{"id":93594,"date":"2024-11-24T11:31:11","date_gmt":"2024-11-24T03:31:11","guid":{"rendered":"https:\/\/version-2.com\/?p=93594"},"modified":"2024-11-20T16:45:26","modified_gmt":"2024-11-20T08:45:26","slug":"data-breach-trends-report-2024","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/11\/data-breach-trends-report-2024\/","title":{"rendered":"Data Breach Trends Report 2024"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"93594\" class=\"elementor elementor-93594\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8860882c59\/data-breach-trends-report-2024-1062x597.png\/m\/1080x0\/filters:quality(60):format(avif)\" width=\"1080\" height=\"607\" \/><\/p><div><div class=\"my-3 PostContent_excerpt__wB2qU\"><p class=\"body-lg-medium text-neutral-1000\"><span style=\"color: #000000;\">When you learn how cybercriminals choose their targets and break in, you also learn how to prevent a data breach in your company.\u00a0<\/span><\/p><\/div><div class=\"PostContent_content__eM_tn text-primary break-words\" data-content-type-blog=\"true\"><section class=\"my-3\"><div class=\"Article_wrapper__8_7eU [&amp;&gt;&lt;p&gt;*+*]:mt-12\"><div class=\"richtext\"><p class=\"body-md\"><span style=\"color: #000000;\">To give you a clearer view of attackers&#8217; tactics, we partnered with NordStellar and analyzed nearly <\/span><b><span style=\"color: #000000;\">2,000 data breach incidents<\/span><\/b><span style=\"color: #000000;\"> that occurred<\/span><b><span style=\"color: #000000;\"> between<\/span><\/b> <b><span style=\"color: #000000;\">August 31, 2022, and September 1, 2024<\/span><\/b><span style=\"color: #000000;\">.<\/span><\/p><p class=\"body-md\"><span style=\"color: #000000;\">Our report reveals trends that highlight which types of companies and industries face the highest risks, offering crucial insights for improving your business&#8217;s cybersecurity strategy.<\/span><\/p><p class=\"body-md\"><b><span style=\"color: #000000;\">Key findings from our report:<\/span><\/b><\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\"><span style=\"color: #000000;\">Retail, tech, and business services were the 3 most targeted industries.<\/span><\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\"><span style=\"color: #000000;\">85% of businesses that suffered from a breach were private companies.<\/span><\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\"><span style=\"color: #000000;\">72% of the targeted companies were small and medium-sized businesses.<\/span><\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\"><span style=\"color: #000000;\">The countries with the most breached companies were the United States, India, and the United Kingdom.<\/span><\/p><\/li><\/ul><p class=\"body-md\"><span style=\"color: #000000;\">Continue scrolling through this space to discover more detailed insights from our study. Here\u2019s what we found:<\/span><\/p><\/div><div class=\"richtext\"><h3 class=\"heading-lg\"><b>The 3 most targeted industries were retail, tech, and business services<\/b><\/h3><p class=\"body-md\">While no industry is immune to data breaches, some tend to attract more attention from cyberattackers. Retail, tech, and business services rank at the top of the list, but it\u2019s not just these sectors being targeted; other industries face significant threats as well.<\/p><p class=\"body-md\">Here\u2019s a rundown of the <b>top 10 most targeted industries<\/b>:<\/p><ol class=\"leading-normal List_list__BljM0 List_ol__Aykkt\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Retail (95 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Tech (56 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Business services (51 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Internet and web services (36 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">IT services and IT consulting (35 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Entertainment (34 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Education (28 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Finance (27 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Software development (26 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Computer hardware development (22 incidents)<\/p><\/li><\/ol><\/div><p><img decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/844d9e6661\/no-1-746x300.png\/m\/1080x0\/filters:quality(60):format(avif)\" width=\"1080\" height=\"434\" \/><\/p><div class=\"richtext\"><h3 class=\"heading-lg\"><b>Private companies make up 85% of all breached organizations<\/b><\/h3><p class=\"body-md\">Just as no industry is safe from breaches, every type of company is also at risk. However, data indicates that private companies are targeted significantly more often. Out of almost 2,000 data breach incidents we analyzed, approximately 1,600 involved private organizations\u2014a considerable proportion.<\/p><p class=\"body-md\">Other types of businesses should not be complacent, though, as they, too, are vulnerable to potential attacks.<\/p><\/div><p><img decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x712\/1f3805a72f\/no-3-746x300.png\/m\/1080x0\/filters:quality(60):format(avif)\" width=\"1080\" height=\"515\" \/><\/p><div class=\"richtext\"><h3 class=\"heading-lg\"><b>74% of the targeted companies were small and medium-sized businesses<\/b><\/h3><p class=\"body-md\">Once we compared the sizes of companies targeted by cybercriminals over the past 2 years, we found that businesses with up to 200 employees were more often in the line of fire. Possible reason? Smaller companies typically don\u2019t have the same level of protection as larger enterprises, making them easier targets.