, while healthcare and financial services organizations made up only 15 percent and 10 percent, respectively.

Meanwhile, top executives were targeted at a much higher rate than in previous years, and although the majority of perpetrators were outside actors (69 percent), 34 percent involved rogue employees or other internal actors.

Data Breach Report Shows the C-Suite in the Crosshairs

According to this year’s data breach report, senior executives were 12 times more likely to be targeted by cybercriminals than in the previous year. Due to their higher level of access to sensitive information, C-level executives were also nine times more likely to receive social engineering campaigns such as phishing emails.

Although phishing schemes based on simulations for data partners dropped from a 24 percent click-thru rate over the last seven years to 3 percent in 2018, 18 percent of tests showed phishing links were activated via mobile devices. This is concerning given how often C-suite executives may need to work outside the office and that ransomware still accounts for 24 percent of all attacks involving malware.

What’s Being Stolen and Who’s Stealing It?

While chief information security officers (CISOs) and their teams have been warning about password hygiene for years, the research showed 29 percent of incidents involved stolen credentials.

In addition, organized crime groups carried out 39 percent of data breaches, followed by state-affiliated organizations at 23 percent. Although more than half (51 percent) of security incidents involved hacking, internal errors accounted for 21 percent of data breaches.

How to Get Ahead of a Data Breach

The variety and volume of security threats make it difficult for organizations to keep up; the data breach report noted that 56 percent of data breaches took months or longer to discover.

Security experts suggest conducting penetration testing and red team exercises to improve the organization’s preparedness to prevent and respond to data breaches.

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today