Security Assessment Tool for Other Services

Other Services



Get your free security rating
  • This category includes a wide variety of businesses—from personal and repair services to non-profit, religious and social benefit organizations.

  • Total incidents


    The number of security incidents (Nov 2018 to Oct 2019) analyzed in this sector in the 2020 DBIR.

  • Top three patterns

    Web Applications 

    Miscellaneous Errors 

    Everything Else 

    The top trends that emerged from this sector’s data (Nov 2018 to Oct 2019) in the 2020 DBIR.

  • Threat actors 

    68% External 

    68 percent

    33% Internal 

    33 percent

    2% Multiple 

    2 percent

  • Actor motives 

    60% - 98% Financial 

    60 percent range

    0% - 28% Espionage 

    0-28 range

    0% - 15%Convenience 

    15 percent range

    0% - 15%Fear 

    15 percen ranget

  • Data compromised 

    81% Personal 

    81 percent

    42% Other 

    42 percent

    36% Credentials 

    36 percent

    25% Internal 

    25 percent


  • Financially motivated cybercrooks have found you

    This category’s top breach patterns included Web Application attacks and Miscellaneous Errors. Notably, the variety and motivation of the external actor breaches have shifted from state-affiliated espionage to financially motivated organized crime, as the people who like to monetize data have discovered this sector.

  • Small mistakes can mean big consequences

    Employee security errors fall into two main categories—Misconfiguration and Misdelivery. Misconfiguration occurs when a system admin neglects to set up proper security controls, while Misdelivery occurs when sensitive data is sent to the wrong recipients, either through email or paper mailings.

  • Anticipate your attackers’ tricks

    When criminals use phishing attacks, they typically come in the form of pretexts or C-level impersonations via email. For the pretext, there’s an invented scenario and usually an attempt to get either an invoice paid or a direct wire transfer. For the impersonation, the request pretends to be an urgent request from a company executive, requesting sensitive data.

  • See the latest trends in cybersecurity.


    Explore the results of the 2020 Data Breach Investigations Report (DBIR) and see what patterns emerged across the thousands of security incidents, from companies both big and small.


    See an overview of all trends

Read specific insights about your industry

  • 2020 dbir cover
  • Understanding the threats can help manage risk effectively

    The threats are real, the attackers motivated. But something stands between them and your organizations data: you and your security teams, with the insight, perspective, and tools to take action. You'll find that all right here.

    Download the report