<\/p><p class=\"body-md\">This doesn\u2019t mean, however, that the big players are off the hook. In fact, when larger companies do experience breaches, the financial impact can be much bigger, and the number of people affected is often much greater.<\/p><\/div><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x713\/f3c437cc7d\/no-2-746x300.png\/m\/1080x0\/filters:quality(60):format(avif)\" width=\"1080\" height=\"516\" \/><\/p><div class=\"richtext\"><h3 class=\"heading-lg\"><b>The United States, India, and the United Kingdom had the highest number of breached companies<\/b><\/h3><p class=\"body-md\">When we examined the locations of data breaches, we found that the majority of incidents occurred in the United States. In fact, the US experienced over 4 times as many breaches as India, which ranked second. This highlights the significant scale of the problem in North America.<\/p><p class=\"body-md\">Still, it\u2019s worth noting that breaches aren\u2019t confined to just 2 or 3 countries\u2014they\u2019re happening all over the globe. So, there\u2019s really no corner of the world where companies can feel completely safe from these threats.<\/p><p class=\"body-md\">Here\u2019s a list of the <b>top 10 countries<\/b> with the most data breaches:<\/p><ol class=\"leading-normal List_list__BljM0 List_ol__Aykkt\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">The United States (489 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">India (114 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">The United Kingdom (73 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Spain (43 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">France (39 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Canada (37 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Brazil (26 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Russia (26 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Indonesia (23 incidents)<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Australia (20 incidents)<\/p><\/li><\/ol><\/div><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x601\/93c6405970\/no-4-746x300.png\/m\/1080x0\/filters:quality(60):format(avif)\" width=\"1080\" height=\"435\" \/><\/p><div class=\"richtext\"><h3 class=\"heading-lg\"><b>What\u2019s the real cost of a data breach?<\/b><\/h3><p class=\"body-md\">We all know that data breaches can lead to dire consequences for companies, especially when it comes to their finances. Many of you might have read IBM&#8217;s <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/securityintelligence.com\/articles\/cost-of-a-data-breach-2024-financial-industry\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/securityintelligence.com\/articles\/cost-of-a-data-breach-2024-financial-industry\/\" data-link-full-refresh=\"true\"><u>report<\/u><\/a> showing that <b>the average cost of a data breach in 2024 is nearly $5 million<\/b>. That\u2019s a staggering figure and a big reason why many businesses invest in cybersecurity tools and adopt strict practices to minimize the risk of a breach.<\/p><p class=\"body-md\">But the impact of a data breach isn\u2019t just about money\u2014it can also take a toll on a company\u2019s reputation. Once a breach occurs, clients might lose trust, questioning whether the company handled their data responsibly, or even deciding it\u2019s not worth doing business with them anymore. This is why organizations must do everything they can to protect both their data and their customers&#8217; information.<\/p><h3 class=\"heading-lg\"><b>How you can protect your business from breaches<\/b><\/h3><p class=\"body-md\">The first step to solving any problem is admitting there is one. In the world of data security, this means being aware of the threats your business might face. Spreading that awareness throughout your organization is crucial\u2014when everyone knows what to look out for, it enhances their vigilance.<\/p><p class=\"body-md\">That being said, awareness alone isn\u2019t enough to keep cybercriminals at bay. What you need are robust cybersecurity tools that will help you monitor the situation and be proactive about your company\u2019s security. One such tool is <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/business-password-manager\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to \/business-password-manager\"><u>NordPass<\/u><\/a>.<\/p><p class=\"body-md\">While it\u2019s primarily known as an encrypted password manager, NordPass is also a comprehensive business security solution equipped with a wide range of features to help protect your organization from data breaches. One standout feature is the free <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/dark-web-monitoring\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to \/dark-web-monitoring\"><b><u>Dark Web Monitor<\/u><\/b><\/a><b>,<\/b> which allows you to continuously scan the dark web for any mentions of your company data. Additionally, NordPass can be used as an access management tool, giving you control over who can access specific resources and ensuring that only authorized personnel can get into sensitive files.<\/p><h4 class=\"heading-md\"><b>Methodology<\/b><\/h4><p class=\"body-md\">This study was carried out in collaboration with NordStellar, which specializes in researching cybersecurity incidents. The data was analyzed based on factors such as country, industry, business type, company size, and the types of data involved. The study focuses on breaches that occurred between August 31, 2022, and September 1, 2024.