2021 Data Breach Outlook

“Under-attacked” Industries Feel the Heat

Kroll saw a 140% increase in data breach notification cases from 2019 to 2020.

Industries most impacted in 2019 continued to be hard hit in both 2020 and so far in 2021, including healthcare, education and financial services. However, the greatest percentage increases occurred in industries that had been generally spared in 2019. The overall implication is that data attacks became broader and deeper during the pandemic, a trend that continues during the recovery.

We attribute the rise in data breach notification cases to four trends: the shift to remote work, which has left employees and employers more vulnerable to cybercrime; the evolution of ransomware into data extortion schemes; the rising impact of supply chain attacks; and the combination of stricter privacy regulations with increased awareness of privacy rights. These drivers affect companies in all industries, even the ones that haven’t historically been targets of cyberattacks.

Here we look at drivers of cyberattacks in six of those industries: food and beverage, utilities, construction, entertainment, agriculture and recreation. We then describe actions companies can take to mitigate the risk of data breaches and prepare for a notifiable data breach incident that might occur.

More Industries Vulnerable to Data Breaches

In 2020, Kroll data shows an average 125% growth in breach notification cases for industries which experienced five or more breaches in 2019. We continue to see a surge in the same, moretraditional and regulated, group of industries as we move through 2021.

In contrast, the six other industries—food and beverage, utilities, construction, entertainment, agriculture and recreation—which experienced four or fewer breaches in 2019 according to Kroll data, experienced an average increase of 545% year-over-year (YoY) in 2020.  This increased volume of breaches in historically spared industries remains steady in Q1 2021.

 

“The trend Kroll has identified toward a rise in attacks on previously less targeted industries means that stepping up incident detection and response capabilities for those companies will be extremely important. This is an area where a modest amount of preparation often goes a very long way in avoiding or reducing significant impacts on the business.”– Luke Dembosky, Partner, Debevoise & Plimpton

 

Increases in Data Breaches Varied by Industry

Interestingly, some industries saw a massive increase in data breaches in 2020 as compared to 2019, such as food and beverage, which experienced a 1,300% increase, and construction with an 800% increase. These are eye-popping increases, but it is important to keep them in context. The hardest hit industries experienced many more data breaches than the six industries we are examining here. In 2020, for example, the average number of breaches experienced in historically hard-hit industries was 104, whereas the average number for the group of six historically less-targeted industries was 12.

The hardest hit and heavily-regulated industries—such as financial services and healthcare—are also some of the best prepared to handle data breaches. The historically less affected industries are also less prepared, so it is not surprising that during COVID-19 they would experience dramatic increases in data breaches YoY.

Data Breach Outlook 2021

Drivers of Data Breaches Across Industries

Kroll saw the following trends play out across industries during the pandemic:

The Shift to Remote Work Has Left Employees and Employers More Vulnerable to Cybercrime 

In most industries, there was an uptick in COVID-19-related "spearphishing" email messages, as well as an increase in malicious activity against platforms adopted for remote work, such as VPN software, remote access infrastructure and cloud solutions like Microsoft Office 365.

The Evolution of Ransomware into Data Extortion Schemes

The economic downturn has triggered an increase in ransomware attacks, which attempt to exfiltrate sensitive data for extortion, with threat actors even taking steps to contact journalists, clients and vendors to pressure victims into paying.

Rising Impact of Supply Chain Attacks

Cybercrime groups have demonstrated considerable operational maturity to not only develop a high rate of zero-day vulnerabilities but also to rapidly exploit security vulnerabilities before patches can be applied. In the last few months, we’ve seen significant impact from large file transfer repositories, email platforms and fundraising software providers that were exploited and the impacts reverberated across thousands of organizations using their solutions.

Stricter Privacy Regulations and Higher Awareness of Privacy Rights

Finally, companies are more likely to report breaches because they have learned—as a result of stricter privacy regulations and greater public awareness around privacy rights—that appropriate responses to data breaches can reduce fines and reputational damage.

Drivers of Data Breaches by Industry

Among these six industries that had the lowest number of data breach notifications in 2019—food and beverage, utilities, construction, entertainment, agriculture and recreation—we saw a 545% increase in notifications from 2019 to 2020. Here, we look closer at these industries to understand the causes of the increase.

Food and Beverage
The food and beverage industry saw a 1300% increase in data breaches in 2020 when compared to 2019, and as of April 2021 the volume of breaches has increased slightly. For example, a large U.S. restaurant chain experienced unauthorized access to their in-house devices and networks, requiring them to notify tens of thousands of customers.

