www.verizon.com
Open in
urlscan Pro
64.12.16.109
Public Scan
Submitted URL: http://go.verizonenterprise.com/dc/smT4bVZ8RFGamz1QmG4ZYB5Is3DzPed76ETqn4KrlJdgmP6Bd0O28nruC-jISBQR72hiClgdq3UmoTeKgt6HBC9cIDM2_...
Effective URL: https://www.verizon.com/business/resources/reports/dbir/2023/master-guide/?mkt_tok=MTU3LUlQVy04NDYAAAGPAaSHqMTIezM4PIJys...
Submission: On October 25 via manual from BE — Scanned from DE
Effective URL: https://www.verizon.com/business/resources/reports/dbir/2023/master-guide/?mkt_tok=MTU3LUlQVy04NDYAAAGPAaSHqMTIezM4PIJys...
Submission: On October 25 via manual from BE — Scanned from DE
Form analysis
1 forms found in the DOM<form id="mktoForm_5748" data-title="soft gate" data-purpose="optin"><span></span></form>
Text Content
Accessibility Resource Center Skip to main content Personal Business Support Stores * Back to stores * Find a Verizon Store * Request a Store Appointment Close * USA (eng) * Australia (eng) * Deutschland (de) * France (fr) * Great Britain (eng) * Netherlands (eng) * Singapore (eng) * 日本(日本語) Mobile Mobile Mobile * PhonesPhones * Smartphones * Bring Your Own Device * Certified Pre-Owned Smartphones * Basic Phones * Desk and Conference Phones * Shop Deals * All Phones * Plans Plans * Business Unlimited * Flexible Business Plans * Device Protection Plans * All Plans * Devices Devices * Business Tablets * Connected Laptops * Mobile Hotspots * Business 5G Devices * Smartwatches * All Devices * Brands Brands * Apple * Samsung * Motorola * Google Internet Internet Internet * Business Internet Business Internet * All Business Internet * Fios Business Internet * 5G Business Internet * LTE Business Internet * Internet Dedicated * Check Availability * Speed Test * Business TV * EquipmentEquipment * Routers and Network Extenders * DealsDeals * Shop Deals * Fios Business Bundles * Complete Business Bundle * Business Phone & Data Plans Business Phone & Data Plans * Fios Business TV Solutions Solutions Solutions * By Products: * All Products * Phones & Devices Phones & Devices * Shop All Deals * Shop Now * Devices Devices * Smartphones * Basic Phones * Mobile Hotspots * Business Tablets * Connected Laptops * Certified Pre-Owned * Business 5G Devices * Public Sector Devices * Device Trade-In Program * Bring Your Own Device * Device Protection Plans * Deals * Brands Brands * Apple * Google * Samsung * Motorola * Plans Plans * Overview * Business Internet Plans Business Internet Plans * Connected Laptops * Fios Internet * 5G Business Internet * LTE Business Internet * Internet Dedicated * Business Unlimited Plans Business Unlimited Plans * Business Unlimited * Business TV * Business Voice, Phone, & Data Plans Business Voice, Phone, & Data Plans * One Talk * Business Digital Voice (VoIP) * Webex Calling * Flexible Business Plans * International Plans * Machine to Machine Plans * Bring Your Own Device * Verizon Cloud * Conferencing Plans Conferencing Plans * Webex Meetings * Security Plans Security Plans * Mobile Device Management * Business Internet Security * Business Mobile Secure * Security & Protection Security & Protection * Overview * Mobile Device & Endpoint Security Mobile Device & Endpoint Security * Overview * Mobile Device Management * Mobile Threat Defense * Business Mobile Secure * Network & Cloud Security Network & Cloud Security * Overview * DDoS Shield * Cloud Access Security * Business Internet Security * SASE Management * Identity & Access Management Identity & Access Management * Overview * Integrated PKI Authentication * Identity & Access Management Services * Cyber Risk Management Cyber Risk Management * Overview * Threat Intelligence Services * Governance, Risk & Compliance * Penetration Testing * Managed Detection & Response Services Managed Detection & Response Services * Overview * Cyber Security Incident Response Team Services * Network Detection and Response * Managed Detection and Response * Advanced Security Operation Center Services Advanced Security Operation Center Services * Overview * Managed Security Incident Event Management * Advanced Security Operations Center * Incident Response & Investigation Incident Response & Investigation * Overview * Rapid Response Retainer * Incident Response Planning * Web Security Web Security * Overview * Web Application Firewall * Bot Management * Web Acceleration * View All Products * Business Internet Business Internet * All Products * Fios Business Internet * Internet Dedicated * LTE Business Internet * 5G Business Internet * Speed Test * Routers and Network Extenders * Check