Verizon 2018 Data Breach Investigations Report

Tales of dirty deeds and unscrupulous activities.

Read the Verizon Data Breach Investigations
Report (DBIR). For security practitioners. Written
by security practitioners.

  • 2,216 confirmed data breaches

    What went wrong?
    An exploration in trends and data.

    Within the 53,000+ incidents and 2,200-odd breaches you’ll find real takeaways on what not to do, or at the very least, what to watch for.

    At first glance, identifying 53K+ incidents in only 12 months suggests an information security dystopia, an uneven playing field where the bad guys consistently win out. And, the 2018 Data Breach Investigations Report (DBIR) is full of nefarious events by offenders both known and unknown.

    However, that same catalog of unscrupulous activities offers security pros a first-hand view into current cybercrime trends, and a map towards developing a prosperous and mature security program.

    Want a sample of what the 2018 Data Breach Investigations Report has to offer?

    Read the Executive Summary

Cybersecurity leader

We’re recognized for our leadership in Managed Security Services.

  • Strong cybersecurity from Verizon

    We’ve been named a leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide six years in a row. In a complicated threat landscape, you need services that strengthen your defenses without adding complexity. 

    Read the report
  • Things you should know: Read the full DBIR

    Expert knowledge gained from the practitioner community.

    The Data Breach Investigations Report is a collaborative effort, developed in cooperation with numerous agencies.

    The 2018 DBIR draws on over 53,000 incidents and 2,200-odd confirmed data breaches, studying the impact of malware, DoS attacks, social engineering and other activities across multiple industries. The findings include:

    • Who’s being attacked, who’s behind them and what the primary motivators are
    • How simple errors generate a significant percentage of breaches
    • What percentage of breaches were discovered in 30 days or less

    There is no such thing as a cyber world devoid of risk. But information is power and understanding the threats you face today can only help you improve your security for the incidents you will face tomorrow.

    Read the full 2018 DBIR
  • Information at your fingertips

    Dig in to the details with DBIR Interactive.

    For eleven years we’ve gathered data from around the world to develop the Data Breach Investigations Report so information security practitioners can understand the threats they face.

    Now, the community has the opportunity to dig into the details with DBIR Interactive, an online portal providing you access to explore the most common DBIR incident patterns for your industry.

    Go to DBIR Interactive

Explore our security report archive.

  • 2017 Data Breach Investigations Report

    Understanding the threats you face is the key to effective cybersecurity. The 2017 DBIR revealed the biggest threats in your sector and what you can do to mitigate them.

    Read the report
  • 2016 Data Breach Investigations Report

    What were the biggest threats in the 2016 report? The nine incident classification patterns we identified in 2014 reigned supreme. Get our advice on how to mitigate the risks.

    Read the report
  • 2015 Data Breach Investigations Report

    What’s the impact of a data breach? Our 2015 data can help you better estimate the cost of a breach today.

    Read the report
  • 2014 Data Breach Investigations Report

    The universe of threats may seem limitless, but 92 percent of the 100,000+ incidents we analyzed over 10 years can be categorized into the nine basic attack patterns.

    Read the report
  • 2013 Data Breach Investigations Report

    The large scale and diverse nature of data breaches and other network attacks took center stage. Understand what attackers are likely to do and how far they’re willing to go.

    Read the report
  • 2012 Data Breach Investigations Report

    Get a closer look at who was behind the data breaches in 2011. The online world was rife with the clashing of ideals, taking the form of activism, protests, retaliation and pranks.

    Read the report
  • 2011 Data Breach Investigations Report

    2010 saw less than four million compromised records within the breaches we analyzed. A continuing trend or something else?

    Read the report
  • 2010 Data Breach Investigations Report

    Review the analysis of Verizon and the United States Secret Service about hundreds of data breaches. And, discover why data breaches have a lot in common with fingerprints.

    Read the report
  • 2009 Data Breach Investigations Report

    In 2008, some of the largest individual data breaches in history were analyzed for the DBIR - more than 280 million records. 

    Read the report
  • Gartner Magic Quadrant for Network Services, Global, Danellie Young, Katja Ruud, Bjarne Munch, Takeshi Ikeda, Neil Rickard, 27 February 2018.

    Gartner Magic Quadrant for Managed Security Services, Worldwide, Toby Bussa, Kelly M. Kavanagh, Sid Deshpande, Pete Shoard, 27 February 2018. This graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire document. The Gartner document is available upon request from Verizon.

    Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Licensed reprints available at: www.verizonenterprise.com/campaigns/gartner/

    GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

Let's connect.

Choose your country to view contact details.

Sales

Call us at

Support

Manage your account or get tools and information.