Verizon Data Breach Investigations Report For 2024 Is Out

Verizon has released the 2024 Data Breach Investigations Report (DBIR). The report, as always has a wealth of great statistics to choose from. Here’s the key takeaways:

  • Vulnerability exploitation surged by nearly 3X (180%) last year.
  • Ransomware and the meteoric rise of extortion techniques accounted for a third (32%) of all breaches.
  • More than two-thirds (68%) of breaches involve a non-malicious human element.
  • 30,458 security incidents and 10,626 confirmed breaches were analyzed in 2023—a two-fold increase over 2022.
  • Verizon security by the numbers: 4,200+ networks managed globally, 34 trillion raw logs processed/year, and 9 security operation centers around the globe.

Ted Miracco, CEO, Approov Mobile Security:

   “The fact that it takes 55 days for organizations to remediate 50% of critical vulnerabilities listed in the CISA’s KEV catalog after patches are available points to a significant gap, that presents a critical window of opportunity for attackers to exploit known vulnerabilities. it is crucial for organizations to streamline their vulnerability scanning and patching procedures to outpace malicious activities. Without timely and comprehensive vulnerability information, organizations are at an extreme disadvantage in securing their systems against known exploits.”

I would register to get this report and spend some time reading it in detail. It will give you a roadmap as to secure your organization from the ever growing threats that seem to be everywhere these days.

UPDATE: Darren Williams, CEO and Founder, BlackFog adds this comment:

     “Mirroring BlackFog’s own data this report shows a significant increase in attacks over previous years. While this report indicates 32% of all breaches involved extortion, BlackFog’s own data shows that 92% of all ransomware involves extortion, an important distinction in this subset. It is also important to point out once the data is stolen it can, and is often used to target multiple victims from the original source down to the individual themselves. This data is also used to target other victims months or years into the future and highlights the importance of preventing data exfiltration.”

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading