Author: Phil Muncaster
Date published: February 5, 2025
Before building an effective enterprise cybersecurity strategy, one must aim at having a thorough understanding of the threat landscape. For a thorough, detailed analysis, look no further than the Verizon 2024 Data Breach Investigations Report (DBIR). Now in its 17th year, the authoritative report draws on real-world incidents and breaches, and data from partners across multiple private sector industries, government and law enforcement to deliver well-rounded situational awareness.
The 2024 DBIR features an analysis of 30,458 security incidents and 10,626 confirmed breaches.1 From this data, we can extract a few key takeaways to help enhance your enterprise cybersecurity risk management strategy:
The DBIR found that 90% of data breaches were financially motivated.2 Thus, ransomware—a long effective tactic—remains a top threat across 92% of industries, according to the DBIR. Threat actors are now also turning to non-ransomware extortion techniques, as per the MOVEit campaign.3 Ransomware as an action type in breaches fell slightly from 24% to 23% over the past year, but when added to extortion (9%), they both still comprised a third of breaches.4
Mitigating the threat of data-based extortion requires risk management across the entire attack surface, from third-party software suppliers and cloud systems to mobile devices and unsolicited emails. As extortion can often stem from zero-day vulnerabilities in commercial software, you should consider investing in enterprise cybersecurity solutions to help mitigate the impact of these attacks and network solutions such as zero trust network access (ZTNA), network segmentation and monitoring.
Over the past two years, around a quarter of financially motivated incidents have involved pretexting—a form of social engineering that includes Business Email Compromise (BEC).5 In fact, it is now more common than phishing among all breach actions.6 Together, phishing and pretexting account for 73% of social engineering-related breaches.7 Aside from extortion, they are one of the most successful ways threat actors can monetize attacks.
One reason these actions are so successful is because they target human fallibility. You should make sure that your security awareness program is up to date, to include real-world simulations regularly tweaked to reflect changing threat actor tactics. ZTNA can also help by making it harder for hackers because they have to continuously authenticate and prove their legitimacy, which can make it more difficult to hijack accounts and impersonate colleagues, bosses and suppliers. Finally, AI-powered enterprise cybersecurity solutions in the future may be able to discern unusual email writing styles.
The success of social engineering attacks is also a significant contributor to the number one initial action type in breaches: the use of stolen credentials. This action was present in 24% of breaches this year and 31% over the past 10 years.8,9 Credentials are compromised in half of social engineering breaches.10 In fact, phishing is the most common source of stolen passwords, accounting for 14% of breaches involving credentials, although info-stealing malware is also a threat. This also has an impact on web application attacks, 77% of which are made possible by stolen credentials.11,12
On one cybercrime market over the course of just two days, Verizon found over 1,000 credentials per day advertised for sale, with an average price of $10.13
Helping to protect your organization begins again with phishing awareness training—preferably in short interactive lessons that can be more impactful for employees. ZTNA can help too by using multi-factor authentication (MFA) to make it harder for threat actors to impersonate an employee.
Thanks, in part, to the impact of the MOVEit campaign, there was a 180% surge in vulnerability exploitation as a cause of data breaches last year.14,15 The category now accounts for 13% of all breaches.16
However, not all are zero-day attacks like the one impacting MOVEit, but exploitations of known software flaws. The challenge is the sheer speed with which threat actors are often able to spring into action once a vulnerability has been published. Unfortunately, network defenders are often slow to respond. On average, it takes 55 days for organizations to remediate 50% of critical vulnerabilities listed in CISA's KEV catalog once patches are available, according to the 2024 DBIR.17
In this context, automated, risk-based patch management programs can help your IT team prioritize and close security gaps. Pen testing can also help identify new vulnerabilities in software. For zero-day vulnerabilities, continuous network monitoring can help to identify suspicious behavior early on.
It's not just third-party commercial software that presents a risk to your organization. Even software using open-source components could also contain buggy or malicious code. There are also business partners like law firms and payroll companies to consider, as well as third-party data processors. Together, supply chain partners account for 15% of all breaches today, a 68% annual increase according to the 2024 DBIR.18
Threat actors will typically look for the weakest link in a supply chain to go after the highest-value targets. That makes mitigating this kind of risk one of the most challenging parts of any security strategy—and one requiring dedicated enterprise cybersecurity solutions. Risk management efforts should start with thorough due diligence on suppliers and regular audits and testing where possible. ZTNA can help monitor and restrict access and regular pen testing could reduce the chances that vulnerable code is exploited.
In addition to some of the best practices shared above, Verizon offers cybersecurity solutions for enterprise customers that can help to mitigate many of these risks. These solutions include:
To read more on the threat landscape, download the 2024 Data Breach Investigations Report.
The author of this content is a paid contributor for Verizon.
1 Verizon, 2024 Data Breach Investigations Report, page 5.
2 Ibid, page 77.
3 Ibid, page 5
4 Ibid, page 7.
5 Ibid, page 9.
6 Ibid, page 18.
7 Ibid, page 36.
8 Ibid, page, 18.
9 Ibid, page 43.
10 Ibid, page 36.
11 Ibid, page 44.
12 Ibid, page 43.
13 Ibid ,page 44
14 Ibid, page 21
15 Ibid, page 7.
16 Ibid, page 43.
17 Ibid, page 21.
18 Ibid, page 8.
Call sales
888-789-1223
Chat with us
Start live chat
Have us contact you
Request a call
Get updates
Sign up for insights
Already have an account? Log inExplore support