The prospect of financial gain drove 71 percent of cyberattacks in 2018, followed by the potential to conduct espionage or gain some other strategic advantage, according to a new data breach report.

Based on an analysis of more than 41,000 security incidents and more than 2,000 data breaches, Verizon’s “2019 Data Breach Investigations Report” revealed that small businesses accounted for 43 percent of all attacks, while healthcare and financial services organizations made up only 15 percent and 10 percent, respectively.

Meanwhile, top executives were targeted at a much higher rate than in previous years, and although the majority of perpetrators were outside actors (69 percent), 34 percent involved rogue employees or other internal actors.

Data Breach Report Shows the C-Suite in the Crosshairs

According to this year’s data breach report, senior executives were 12 times more likely to be targeted by cybercriminals than in the previous year. Due to their higher level of access to sensitive information, C-level executives were also nine times more likely to receive social engineering campaigns such as phishing emails.

Although phishing schemes based on simulations for data partners dropped from a 24 percent click-thru rate over the last seven years to 3 percent in 2018, 18 percent of tests showed phishing links were activated via mobile devices. This is concerning given how often C-suite executives may need to work outside the office and that ransomware still accounts for 24 percent of all attacks involving malware.

What’s Being Stolen and Who’s Stealing It?

While chief information security officers (CISOs) and their teams have been warning about password hygiene for years, the research showed 29 percent of incidents involved stolen credentials.

In addition, organized crime groups carried out 39 percent of data breaches, followed by state-affiliated organizations at 23 percent. Although more than half (51 percent) of security incidents involved hacking, internal errors accounted for 21 percent of data breaches.

How to Get Ahead of a Data Breach

The variety and volume of security threats make it difficult for organizations to keep up; the data breach report noted that 56 percent of data breaches took months or longer to discover.

Security experts suggest conducting penetration testing and red team exercises to improve the organization’s preparedness to prevent and respond to data breaches.

More from

Machine Learning Applications in the Cybersecurity Space

3 min read - Machine learning is one of the hottest areas in data science. This subset of artificial intelligence allows a system to learn from data and make accurate predictions, identify anomalies or make recommendations using different techniques. Machine learning techniques extract information from vast amounts of data and transform it into valuable business knowledge. While most industries use these techniques, they are especially prominent in the finance, marketing, healthcare, retail and cybersecurity sectors. Machine learning can also address new cyber threats. There…

3 min read

HHS Releases Hospital Cyber Resiliency Landscape Analysis

4 min read - On April 17, 2023, The U.S. Department of Health and Human Services (HHS) 405(d) Program announced the release of its Hospital Cyber Resiliency Initiative Landscape Analysis. This landmark analysis reports on domestic hospitals’ current state of cybersecurity preparedness. The scope of the HHS study was limited to activities that protect access to patient care and safety and reduce the negative impact of cyber threats on clinical operations. Breaches of sensitive data were considered only if the breach had a direct…

4 min read

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

9 min read - This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, Diego Matos Martins and Joseph Spero. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. ALPHV) ransomware affiliates' more recent attacks include targeting organizations in the healthcare, government, education, manufacturing and hospitality sectors. Reportedly, several of these incidents resulted…

9 min read

Now Social Engineering Attackers Have AI. Do You? 

4 min read - Everybody in tech is talking about ChatGPT, the AI-based chatbot from Open AI that writes convincing prose and usable code. The trouble is malicious cyber attackers can use generative AI tools like ChatGPT to craft convincing prose and usable code just like everybody else. How does this powerful new category of tools affect the ability of criminals to launch cyberattacks, including social engineering attacks? When Every Social Engineering Attack Uses Perfect English ChatGPT is a public tool based on a…

4 min read