<img src="https://ws.zoominfo.com/pixel/0nVRFDqEc4KEsx6wmKaS" width="1" height="1" style="display: none;">

Industry Reports Scorecard – Our analysis of the Verizon DBIR

Every year cybersecurity solution vendors release reports citing their take on the latest industry trends and threats. Some of these reports are insightful and useful while others are thinly disguised marketing pieces. We considered releasing one of our own but, rather than adding to our readers’ to-do lists, we decided to take some burden off your shoulders and provide a crib notes review of these releases. With our Industry Report Scorecard series, we take key cybersecurity industry reports and boil them down into easy to read, quick-hitting summaries of the best information, key trends and top take-aways that we believe are actionable and productive to helping business leaders better manage their security posture throughout their organization.

Up first, the venerable Verizon DBIR – the gold standard of cybersecurity reports. With 13 years of data collection and analysis under their belt, the authors of this report excel at pinpointing data trends impacting the cybersecurity landscape. While it’s a long report, we find it to be informative and accessible. Findings we’ve culled from the report include:

  • Email is among the most frequently utilized channels in successful attacks: phishing represented 96% of all social attacks. Employees still click on malicious links, but they’re doing so at a reduced rate (3.4%) compared to past years.
  • We’re getting better at identifying and containing breaches, with 81% contained in “days
    or less.”
  • Money talks. A significant majority of breaches (86%) were financially motivated.

In addition to analyzing the report and its findings, we also provide our own recommendations on how you can protect your organization against cyberattacks, like those noted in the report, and improve your security posture overall. Simple solutions such as awareness training, MFA, vulnerability and patch management solutions, penetration testing and strong access controls can all make a significant difference to your risk of attack. Once you have the basics down, deploying a monitoring solution is often the difference between an easily addressed “that’s interesting” and         a big “uh oh.”

View our scorecard here for a full analysis of the report, key takeaways and recommended steps to minimize the risk a cybersecurity attack poses to your organization.

Related Posts