Here is a quick summary of findings: 96% of incidents follow only 9 patterns. The top 3 threats are POS attacks, cyber-espionage and crimeware. Upwards of 4 out of 5 intrusions involve the use of stolen or easily-guessable credentials. Simple two-factor authentication significantly mitigates this risk. This year’s report also looks at mobility and the BYOD phenomenon.
See video: https://youtu.be/e8W8YJNhPSk
The full report can be accessed here: http://www.verizonenterprise.com/DBIR/2015/