The Top Three Data Breach Vectors and How to Combat Them

In Adenike Cosgroves blog, she explores the top three vectors identified by Verizon in their 2020 Data Breach Investigations Report (DBIR) comprehensive analysis and offers some suggestions for how to equip your organization to protect against each.

Credential Theft

Stolen credentials were used in over 80% of attacks on web applications and 43% of breaches were attacks on web applications, more than double the results from last year.


If stolen credentials is the top prize for cybercriminals, phishing is the preferred method to achieve it. Spoofing a trusted identity, phishing attacks exploit human nature rather than exclusively technological vulnerabilities.

Human Error

Human error accounted for 22% of all data breaches in Verizon’s report. Insiders have always been a challenge to the confidentiality and integrity of available data.

There are five key pillars to a people-centric cybersecurity strategy to help protect your workforce:

Secure personal activities on corporate devices

Implement an adaptive, risk-based solution that meets your organization’s security needs without getting in the users’ way

Protect the email channel

End-to-end email security is crucial to detecting, combatting and remediating phishing attacks across your organization.

Mitigate human error

You must be empowered to detect threats, streamline your investigations and protect against data loss.

Secure the Cloud

Protect users as they browse the web and use cloud apps.

Educate Users

Turn your users into a strong last line of defense – regardless of where they work

Read Adenike Cosgrove’s full blog here and contact your local Exclusive Networks Account Manager to learn more about how Proofpoint can help you implement a people-centric cybersecurity strategy to help protect your workforce.