Availability Check Availability * Business Internet Options * Business Fios TV * 5G Edge 5G Edge * Overview * Accelerated Access * Cashierless Checkout * Crowd Analytics * Quality Assurance for Production * Quality Assurance for Warehouse * Internet of Things Internet of Things * Overview * Connected Fleet & Field Service * GPS Equipment Tracking * Connected Assets Connected Assets * Overview * Critical Asset Tracking * Critical Asset Sensor * Condition Based Maintenance * LTE for Category M1 and Narrow Band Technologies * Connected Smart Cities & Communities Connected Smart Cities & Communities * Overview * Intelligent Lighting * Intelligent Video * Real Time Response System * Connected Commerce Connected Commerce * Overview * Automated Retail * Mobile Payment * IoT Security Credentialing * ThingSpace Platform for IoT * Networks Networks * Overview * Connectivity Connectivity * Overview * Backup Internet & Failover Solutions * Ethernet * Private IP * Secure Hybrid Network * Cloud Connectivity * Business Broadband * LTE Business Internet * 5G Business Internet * Wavelength Services * Private 5G Network * Internet Dedicated * Managed Network Services Managed Network Services * Overview * Managed SD WAN * SD Branch * Software Defined Secure Branch * Secure Gateway * Network Consulting Network Consulting * Overview * Digital Advisory Services * Network Infrastructure Services * Virtual Network Services Virtual Network Services * Overview * Network Orchestration * VNS – SBCaaS * VNS – Routing * Edge Solutions Edge Solutions * Overview * CPE Solutions * CPE and Network Hardware Maintenance * Software & Subscription Services * View All Products * Voice & Collaboration Voice & Collaboration * Overview * Unified Communications Unified Communications * Overview * One Talk * Unified Communications and Collaboration as a Service * Verizon VoIP for Operator Connect * Verizon Mobile for Microsoft Teams * Verizon Calling with Microsoft Teams * Webex Calling * Conferencing Conferencing * Overview * Webex Meetings * Audio Conferencing * Collaboration Platforms and Solutions Collaboration Platforms and Solutions * Overview * Microsoft Teams * Webex Suite * VoIP and Phone Services VoIP and Phone Services * Overview * IP Trunking * VoIP: Business Digital Voice * Business Phone Service: Preferred Voice * Workforce Productivity Workforce Productivity * Overview * Push to Talk Plus * Field Force Manager * Business Messaging * Productivity Tools Productivity Tools * Overview * DoForms * Librestream Onsight * SYNNEX Business Process Services * Google Workspace * GoCanvas * Communications Consulting Communications Consulting * Overview * Business Communications Design * Business Communications Adoption Services * Contact Center & CX Solutions Contact Center & CX Solutions * Overview * Cloud Contact Center Cloud Contact Center * Overview * Contact Center Hub * Virtual Contact Center * Genesys Cloud Contact Center * Webex Contact Center * Hosted Intelligent Contact Routing * Unified Customer Experience * Contact Center Network Contact Center Network * Overview * IP Contact Center * Toll Free & Inbound Services * Network-Based IVR * Voice Call Back & Voice Call Back Cloud * VoIP Inbound Local Origination * Customer Engagement Customer Engagement * Overview * Virtual Agent * Knowledge Assist * Live Agent * Social Engagement * Customer Experience Consulting Customer Experience Consulting * Overview * Contact Center Managed Services * Contact Center Edge Solutions * CX Design * DX Advisory Services * Contact Center Technical Services * Voice Security Voice Security * Overview * Call Filter * Voice Cypher * Message Archive * VoIP Inbound Anti-Fraud & Authentication * STIR/SHAKEN Caller ID Identification * SecureLogix * Tech Support Services Tech Support Services * Overview * TechTeam * TechTeam for Internet * Verizon Service Protection Plan * Deals & Bundles Deals & Bundles * Overview * Deals Deals * Fios Internet & Business Unlimited plan discount * Wireless Internet & Business Unlimited plan discount * Veteran / Military Offer * Shop all Deals * By Organization Size By Organization Size * Small Business * Enterprise and Medium Business * Public Sector * By Need By Need * Harness the Power of 5G * Drive Transformation with 5G Edge * Strengthen Customer Relationships * Build a Better Infrastructure * Secure Your Business * Navigating New Working Models * By Industry By Industry * All Industries * Construction * Healthcare * Education * Federal Government * Automotive * Manufacturing * Public