To meet increased demand due to the pandemic, many companies in the food industry operated at full production and were often strained. More importantly, many companies moved to direct-to-consumer e-commerce, which meant collecting and using consumer and credit card data. E-commerce sites are an obvious target of cyberattacks and, according to International Lawyers Network, many in the food and beverage industry “are not sufficiently safeguarded.”

Utilities
The utilities industry saw 400% increase in data breaches in 2020 when compared to 2019, and as of April 2021 the number of breaches has already surpassed 2020 by 25%. For example, a U.S. electric utility company required notifications to be sent to thousands of customers due to an attack that exposed sensitive data in compromised systems.

Utility companies are vulnerable to cyber threats for three reasons, according to McKinsey: the rise in actors targeting utilities, including nation-states, cybercriminals and hacktivists; the “expansive and increasing attack surface, arising from their geographic and organizational complexity;” and the “unique interdependencies between physical and cyber infrastructure, which exposes companies to exploitation.”

According to the American Public Power Association, the COVID-19 pandemic was an opportune time for hackers to attack. A World Economic Forum study noted that “attackers will attempt to exploit the rush to remote systems, understaffed systems and new ways of working.” 

Construction
The construction industry saw an 800% increase in data breaches in 2020 when compared to 2019, and this increased volume has remained steady as of April 2021. In one instance, a large North American construction company had to notify hundreds of thousands of customers due to an incident involving a stolen laptop that resulted in unauthorized email access.

 

“Like many others, the construction sector prioritized business operations in the beginning of the pandemic and some of my clients struggled to scale remote access for staff and contractors, even having to limit who was able to log into the system at certain times of the day.”– Eoin Ó Murchú, Associate Director, Blackrock Expert Services Group, A Kroll Business

 

Construction and design firms have been innovators around remote work because of the geographical distribution of construction projects. However, when “office staffs started working overwhelmingly from home, security protocols lagged.” Every device, as well as wi-fi at field offices, home offices or coffee shops was an entry point to company data. Construction also calls for a high level of collaboration between firms, so firms are dependent on encryption and other protocols for all participants.

In addition, construction projects are vulnerable to IoT-specific threats. For example, hackers can gain access from wireless sensors deployed in remote locations, or through third-party vendors.

Entertainment
The entertainment industry saw a 33% increase in data breaches in 2020 when compared to 2019, and as of April 2021 the number of breaches has already equaled 2020. One example of this is from a global entertainment company that had to notify thousands of employees after a data security incident disrupted access to their corporate network and exposed personally identifiable information (PII).

High-value targets in the industry are small specialty post-production companies and visual effects (VFX) houses, which handle extremely valuable content. These “rarely have full-time IT staff, let alone in-house content security experts,” according to M&E Journal, whereas big motion picture studios are typically “well-funded and highly resourced.” Targeted attacks are being aimed at these more vulnerable yet highly valuable companies in the production chain.

Agriculture
The agriculture industry saw a 600% increase in data breaches in 2020 compared to 2019, and this increased volume has remained steady as of April 2021. Kroll saw a significant example of this when a large U.S. agricultural equipment distributor became aware of potential unauthorized access to its network, and they had to notify tens of thousands of customers.

Agriculture has gone through digital transformations like most other industries, only to find themselves on the defense. Technology such as mobile apps, smart sensors, cloud computing and drones all rely on the internet, which exposes them to a myriad of complex risks connected to APIs.

Recreation
The recreation industry saw a 200% increase in data breaches in 2020 when compared to 2019, and this increased volume has remained steady as of April 2021. An example of this growth came from a U.S. country club that had to notify thousands of members after their PII was exposed following a series of fraudulent attacks.

According to Villanova’s Center for the Study of Sports Law, there are three types of cyberattacks that sports organizations typically fall victim to: business email compromise (BEC), cyber-enabled fraud and ransomware. Seventy percent of British sports organizations have experienced at least one of these kinds of attacks.

Recommendations

Kroll sees a correlation between the growth in breaches impacting less typical industry targets and a key finding of our State of Incident Response 2021 report—that despite an understanding that data breaches happen and everyone is now a target, 43% of the organizations we interviewed, and more than half of the corporate counsel stakeholders specifically, still felt their organization lacked readiness to notify in the event of a breach.

Our hope is that by highlighting these facts, organizations may more acutely see the importance of solving that problem and having a plan. Given the significant growth in data breach notifications seen in 2020, we strongly recommend organizations take proactive steps to prepare for a notifiable data breach incident. In the long run, it’s likely to minimize regulatory and reputational impact, and may even reduce the impact of class actions.

To help you be better prepare for a breach event when it occurs, we offer the following five recommendations:

Negotiate and Retain Key Vendors to Assist During Incident Response. 

