This category includes a wide variety of businesses—from personal and repair services to non-profit, religious and social benefit organizations.
60% - 98% Financial
0% - 28% Espionage
0% - 15%Convenience
0% - 15%Fear
Financially motivated cybercrooks have found you
This category’s top breach patterns included Web Application attacks and Miscellaneous Errors. Notably, the variety and motivation of the external actor breaches have shifted from state-affiliated espionage to financially motivated organized crime, as the people who like to monetize data have discovered this sector.
Small mistakes can mean big consequences
Employee security errors fall into two main categories—Misconfiguration and Misdelivery. Misconfiguration occurs when a system admin neglects to set up proper security controls, while Misdelivery occurs when sensitive data is sent to the wrong recipients, either through email or paper mailings.
Anticipate your attackers’ tricks
When criminals use phishing attacks, they typically come in the form of pretexts or C-level impersonations via email. For the pretext, there’s an invented scenario and usually an attempt to get either an invoice paid or a direct wire transfer. For the impersonation, the request pretends to be an urgent request from a company executive, requesting sensitive data.
See the latest trends in cybersecurity.
Explore the results of the 2020 Data Breach Investigations Report (DBIR) and see what patterns emerged across the thousands of security incidents, from companies both big and small.
See an overview of all trends
Read specific insights about your industry
Accomodation and Food Service
Arts, Entertainment and Recreation
Financial and Insurance
Mining, Quarrying, Oil & Gas Extraction & Utilities
Professional, Scientific and Technical Services
Real Estate and Rental and Leasing
Transportation and Warehousing
Understanding the threats can help manage risk effectively
The threats are real, the attackers motivated. But something stands between them and your organizations data: you and your security teams, with the insight, perspective, and tools to take action. You'll find that all right here.
Ready to see how your company rates?Get your free security rating