Safety * Retail * State and Local Government * Financial * Media & Entertainment * Energy and Utilities * All Solutions Resources Resources Resources * Overview * All Resources All Resources * Overview * All Events & Webinars * Enterprise Events & Webinars * Small Business Events & Webinars * Public Sector Events & Webinars * Customer Success Stories * Popular Topics Popular Topics * Distance Learning * Edge & Why it Matters * Healthcare * Improving CX * Network-as-a-Service * New Workplace * Public Safety * Security Strategy * Featured Resources Featured Resources * Cybersecurity Risks and Events * Data Breach Investigations Report * Mobile Security Index Report * Payment Security Report * 5G Basics * Gartner Recognition * Verizon Partner Network Contact Us Contact Us Contact Us * Overview * For sales For sales * Contact Verizon Business * Request a Sales Consultation * Request a Store Appointment * Find a Verizon Store * For support For support * Contact Support * Fios Order Status Why Verizon Why Verizon Why Verizon * Overview * Executive Briefing Program * Looking Glass * Industry Awards & Recognition Log In Close Log In Close Close Business Personal Support Stores * Back to stores * Find a Verizon Store * Request a Store Appointment Close * USA (eng) * Australia (eng) * Deutschland (de) * France (fr) * Great Britain (eng) * Netherlands (eng) * Singapore (eng) * 日本(日本語) end of navigation menu * Business * Business Resources and Industry Insights * Reports * Data Breach Investigations Report * 2023 * Helpful definitions and chart guidance 1-877-297-7816 Contact Sales HELPFUL DEFINITIONS AND CHART GUIDANCE * 2023 * Helpful definitions and chart guidance * Introduction * Summary of Findings * Results and Analysis: Introduction * Incident Classification Patterns: Introduction * Industries: Introduction * Small Medium Business (SMB) * Regions: Introduction * Wrap-Up * Appendix * Corrections * Download the full report (PDF) PLEASE PROVIDE THE INFORMATION BELOW TO VIEW THE ONLINE VERIZON DATA BREACH INVESTIGATIONS REPORT. Submit View only THANK YOU. You will soon receive an email with a link to confirm your access, or follow the link below. Download this document Hello, and welcome first-time readers! Before you get started on the 2023 Data Breach Investigations Report (DBIR), it might be a good idea to take a look at this section first. (For those of you who are familiar with the report, please feel free to jump over to the introduction.) We have been doing this report for a while now, and we appreciate that the verbiage we use can be a bit obtuse at times. We use very deliberate naming conventions, terms and definitions and spend a lot of time making sure we are consistent throughout the report. Hopefully this section will help make all of those more familiar. VERIS FRAMEWORK RESOURCES The terms “threat actions,” “threat actors” and “varieties” will be referenced often. These are part of the Vocabulary for Event Recording and Incident Sharing (VERIS), a framework designed to allow for a consistent, unequivocal collection of security incident details. Here is how they should be interpreted: Threat actor: Who is behind the event? This could be the external “bad guy” that launches a phishing campaign or an employee who leaves sensitive documents in their seat back pocket. Threat action: What tactics (actions) were used to affect an asset? VERIS uses seven primary categories of threat actions: Malware, Hacking, Social, Misuse, Physical, Error and Environmental. Examples at a high level include hacking a server, installing malware or influencing human behavior through a social attack. Variety: More specific enumerations of higher-level categories—e.g., classifying the external “bad guy” as an organized criminal group1 or recording a hacking action as SQL injection or brute force. -------------------------------------------------------------------------------- LEARN MORE HERE: https://github.com/vz-risk/dbir/tree/gh-pages/2023—includes DBIR facts, figures and figure data https://verisframework.org—features information on the framework with examples and enumeration listings https://github.com/vz-risk/veris—features information on the framework with examples and enumeration listings INCIDENT VS. BREACH We talk a lot about incidents and breaches and we use the following definitions: Incident: A security event that compromises the integrity, confidentiality or availability of an information asset. Breach: An incident that results in the confirmed disclosure—not just potential