skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.

Introduction

Adversaries successfully breach enterprises largely because of phishing and credential theft, the same techniques that have worked for years.

Highlights

  • Verizon’s latest treasure trove of incident data also highlights why personal data appears to be stolen with more frequency, what preventive measures are working, and why a ransomware trend not even mentioned in this year’s report may be Verizon’s most alarming finding.

Features and Benefits

  • Understand the scope of Verizon’s DBIR dataset and research, which highlights trends involved in successful enterprise data breaches.
  • Learn why an increase in misconfigurations is creating an opportunity for attackers.

Key questions answered

  • Verizon’s 2020 findings are based on 32,000 incidents and nearly 4,000 confirmed breaches (almost twice as many as last year) from 81 data providers.
  • Verizon blames most misconfigurations on internet-exposed storage enterprises are unable to secure because of either complexity or inexperience.

Table of contents

Omdia view

  • Summary
  • Phishing and credential theft are still hard to thwart
  • Misdelivery and misconfigurations too often go unnoticed
  • Attack paths offer many opportunities to prevent breaches
  • Additional DBIR 2020 highlights

Appendix

  • Further reading
  • Author