2024 Data Breach Investigations Report: Half of the Breaches in EMEA are Internal
Verizon Business released its 17th annual Data Breach Investigations Report (DBIR) analyzing 8,302 security incidents in EMEA, with 6,005 confirmed breaches. 49% of breaches in EMEA are internal. Most breaches globally involve non-malicious human actions. Zero-day vulnerabilities are a persistent threat. Organizations take an average of 55 days to patch 50% of critical vulnerabilities. AI adoption is less concerning than failure to patch basic vulnerabilities. 32% of breaches involve extortion techniques, and stolen credentials appear in 31% of breaches over the past decade.
- None.
- None.
What you need to know:
- More than two-thirds (
68% ) of breaches globally involve a non-malicious human action. - Vulnerability exploitation experienced
180% growth vs 2023. - On average it took organisations about 55 days to patch
50% of their critical vulnerabilities.
LONDON, May 01, 2024 (GLOBE NEWSWIRE) -- Verizon Business today released the results of its 17th annual Data Breach Investigations Report (DBIR), which analysed 8,302 security incidents in Europe, the Middle East and Africa (EMEA), of which 6,005 (more than
Virtually half of the breaches (
The human element continues to be the front door for cybercriminals
Most breaches globally (
“The persistence of the human element in breaches shows that organisations in EMEA must continue to combat this trend by prioritising training and raising awareness of cybersecurity best practices. However, the increase in self-reporting is promising and indicates a cultural shift in the importance of cybersecurity awareness among the general workforce,” said Sanjiv Gossain, EMEA Vice President, Verizon Business
Zero-day vulnerabilities remain a persistent threat to enterprises
Globally, the exploitation of vulnerabilities as an initial point of entry increased since last year, accounting for
“The exploitation of zero-day vulnerabilities by ransomware actors remains a persistent threat to enterprises, due in no small part to the interconnectedness of supply chains,” said Alistair Neil, EMEA Senior Director of Security, Verizon Business “Last year,
Analysis of the Cybersecurity Infrastructure and Security Agency (CISA) Known Exploited Vulnerabilities (KEV) catalogue revealed that on average it takes organisations 55 days to remediate
As a possible relief to some anxieties, the rise of artificial intelligence (AI) was less of a culprit vs challenges in large-scale vulnerability management. “While the adoption of artificial intelligence to gain access to valuable corporate assets is a concern on the horizon, a failure to patch basic vulnerabilities has threat actors not needing to rapidly advance their approach and focusing their use of AI on accelerating social engineering,” Chris Novak, Sr. Director of Cybersecurity Consulting, Verizon Business.
Additional key findings:
- About
32% of all breaches involved some type of extortion technique, including ransomware. - Over the past two years, roughly a quarter (between
24% and25% ) of financially motivated incidents involved pretexting. - Over the past 10 years, the use of stolen credentials has appeared in almost one-third (
31% ) of all breaches.
View the 2024 Data Breach Investigation Report here.
Click here for more information on ways to help defend against zero-day vulnerabilities and other cyber threats.
You can also read the Global Press Release here.
About Verizon
Verizon Communications Inc. (NYSE, Nasdaq: VZ) was formed on June 30, 2000 and is one of the world’s leading providers of technology and communications services. Headquartered in New York City and with a presence around the world, Verizon generated revenues of
VERIZON’S ONLINE MEDIA CENTER: News releases, stories, media contacts and other resources are available at verizon.com/news. News releases are also available through an RSS feed. To subscribe, visit www.verizon.com/about/rss-feeds/.
Media contacts:
Sebrina Kepple
+44 7391 065817
Sebrina.Kepple@verizon.com
