Introduction to industries

The information provided will be used in accordance with our terms set out in our Privacy Notice. Please confirm you have read and understood this Notice.

By submitting the form, you are agreeing to receive insights, reports and other information from Verizon and affiliated companies in accordance with our Privacy Policy. California residents can view our California Privacy Notice.

Verizon may wish to contact you in the future concerning its products and/or services. If you would like to receive these communications from Verizon, indicate by selecting from the dropdown menu below. Please note that you can unsubscribe or update your preferences at any time.

Indicates a required field. The content access link will be emailed to you.

View only

Thank You.

Thank you.

You will soon receive an email with a link to confirm your access. When you click to confirm from your email, your document will be available for download.

If you do not receive an email within 2 hours, please check your spam folder.

Thank you.

You may now close this message and continue to your article.

  • This year we looked at 29,207 incidents, which boiled down to 5,258 confirmed data breaches (Table 8468227d). Once again, we break these incidents and breaches into their respective industries to illustrate that all industries are not created equal in terms of attack surfaces and threats. The kind of attacks suffered by a particular industry will have a lot to do with what kinds of infrastructure they rely on, what kind of data they handle, and how people (customers, employees, and everyone else) interact with them.

    A large organization whose business model focuses entirely on mobile devices, where customers use an app on their phone, will have different risks than a small mom and pop shop with no internet presence, but who uses a Point of Sale vendor to manage their systems for them. The infrastructure, and conversely the attack surface, largely drives the risk.

    While keeping that in mind, we caution our readers not to make inferences about the security posture (or lack thereof) of a particular sector based on how many breaches or incidents that industry reports. These numbers are heavily influenced by several factors, including data breach reporting laws and partner visibility. Because of this, some of the industries have very low numbers, and as with any small sample, we must caution you that our confidence in any statistics derived from that small number must also be less.

    As in past years, we have broken down the breaches and incidents by industry in a heat map that categorizes the data into Patterns, Actions and Assets (Figures 95 and 96 respectively). These figures help to answer the “so what?” question in our data, and are useful as indications of what the attack patterns an organization is most likely to encounter, given their industry. This, paired with the CIS Controls in each industry section, can be a guide for determining how best to mitigate risk.

  • IncidentsTotalSmall
    (1-1,000)
    Large
    (1,000+)
    UnknownBreachesTotalSmall
    (1-1,000)
    Large
    (1,000+)
    Unknown
    Total29,2071,03781927,351 5,2582633074,688
    Accommodation (72)694758 404729
    Administrative (56)353810335 19676
    Agriculture (11)311030 161015
    Construction (23)573351 303225
    Education (61)1,33222191,291 3441713314
    Entertainment (71)7,065617,058 10961102
    Finance (52)7213234655 4672614427
    Healthcare (62)6554531579 4723219421
    Information (51)2,93544272,864 3813521325
    Management (55)8008 1001
    Manufacturing (31-33)5852035530 2701327230
    Mining (21)49835490 33523330
    Other Services (81)19432189 673064
    Professional (54)1,892793516583 63076121433
    Public (92)3,23622653,149 8851330842
    Real Estate (53)1005392 445336
    Retail (44-45)7251227686 1651019136
    Wholesale Trade (42)8041066 284717
    Transportation (48-49)212417191 673856
    Utilities (22)481245 201217
    Unknown8,411558,401 86833862
    Total29,2071,03781927,351 5,2582633074,688

    Table 4. - Number of security incidents and breaches by victim industry and organization size

  • Figure
  • Figure
  •  

    When discussing the industries with a small sample, we will provide ranges within which the actual value may reside. This allows us to maintain our confidence interval while still providing you with an idea of what the actual number might be, had we been given a large enough sample. For example, instead of saying “In the Accommodation industry, 92% of attacks were Financially motivated,” we show that Financially motivated attacks ranged between 86 and 100%. Check out our riveting Methodology section for more information about the statistical confidence background used throughout this report.

  • Check out our riveting Methodology section for more information about the statistical confidence background used throughout this report.

  • It is worth noting that some of the industry sections this year may look smaller than usual. This is because we did not want to steal the thunder from the deep-dive analysis we did on the new Patterns. If you are just here for a glimpse of your industry,73 our recommendation is to verify what the Top Patterns are in the At-a-Glance table accompanying each industry and then spend some time with those pattern sections.

  • We also provide a description of which CIS Controls® from Implementation Group 1 (IG1) to prioritize in each industry section for ease of reading in case you want to get straight to strategizing your security moves.

  • 73 We can’t blame you. Sometimes we eat the dessert first, too.

Let's get started.