exposure—of data to an unauthorized party. A Distributed Denial of Service (DDoS) attack, for instance, is most often an incident rather than a breach, since no data is exfiltrated. That doesn’t make it any less serious. INDUSTRY LABELS We align with the North American Industry Classification System (NAICS) standard to categorize the victim organizations in our corpus. The standard uses two- to six-digit codes to classify businesses and organizations. Our analysis is typically done at the two-digit level, and we will specify NAICS codes along with an industry label. For example, a chart with a label of Financial (52) is not indicative of 52 as a value. “52” is the NAICS code for the Financial and Insurance sector. The overall label of “Financial” is used for brevity within the figures. Detailed information on the codes and the classification system is available here: https://www.census.gov/naics/?58967?yearbck=2012 I’M SORRY, THIS ALL HAPPENED WHEN? While we have always listed the following facts in our Methodology section (because that is where this type of information belongs), we decided to also mention it here for the benefit of those who don’t make it that far into the report. Each year, the DBIR timeline for in-scope incidents is from November 1 of one calendar year through October 31 of the next calendar year. Thus, the incidents described in this report took place between November 1, 2021, and October 31, 2022. The 2022 caseload is the primary analytical focus of the 2023 report, but the entire range of data is referenced throughout, notably in trending graphs. The time between the latter date and the date of publication for this report is spent in acquiring the data from our global contributors, anonymizing and aggregating that data, analyzing the dataset and, finally, creating the graphics and writing the report. Rome wasn’t built in a day, and neither is the DBIR. BEING CONFIDENT OF OUR DATA Starting in 2019 with slanted bar charts, the DBIR has tried to make the point that the only certain thing about information security is that nothing is certain. Even with all the data we have, we’ll never know anything with absolute certainty. However, instead of throwing our hands up and complaining that it is impossible to measure anything in a data-poor environment or, worse yet, just plain making stuff up, we get to work. This year, you’ll continue to see the team representing uncertainty throughout the report figures. The examples shown in Figures 1, 2, 3 and 4 all convey the range of realities that could credibly be true. Whether it be the slant of the bar chart, the threads of the spaghetti chart, the dots of the dot plot or the color of the pictogram plot, all convey the uncertainty of our industry in their own special way. Much like the slanted bar chart, the spaghetti chart represents the same concept: the possible values that exist within the confidence interval; however, it’s slightly more involved because we have the added element of time. The individual threads represent a sample of all possible connections between the points that exists within each observation’s confidence interval. As you can see, some of the threads are looser than others, indicating a wider confidence internal and a smaller sample size. The slanted bar chart will be familiar to returning readers. The slant on the bar chart represents the uncertainty of that data point to a 95% confidence level (which is standard for statistical testing). In layman’s terms, if the slanted areas of two (or more) bars overlap, you can’t really say one is bigger than the other without angering the math gods. The dot plot is another returning champion, and the trick to understanding this chart is to remember that the dots represent organizations. If, for instance, there are 200 dots (like in Figure 3), each dot represents 0.5% of organizations. This is a much better way of understanding how something is distributed among organizations and provides considerably more information than an average or a median. We added more colors and callouts to those in an attempt to make them even more informative. The pictogram plot, our relative newcomer, attempts to capture uncertainty in a similar way to slanted bar charts but is more suited for a single proportion. We hope they make your journey through this complex dataset even smoother than previous years. CREDIT WHERE CREDIT IS DUE Turns out folks enjoy citing the report, and we often get asked how they should go about doing it. You are permitted to include