RH-ISAC report: 2022 industry insights
What: For the retail, hospitality, and travel sectors, RH-ISAC reviewed the Verizon report and identified the key trends and findings most relevant to the community and the key industries listed that most closely align with their community's sectors of retail and hospitality.
Why it is important: This report compares some of the key takeaways from the Verizon Report with RH-ISAC's own member data, providing additional context
to help members benchmark their threat landscape against a wider community.
Across all industries surveyed, Verizon reported core metrics and trends:
» The most common attack methods were: stolen credentials, ransomware, and phishing
» The most commonly targeted data were: payment data, personally identifiable information (PII), credentials, intellectual property, and non-sensitive data
» 73% of breaches were executed by external actors, and 18% of breaches were executed by internal actors
» 39% of attacks originated with third-party vendors
» 82% of incidents resulted from human error, and these errors were split between clicking on phish links and failing to follow standards which resulted in business email compromise.
» Most indicators of compromise (IOCs) had relatively good value for blocking
» Hashes had relatively low value, but IP addresses, domains, network artifacts, tools, and TTPS all were valuable for blocking