Now in its 10th year, the  2017 Verizon Data Breach Investigations Report (DBIR) has been released and its findings provide insight for organizations seeking to improve their cybersecurity strategy to protect critical systems and valuable data from today’s threats.

The research found that 81% of hacking-related breaches leveraged either stolen and/or weak passwords, with 75% perpetrated by outsiders and 51% involving organized criminal groups Additionally, crimeware and insider/privilege misuse were defined as common attack patterns used by cybercriminals.

According to the report, the use of ransomware continues to soar – 73% percent of all breaches in 2016 were financially motivated. Ransomware surged in the healthcare industry from the 22nd most common type of malware in 2014 to the fifth most common in 2016. In total, 72% of all healthcare malware attacks in 2016 were, along the lines of the recent and highly publicized WannaCry.  Outdated methods of protecting sensitive information could be contributing factors and, according to the findings, many of the security issues that occurred in the healthcare industry could have been prevented.

The report reveals that the most significant change to ransomware in 2016 was the shift away from infecting individual consumer systems toward targeting vulnerable organizations. Having third-party access controls in place and policies that promote corporate cyber safety to employees and vendors will be critical for organizations moving forward.  In addition, securing insider access will be just as important. Bomgar’s recent Secure Access Threat Report revealed that while many organizations need to allow a myriad of internal and external parties to access their sensitive data and systems, they are often placing too much trust in employees and third-party vendors and do not adequately manage and control their access.

As cyberattacks continue to evolve, organizations should implement a layered security approach. Here are some quick takeaways for organizations to bolster their security efforts and avoid critical mistakes: 

What solutions do you have in place for providing secure access to your organizations systems and networks? Check out Bomgar’s secure access solutions that help organizations worldwide securely support the systems and users who need them, without sacrificing productivity.