statistics, figures and other information from the report, provided that (a) you cite the source as “Verizon 2023 Data Breach Investigations Report” and (b) content is not modified in any way. Exact quotes are permitted, but paraphrasing requires review. If you would like to provide people a copy of the report, we ask that you provide them a link to verizon.com/dbir/ rather than the PDF. QUESTIONS? COMMENTS? ORGANIZING A BANK RUN? Let us know! Drop us a line at dbir@verizon.com, find us on LinkedIn, tweet @VerizonBusiness with #dbir. Got a data question? Tweet @VZDBIR! If you are interested in becoming a contributor to the annual Verizon DBIR (and we hope you are), the process is very easy and straightforward. Please email us at dbircontributor@verizon.com. ¹ By organized criminal group, we mean a group that does this for a living and has a set process they use repeatedly, not Tony Soprano and his band of merry men. Introduction CUSTOMER SUPPORT If you are already a Verizon customer, we have several options to help you get the support you need. Enterprise, government and education customers Fios, internet and phone customers Small and medium business wireless customers LET'S GET STARTED. * Choose your country to view contact details. * Select Country... * United States * Argentina * Australia * Austria * Belgium * Brazil * Canada * Chile * China * Colombia * Costa Rica * Denmark * Finland * France * Germany * Hong Kong * India * Ireland * Italy * Japan * Korea * Luxembourg * Mexico * Netherlands * New Zealand * Norway * Panama * Portugal * Singapore * Spain * Sweden * Switzerland * Taiwan * United Kingdom * United States * Venezuela * * * CALL FOR SALES. 1-877-297-7816 * OR WE'LL CALL YOU. Contact Sales * Existing customers, sign in to your business account or explore other support options. GREAT NEWS! 5G IS AVAILABLE IN YOUR AREA Check availability ⚠ Your web browser is out of date. For the best browser experience, please use the latest version of Chrome, Safari, Firefox or Microsoft Edge. Products, Solutions & Deals * Products * Plans * Solutions * Verizon Business Deals * Wireless Devices * Why Verizon About Verizon * About Us * Our Company * Corporate Responsibility * Verizon Foundation * Careers * News * Investors * Site Map Manage My Account Online * Log In/Manage My Account * About My Business Follow * facebook-official * twitter * you-tube * instagram * Contact Us * Contact Us * Contact Sales * Request a Store Appointment * Contact Wireless Support * Fios Order Status * Contact FiOS, Internet and Phone Service Support * Contact Enterprise Support * Find a Verizon Store * Co-Browse * Real Estate Inquiry Form Programs * Wholesale * Partner Program * Systems Integrator Partners * Technology Partners * For Property Managers * Device Trade-in Program * Wireless Return Policy * Executive Briefing Program * Refer a Business Resources * Business Resources & Insights * Report a Security Vulnerability * WEA Compatibility * Service Guide * Customer Enablement Tools * Recall * Accessibility Quick Tasks for Enterprise * Add to Your Services * Change a Service * Create a Billing Inquiry * Create a Repair Ticket * Disconnect a Service * Move a Service * Check Billing Inquiry Status * Check Repair Ticket Status Opt In * Sign up for email alerts * Terms & Conditions * Privacy Policy * California Privacy Notice * Your Privacy Choices * Accessibility * About Our Ads * Open Internet * Analytics © 2023 Verizon AWSFE1 1 / 1 THANK YOU. You may now close this message and continue to your article. ↑ MANAGE COOKIES By clicking “Accept All”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Privacy Policy Disable All Accept All Cookies Settings PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active Strictly Necessary Cookies These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. We use both third party and first party cookies for this purpose. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIE Targeting Cookie These cookies may be set through our site by Verizon and third parties. They are used to present Verizon advertising on third party sites that you may visit. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising from Verizon. Cookies Details Confirm My Choices Back Button Back PERFORMANCE COOKIES Vendor Search Search Icon Filter Icon Clear Filters Information storage and access Apply Consent Leg.Interest All Consent Allowed Select All Vendors Select All Vendors Select All Hosts * View Cookies REPLACE-WITH-DYANMIC-HOST-ID * Name cookie name Confirm My Choices