Lost, Stolen, or Improperly Disposed Devices or Records
4%
System Misconfiguration/ Accessible Cloud Asset
2%
Account Takeover
2%
Root Cause
Root Cause Unknown26
Phishing25
Other (e.g., Pixel, Device Theft, Skimmers)14
Unpatched Vulnerability11
Social Engineering5
Other Human Error (e.g., Unintended Recipient)5
Employee Abuse of Access Privileges4
Misconfiguration4
Open RDP3
Brute Force/Credential Stuffing3
Root Cause Unknown26
Phishing25
Other (e.g., Pixel, Device Theft, Skimmers)14
Unpatched Vulnerability11
Social Engineering5
Other Human Error (e.g., Unintended Recipient)5
Employee Abuse of Access Privileges4
Misconfiguration4
Open RDP3
Brute Force/Credential Stuffing3
“While business email compromises increased in 2022, fraudulent wire transfers decreased. Moreover, the frequency of network intrusions decreased until the end of 2022, when we saw a dramatic increase, primarily due to an uptick in ransomware.”
What Happens After Access
Ransomware Deployment
28%
Theft of Data/Exfiltration
24%
Email Account Access
21%
Installation of Malware
13%
Wire Fraud/Direct Deposit Fraud
13%
Snooping
3%
Theft of Trade Secrets
1%
Use of Resources (e.g., Cryptomining)
1%
Other (i.e., Credentials on the Dark Web, Espionage, W-2 Scam)
<1%
Industries Affected
Healthcare (including Biotech & Pharma)24
Finance & Insurance17
Business & Professional Services (including Engineering, Transportation, and Managed Service Providers)15
Retail, Restaurant, & Hospitality (including Media & Entertainment)10
Education9
Manufacturing8
Government7
Technology4
Non-Profit4
Energy1
Other1
Healthcare (including Biotech & Pharma)24
Finance & Insurance17
Business & Professional Services (including Engineering, Transportation, and Managed Service Providers)15
Retail, Restaurant, & Hospitality (including Media & Entertainment)10
Education9
Manufacturing8
Government7
Technology4
Non-Profit4
Energy1
Other1
16% of our 1,160+ matters involved vendor incidents.