<\/p><\/div><\/div><\/section><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>When you learn how cybercriminals choose their targets  [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,973,1129,61],"tags":[1272,974,1131],"class_list":["post-93594","post","type-post","status-publish","format-standard","hentry","category-1273","category-nord-security","category-nordpass","category-press-release","tag-1272","tag-nord-security","tag-nordpass"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Breach Trends Report 2024 - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/data-breach-report-2024\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Breach Trends Report 2024 - Version 2\" \/>\n<meta property=\"og:description\" content=\"When you learn how cybercriminals choose their targets [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/data-breach-report-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-24T03:31:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8860882c59\/data-breach-trends-report-2024-1062x597.png\/m\/1080x0\/filters:quality(60):format(avif)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/data-breach-report-2024\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/data-breach-trends-report-2024\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Data Breach Trends Report 2024\",\"datePublished\":\"2024-11-24T03:31:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/data-breach-trends-report-2024\\\/\"},\"wordCount\":926,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/data-breach-report-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/8860882c59\\\/data-breach-trends-report-2024-1062x597.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"keywords\":[\"2024\",\"Nord Security\",\"NordPass\"],\"articleSection\":[\"2024\",\"Nord Security\",\"NordPass\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/data-breach-trends-report-2024\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/data-breach-report-2024\\\/\",\"name\":\"Data Breach Trends Report 2024 - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/data-breach-report-2024\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/data-breach-report-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/8860882c59\\\/data-breach-trends-report-2024-1062x597.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"datePublished\":\"2024-11-24T03:31:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/data-breach-report-2024\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/data-breach-report-2024\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/data-breach-report-2024\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/8860882c59\\\/data-breach-trends-report-2024-1062x597.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/8860882c59\\\/data-breach-trends-report-2024-1062x597.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/data-breach-report-2024\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Breach Trends Report 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Breach Trends Report 2024 - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/data-breach-report-2024\/","og_locale":"zh_HK","og_type":"article","og_title":"Data Breach Trends Report 2024 - Version 2","og_description":"When you learn how cybercriminals choose their targets [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/data-breach-report-2024\/","og_site_name":"Version 2","article_published_time":"2024-11-24T03:31:11+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8860882c59\/data-breach-trends-report-2024-1062x597.png\/m\/1080x0\/filters:quality(60):format(avif)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"6 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/data-breach-report-2024\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/11\/data-breach-trends-report-2024\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Data Breach Trends Report 2024","datePublished":"2024-11-24T03:31:11+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/11\/data-breach-trends-report-2024\/"},"wordCount":926,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/data-breach-report-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8860882c59\/data-breach-trends-report-2024-1062x597.png\/m\/1080x0\/filters:quality(60):format(avif)","keywords":["2024","Nord Security","NordPass"],"articleSection":["2024","Nord Security","NordPass","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/11\/data-breach-trends-report-2024\/","url":"https:\/\/nordpass.com\/blog\/data-breach-report-2024\/","name":"Data Breach Trends Report 2024 - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/data-breach-report-2024\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/data-breach-report-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8860882c59\/data-breach-trends-report-2024-1062x597.png\/m\/1080x0\/filters:quality(60):format(avif)","datePublished":"2024-11-24T03:31:11+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/data-breach-report-2024\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/data-breach-report-2024\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordpass.com\/blog\/data-breach-report-2024\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8860882c59\/data-breach-trends-report-2024-1062x597.png\/m\/1080x0\/filters:quality(60):format(avif)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8860882c59\/data-breach-trends-report-2024-1062x597.png\/m\/1080x0\/filters:quality(60):format(avif)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/data-breach-report-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Data Breach Trends Report 2024"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-olA","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=93594"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93594\/revisions"}],"predecessor-version":[{"id":97651,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93594\/revisions\/97651"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=93594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=93594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=93594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}