{"id":18404,"date":"2021-06-05T14:57:41","date_gmt":"2021-06-05T14:57:41","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=18404"},"modified":"2025-04-25T12:35:55","modified_gmt":"2025-04-25T12:35:55","slug":"10-insights-on-verizon-2021-dbir","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/","title":{"rendered":"10 Insights on Verizon&#8217;s 2021 Data Breach Investigations Report (DBIR)"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">Social attacks as a pattern have continued to increase since 2017, with <a href=\"https:\/\/easydmarc.com\/blog\/business-email-compromise-bec-2021-cybersecurity-problem\/\">Business Email Compromise (BEC)<\/a> breaches doubling again since last year<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-large wp-image-18411\" src=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2020\/07\/Screen-Shot-2021-07-05-at-6.24.40-PM-1024x402.png\" alt=\"Summary of findings\" width=\"1024\" height=\"402\" srcset=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2020\/07\/Screen-Shot-2021-07-05-at-6.24.40-PM-1024x402.png 1024w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2020\/07\/Screen-Shot-2021-07-05-at-6.24.40-PM-300x118.png 300w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2020\/07\/Screen-Shot-2021-07-05-at-6.24.40-PM-768x301.png 768w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2020\/07\/Screen-Shot-2021-07-05-at-6.24.40-PM.png 1494w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>One of the most optimal approaches to deal with cybersecurity risks and breaches is to analyze all the latest hacking attempts and prepare your organization against such incidents. <\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The <a href=\"https:\/\/www.verizon.com\/business\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DBIR (Data Breach Investigation Report)<\/a> by Verizon reveals the attack methods used by hackers, the latest scam tactics, and malware incidents. The recent shift to WFH has escalated the hacking tactics to cause downtime or launch ransomware attacks on organizations.\u00a0<\/span><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Initiating the zero-trust approach is not enough to tackle ransomware attacks.<\/p>\n<\/blockquote>\n\n\n\n<p><span style=\"font-weight: 400;\">The DBIR and publishing actual attack details by different organizations can prepare us for future incidents. Spreading awareness and organizing training sessions with discussions of the latest phishing and <a href=\"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/\">social engineering attacks<\/a> can help reduce ransomware attacks. Analyzing attacks and sharing every minor detail of attacks or outages is an unplanned investment resulting in better risk mitigation and minimization. Here are some interesting insights on Verizon&#8217;s 2021 DBIR to put the organization on the right track.<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">After DOS, social engineering tactics followed an alarming rate of social attacks and credential theft (61%).<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">The default, stolen, or vulnerable credentials targeted in the web application layer exploited customer profiles and led to security breaches of cloud and web applications.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">This DBIR highlights humans as the weakest and most vulnerable link for the occurrence of security breaches at the rate of almost 85%. Phishing was present in 36% of breaches, up from 25% last year. Business Email Compromise (BEC) was the second-most common form of Social Engineering. This reflects the rise of Misrepresentation, which was 15 times higher than last year.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Financially motivated attacks involved basic web application attacks, system intrusion, social engineering, and DOS.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Compared to previous years, an increase of 26% was observed in the malware attacks with the latest hacking tactics involving social and physical environments.&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Misuse of actions also increased this year due to the initiation of social engineering tactics where users exploit their legitimate access to launch cyber attacks. The intentions behind the misuse of actions are financial benefits or revenge games.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Insufficient training and\/or the lack of security workshops or awareness sessions for employees directly correlates to the level of employee vulnerability to mistakes and errors. This empowers hackers.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">The attack vectors in breaches mentioned this year are web applications<\/span>, VPN,<span style=\"font-weight: 400;\"> and desktop sharing.&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Out of all the assets in an organization,<\/span> such as networks, media,<span style=\"font-weight: 400;\"> and employees, web servers are targeted most by hackers.&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">With the WFH shift employees made, user and personal devices became the most breached assets, while web servers immediately followed. These breaches mostly occurred due to business email compromises, clicking on spam links, or social engineering attacks.<\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">The DBIR highlights the misconfigured clouds and vulnerabilities in web applications, increased DOS, and web server downtime. An unexpected increase in privilege misuse was up 98%, and cyber espionage is up 66%.&nbsp;<\/span><\/p>\n\n\n\n<p><b><i>In your estimation, what makes your organization the least prepared if a cyber-attack occurred?