-
Resumen
Web App attacks via vulnerability exploits and the Use of stolen credentials are prevalent in this industry. Errors continue to be a significant factor and are primarily made up of the Misconfiguration of cloud databases. Growth in Denial of Service attacks also remains a problem for the Information sector.
Frecuencia
5,741 incidents, 360 with confirmed data disclosure
Top Patterns
Web Applications, Miscellaneous Errors and Everything Else represent 88% of data breaches.
Threat Actors
External (67%), Internal (34%), Multiple (2%), Partner (1%) (breaches)
Actor Motives
Financial (88%), Espionage (7%), Fun (2%), Grudge (2%), Other (1%) (breaches)
Data Compromised
Personal (69%), Credentials (41%), Other (34%), Internal (16%) (breaches)
Top Controls
Secure Configurations (CSC 5, CSC 11), Continuous Vulnerability Management (CSC 3), Implement a Security Awareness and Training Program (CSC 17)
Come one, come all!
Welcome to the Information industry portion of the DBIR, and boy are you in for a treat! This section has it all: Web Applications attacks, errors, phishing and even some malware. The main three patterns witnessed in the NAICS 51 sector for 2019 were Web Application with over 40% of breaches, followed by Miscellaneous Errors, and at a distant third, Everything Else (Figure 72).
- 2020 DBIR
- DBIR Cheat sheet
- Introducción
- Summary of findings
- Results and analysis
- Incident classification patterns and subsets
- Industry analysis
- Accommodation and Food Services
- Arts, Entertainment and Recreation
- Construcción
- Educational Services
- Financial and Insurance
- Atención médica
- Información
- Fábricas
- Mining, Quarrying, Oil & Gas Extraction + Utilities
- Other Services
- Professional, Scientific and Technical Services
- Public Administration
- Real Estate and Rental and Leasing
- Retail
- Transportation and Warehousing
- Does size matter? A deep dive into SMB Breaches
- Regional analysis
- Wrap-up
- CIS Control recommendations
- Year in review
- Appendices (PDF)
- Corrections
- Download the full report (PDF)
Please provide the information below to view the online Verizon Data Breach Investigations Report.
Thank You.
Thank You.
Gracias.
You may now close this message and continue to your article.