19% of breaches involved internal actors, who caused both intentional and unintentional harm
74% of all breaches include the human element through error, privilege misuse, use of stolen credentials or social engineering
49% of breaches by external actors involved use of stolen credentials
5% of breaches are financially motivated, with roughly 5% being espionage
Web applications are the top type of asset targeted at roughly 60% followed by mail servers at 30%