Professional, Scientific and Technical Services (NAICS 54)
Please provide the information below to view the online Verizon Data Breach Investigations Report.
Thank You.
Gracias.
You will soon receive an email with a link to confirm your access, or follow the link below.
Gracias.
You may now close this message and continue to your article.
- 2024
- Summary of Findings
- Introducción
- Helpful Guidance
- Results and Analysis - Introduction
- Incident Classification - Introduction
- Industries - Introduction
- Accommodation and Food Services Data Breaches
- Educational Services
- Financial and Insurance Services
- Healthcare Data Breaches
- Information Industry Data Breaches
- Data Breaches in Manufacturing Industries
- Professional Services Data Breaches
- Public Administration Data Breaches
- Retail Data Breaches and Security
- Introduction to Regions
- Wrap Up
- Appendix
- Corrections
- Download the full report (PDF)
Frequency |
2,599 incidents, 1,314 with confirmed data disclosure |
|
Top patterns |
Social Engineering, System Intrusion and Miscellaneous Errors represent 85% of breaches |
|
Threat actors |
External (75%), Internal (25%) (breaches) |
|
Actor motives |
Financial (95%), Espionage (6%) (breaches) |
|
Data compromised |
Personal (40%), Credentials (38%), Other (33%), Internal (23%) (breaches) |
|
What is the same? |
Personal data and Credentials are still the top types of data impacted in this industry. |
Resumen
Social Engineering is one of the top threats facing this industry, accounting for 40% of breaches, and 20% of breaches are the result of Pretexting. In addition, there has been an increase in errors, specifically Misdelivery.
Casting wide nets
While the use of NAICS codes is helpful, we realize that they are not always the ideal way of creating peer groups. That is particularly the case with this industry, as the wide net it casts includes diverse organizations such as interior designers and nanotech companies. This industry does illustrate the types of breaches that affect most industries, whether they were intentional or accidental. Let’s take a look at the breakdown. Like many industries, we see Social Engineering and System Intrusion in the top patterns, although there’s also the inclusion of Miscellaneous Errors as seen in Figure 69.
When it comes to intentional breaches, the vast majority of those cases fall into two buckets: Ransomware and the BEC, at 24% and 20% respectively. This isn’t the first time that we’ve seen Ransomware in the top three, but it is one of the first times that we’ve seen such headway with Pretexting attacks. These have increased significantly from last year and now account for 40% of breaches. Lastly, organizations need to continue to protect the keys to the kingdom, with Credentials showing up in 34% of the breaches.
Although these credentials provide an important beachhead for criminals, we simply can’t forget the unintentional (or rarely intentional) insider. Even though 25% of breaches involved someone coming in from within the organization, the majority of them are Misdeliveries (12%), while only a handful involve individuals abusing their position (5%). This helps us remember that there are many more folks who are maladroit than malicious.