Verizon Data Breach Report 2024

Verizon Breach Report Reveals Insider Threats are Growing

The Verizon 2024 Data Breach Investigations Report (DBIR or Report) is a terrific read for non-technical people who want clarity about a confusing topic. It’s designed to simplify the complex world of cyber incidents, making it more accessible and less overwhelming.

The Report aims to “shine a light on the various Actor types, the tactics they utilize, and the targets they choose.”

The authors of the DBIR have not only made a technical subject accessible but also conducted a comprehensive analysis of over 30,000 cyber incidents from 20 industries. This in-depth research depicts industry trends and offers insights for resource prioritization. The Report’s 17-year publication history by Verizon further underscores its reliability and relevance.

Some things have changed over time, and some trends remain. Staying informed is crucial as the world of cyber incidents evolves.

From the Introduction:

“From year to year, we see new and innovative attacks as well as variations on tried- and-true attacks that still remain successful. From the exploitation of well-known and far-reaching zero-day vulnerabilities, such as the one that affected MOVEit, to the much more mundane but still incredibly effective Ransomware and Denial of Service (DoS) attacks, criminals continue to do their utmost to prove the old adage ‘crime does not pay’ wrong.”

While some tactics are nearly universal, such as Ransomware, the specific threats in each industry differ.

Note: Capitalized terms are defined in the report. The definitions are not repeated here, but you can see the Report for more. The analysis period was from November 1, 2022, to October 31, 2023.

Data Breaches in Healthcare

Insiders

The Insider threat is growing in healthcare.

The Report analyzed 1,378 incidents, 1,220 of which had confirmed data disclosures. The top patterns were Miscellaneous Errors, Privilege Misuse, and System Intrusion, representing 83% of breaches. The fourth pattern was Social Engineering.

“This year’s Healthcare sector analysis reveals significant shifts compared to previous years. Insiders deliberately causing breaches have surged back into second place after a steady decline since 2018.”

The pattern analysis is underscored by the types of actors who are threats. In healthcare, 70% of the Threat Actors are Insiders, while 30% are External.

The healthcare summary is striking compared to the Financial and Insurance industry, where Insiders were not a top threat; 69% of the Threat Actors were External, and 31% were Insiders. Privilege Misuse – the intentional acts – is not among the top three patterns in the Financial and Insurance Industry.

When you consider that a large proportion of the first pattern category in healthcare, Miscellaneous Errors, is caused by Insiders, it’s easy to see that the Insider threat in healthcare is worth paying attention to. The most common error is misdelivery (sending or giving information to the wrong recipient), followed by loss and speaking within the hearing of an unauthorized person.

Vigilance, workforce training, and sanctions can reduce these data breaches, whether deliberate or accidental.

External Actors

System Intrusion from External Actors is a pattern that has mostly stayed the same. According to the Report, the most sophisticated attacks are some form of System Intrusion and,

“They still largely consist of breaches and incidents in which the threat actor leverages a combination of Hacking techniques and Malware to penetrate the victim organization.”

Most often, these result in Ransomware, which accounts for 70% of the incidents within System Intrusion.

The Two Biggest Ransomware Attacks in History are Recent

The most significant cyber incident during the analyzed period was the MOVEit data breach in May 2023, which the Cl0p ransomware group deployed. While it attacked dozens of companies and organizations in finance, professional services, and education, healthcare was hit hard, and millions of people were affected.

The February 2024 Change HealthCare ransomware attack occurred after the period the Report analyzed and likely affected 1/3 of the American population, well over 100 million.

Social Engineering

It’s worth noting that the fourth threat pattern in healthcare was Social Engineering, which External Actors use through electronic communications, typically email. Examples of Social Engineering include phishing (using psychology to alter someone’s behavior and give information away) and pretexting (a fictional story designed to convince someone to give up valuable information).

Cybersecurity awareness training for the workforce is essential to reduce the chances of successful phishing and pretexting attacks.

HIPAA Compliance Can Reduce Data Breaches

  • Conduct an annual HIPAA Risk Analysis and practice Risk Management year-round. Use the Security Rule Checklist to examine your cybersecurity defenses and ensure you stay current.
  • Ransomware is a universal threat, so learning how to stop it should be a top priority. Visit StopRansomware.gov for the latest.
  • Refresh your workforce cybersecurity awareness training. Trained and alert employees are the first defense against cyber attackers using phishing and pretexting.

Share This Post

Maggie Hales

Maggie Hales is a lawyer focusing on health information privacy and security. As CEO of ET&C Group LLC she advises health care providers and business associates in 36 states, Canada, Egypt, India and the EU, using The HIPAA E-Tool® to deliver up to date policies, forms and training on everything related to HIPAA compliance.

Copyright © 2024 ET&C Group LLC.

The HIPAA E-Tool® and Protecting Patient Privacy is Our Job®
are registered trademarks of ET&C Group LLC

Terms of Use | Privacy Policy | Cookies Policy | Privacy Settings | HTML/XML Sitemap

Mailing Address
The HIPAA E-Tool
PO Box 179104
St. Louis, MO 63117-9104

Office
8820 Ladue Road Suite 200
St. Louis, MO 63124

Powered by JEMSU