evolution of the verizon data breach investigations report (2008-2016)
TRANSCRIPT
This document and any attached materials are the sole property of Verizon and are not to be used by you other than to evaluate Verizon’s service.
© 2016 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its a�liates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners.
Proprietary statement.
Evolution of the Verizon Data Breach Investigations Report
Nine Editions:Providing Insight Into Data BreachesThe Verizon Data Breach Investigations Report (DBIR) has given readers key insights into how to manage risk and avoid security failings since 2008.
Here are some of the top highlights from the past nine editions of the DBIR.
2009
records analyzed were compromised in the past year. That’s more than one per adult in the US.
285 million
In 2010, the United States Secret Service contributed to the report for the first time.
2010 They helped expose that
of all data stolen in the pastyear was the work of criminals outside the victim organization.
98
*Percent of all 2010 data breaches
2011
The 2011 DBIR showed that hacking and malware had became an even more significant threat.
</></></></></></></></></></></></>
50 hacking
49malware
2012
The 2012 report covered the period of social uprising including the Occupy movement and the Arab Spring. These events had an impact on data security too.
of all incidents analyzed for the 2012 report were tied to hactivist groups.
58%
2013
of initial compromises took hours or less.
Most cyberattacks are committed by
Spies Criminals Activists
* Based on analysis of over 100,000 incidents from between 2004 and 2013
2014
00
00
00
BANK
Cyber-espionage Miscellaneouserrors
POS intrusions
Payment card skimmers
Denial ofservice
Web appattacks
Physical theft and loss
Crimeware Insider and privilege misuse
92%of security incidents were described by just nine patterns.*
2015
Nine basic patterns make up 96% of security incidents.
security incidents analyzed the past year can be traced to nine basic attack patterns that vary from industry to industry.
The bulk (96%) of nearly
of security incidents involve just three threat patterns.
00
00
0075
80,000
2016
of incidents had a financial motive.
80
Admin
P4$$w0rd
Password
Username
of 2,260 confirmed breaches leveraged weak, default or stolen passwords.
63
Since the 2015 report we’ve analyzed over 100,000 new security incidents. The 2016 DBIR o�ers our latest insight into stopping cyberattacks and protecting your organization.
Get the latest report now:
VerizonEnterprise.com/DBIR2016
Get our latest insightinto security threats
Contact us >
© 2016 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. PTE16739 04/16