-
Frecuencia
2,527 incidents, 690 with confirmed data disclosure
Top patterns
Basic Web Application Attacks, System Intrusion, and Miscellaneous Error represent 79% of breaches.
Threat actors
External (73%), Internal (27%) (breaches)
Actor motives
Financial (95%), Espionage (4%), Grudge (1%) (breaches)
Data compromised
Personal (71%), Credentials (40%), Other (27%), Bank (22%) (breaches)
Top IG1 protective controls
Security Awareness and Skills Training (CSC 14), Secure Configuration of Enterprise Assets and Software (CSC 4), Data Protection (CSC 3)
What is the same?
Basic Web Application Attacks and Miscellaneous Errors continue to play a large part in breaches for this vertical as they did last year.
Resumen
The Financial sector continues to be victimized by financially motivated organized crime, often via the actions of Social (Phishing), Hacking (Use of stolen credentials) and Malware (Ransomware). Finally, Miscellaneous Errors, often in the form of Misdelivery, is still very common as it has been for the past three years in a row.
Financial and Insurance
NAICS 52
- 2022 DBIR
- Master Guide
- Introducción
- Summary of Findings
- Results and Analysis Intro
- Results and Analysis - Intro to Patterns
- Results and Analysis - Not the Human Element
- Results and Analysis - Basic Web Application Attacks
- Industrias
- Intro to Industries
- Accommodation and Food Services Data Breaches
- Arts and Entertainment Data Breaches
- Data Breaches in Education
- Financial Services Data Security Breaches
- Healthcare Data Breaches
- Information Industry Data Breaches
- Data Breaches in Manufacturing Industries
- Data Breaches in Energy & Utilities Industries
- Professional Services Data Breaches
- Public Administration Data Breaches
- Retail Data Breaches and Security
- Small Business Data Breach Statistics
- Intro to Regions
- Wrap Up
- Appendices
- Corrections
- Download the full report (PDF)
Please provide the information below to view the online Verizon Data Breach Investigations Report.
Thank You.
Gracias.
You will soon receive an email with a link to confirm your access, or follow the link below.
Gracias.
You may now close this message and continue to your article.