<\/i><\/b><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Not having enough knowledge and updates on top vulnerabilities&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Less in-house expertise to launch a remedy against cyberattacks<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Insufficient details of critical data and assets to prioritize when under attack<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Inefficient vulnerability assessment and penetration testing tools<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Social attacks as a pattern have continued to &#8230;<\/p>\n","protected":false},"author":1,"featured_media":32072,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,201],"tags":[],"class_list":["post-18404","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-thought-leadership"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>10 Insights from the Verizon 2021 DBIR Report | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Interesting insights on the Verizon Data Breach Investigations Report 2021 to put the organization on the right track of cyber hygiene.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Insights on Verizon&#039;s 2021 Data Breach Investigations Report (DBIR)\" \/>\n<meta property=\"og:description\" content=\"Interesting insights on the Verizon Data Breach Investigations Report 2021 to put the organization on the right track of cyber hygiene.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-05T14:57:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T12:35:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/06\/10-Insights-on-Verizons-2021-Data-Breach-Investigations-Report-DBIR-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"10 Insights on Verizon&#8217;s 2021 Data Breach Investigations Report (DBIR)\",\"datePublished\":\"2021-06-05T14:57:41+00:00\",\"dateModified\":\"2025-04-25T12:35:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/\"},\"wordCount\":546,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/10-Insights-on-Verizons-2021-Data-Breach-Investigations-Report-DBIR-1.jpg\",\"articleSection\":[\"Blog\",\"Thought Leadership\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/\",\"name\":\"10 Insights from the Verizon 2021 DBIR Report | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/10-Insights-on-Verizons-2021-Data-Breach-Investigations-Report-DBIR-1.jpg\",\"datePublished\":\"2021-06-05T14:57:41+00:00\",\"dateModified\":\"2025-04-25T12:35:55+00:00\",\"description\":\"Interesting insights on the Verizon Data Breach Investigations Report 2021 to put the organization on the right track of cyber hygiene.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/10-Insights-on-Verizons-2021-Data-Breach-Investigations-Report-DBIR-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/10-Insights-on-Verizons-2021-Data-Breach-Investigations-Report-DBIR-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"10 Insights on Verizons 2021 Data Breach Investigations Report DBIR 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/10-insights-on-verizon-2021-dbir\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Thought Leadership\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/thought-leadership\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"10 Insights on Verizon&#8217;s 2021 Data Breach Investigations Report (DBIR)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"10 Insights from the Verizon 2021 DBIR Report | EasyDMARC","description":"Interesting insights on the Verizon Data Breach Investigations Report 2021 to put the organization on the right track of cyber hygiene.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/","og_locale":"en_US","og_type":"article","og_title":"10 Insights on Verizon's 2021 Data Breach Investigations Report (DBIR)","og_description":"Interesting insights on the Verizon Data Breach Investigations Report 2021 to put the organization on the right track of cyber hygiene.","og_url":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2021-06-05T14:57:41+00:00","article_modified_time":"2025-04-25T12:35:55+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/06\/10-Insights-on-Verizons-2021-Data-Breach-Investigations-Report-DBIR-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"10 Insights on Verizon&#8217;s 2021 Data Breach Investigations Report (DBIR)","datePublished":"2021-06-05T14:57:41+00:00","dateModified":"2025-04-25T12:35:55+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/"},"wordCount":546,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/06\/10-Insights-on-Verizons-2021-Data-Breach-Investigations-Report-DBIR-1.jpg","articleSection":["Blog","Thought Leadership"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/","url":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/","name":"10 Insights from the Verizon 2021 DBIR Report | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/06\/10-Insights-on-Verizons-2021-Data-Breach-Investigations-Report-DBIR-1.jpg","datePublished":"2021-06-05T14:57:41+00:00","dateModified":"2025-04-25T12:35:55+00:00","description":"Interesting insights on the Verizon Data Breach Investigations Report 2021 to put the organization on the right track of cyber hygiene.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/06\/10-Insights-on-Verizons-2021-Data-Breach-Investigations-Report-DBIR-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/06\/10-Insights-on-Verizons-2021-Data-Breach-Investigations-Report-DBIR-1.jpg","width":1440,"height":910,"caption":"10 Insights on Verizons 2021 Data Breach Investigations Report DBIR 1"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Thought Leadership","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/thought-leadership\/"},{"@type":"ListItem","position":4,"name":"10 Insights on Verizon&#8217;s 2021 Data Breach Investigations Report (DBIR)"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/06\/10-Insights-on-Verizons-2021-Data-Breach-Investigations-Report-DBIR-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=18404"}],"version-history":[{"count":3,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18404\/revisions"}],"predecessor-version":[{"id":46330,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18404\/revisions\/46330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/32072"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=18404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=18404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=18404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}