Avoid negotiating under the stress of a crisis. Find digital forensics, incident response, breach notification, crisis communication and outside counsel ahead of an incident. Make sure vendors are approved by your cyber insurance policy and able to cover all the regions globally where you have either customers, employees or other critical stakeholder data (it might be worth finding global partners).

Conduct Tabletop Exercises With Your Leadership and Incident Response Vendors So You Are Ready Together for the Inevitable. 

Most organizations now have an incident response plan (IRP), but when there’s a compromise, the IRP is dismissed, forgotten or not adequately followed. It’s imperative to conduct regular tabletop exercises with legal and security leadership as well as third-party vendors to build your incident response muscle and increase response speed. Tabletop exercises also help ensure that your vendors are really your partners, you know each other and can work together easily.

Provide Education, Training and Technical Support to Employees. 

Ensure that the same standards for data security are applied, regardless of location, by providing mobile workers with straightforward policies and procedures, ensuring security and authentication software is installed on mobile devices and kept up-to-date and offering adequate training and technical support for mobile workers.
Educate employees about appropriate handling and protection of sensitive data. The continuing saga of lost and stolen laptops containing critical information illustrates that corporate policy designed to safeguard portable data only works when employees follow the rules. 

Understand Where Data Lives in Your Organization So You Are Prepared to Not Only Secure and Defend It but Can Access It Quickly in Case It’s Compromised to Help Expedite Regulatory Notice. 

Several regulations, like GDPR in Europe and CCPA in the U.S., require organizations to conduct data mapping exercises. This will also help your organization better assess a data diet plan, reducing the number of places where you retain data and the amount of information collected.

Building Data Inventory – Fundamental Steps

Don't Rely on Encryption as Your Only Method of Defense.
Encrypting data in transit and at rest is a best practice, but, when used alone, it can give businesses a false sense of security. Although most state statutes require notification only if a breach compromises unencrypted personal information, hackers can and do break encryption codes.

 

Final Thoughts

The volume and sophistication of cyberattacks continues to increase, regardless of the regulatory scrutiny placed in any one industry.  With most organizations receiving more than 100 threat alerts every day and a reduction of endpoint visibility due to the shift to remote work, the ability to quickly detect and confidently respond to cyber threats has become a difficult challenge for organizations to undertake on their own.

Organizations are strongly encouraged to assess their incident response and breach notification capabilities and consider a 24x7 managed detection and response solution that can augment security capabilities ahead of an incident. Investments in detection and response capability deliver the biggest ROI in security as organizations can stop larger attacks before fully detonating and minimize business interruption.

2021 Data Breach Outlook – “Under-attacked” Industries Feel the Heat  2021-06-15T00:00:00.0000000 /en/insights/publications/cyber/data-breach-outlook-2021 /-/media/kroll/images/publications/featured-images/data-breach-outlook-2021.jpg publication {E39587AD-8F0B-4FE2-865F-969BC5501096} {911A8E3E-0E6C-4303-A7D0-63E02AA205CF} {CE589BFE-43ED-4214-8CBC-A96989570B0F} {63CEED55-AAEB-4157-A88B-E7546384CDBA} {CC2FB938-8E80-4FE9-A1DD-1982669CA95A} {83D036FB-4A57-4121-9B75-D26EC55E39EA} {7EC13A8A-F86F-4AEB-8B10-1EE5D7371F2D} {7A48DD95-1A63-4784-842F-A2BE81EAFE13} {2F9D4938-E5F0-4F9C-9A20-C4A5DCF79130}

Contact Us

Other Areas We Can Help

Cyber Risk

Cyber Risk

Global, end-to-end cyber risk solutions.

Cyber Risk
Notification, Call Centers and Monitoring

Identity Monitoring

Identity monitoring services that can detect more types of ID theft than credit monitoring alone.

Identity Monitoring
Notification, Call Centers and Monitoring

Credit Monitoring

Holistic solution for data loss events, including facilitating access to credit reports and credit monitoring.

Credit Monitoring
Notification, Call Centers and Monitoring

Identity Theft Restoration

Access to investigative experts for live support, best practice advice, and identity restoration.

Identity Theft Restoration
Kroll Responder

Kroll Responder

Mature your cyber security with unparalleled visibility and constant protection.

Kroll Responder
Kroll Nominated in Two Categories at the Advisen Cyber Risk Awards

Computer Forensics

Expert computer forensic assistance at any stage of a digital investigation or litigation.

Computer Forensics
Cyber Risk Retainers

Cyber Risk Retainers

Secure a true cyber risk retainer with elite digital forensics and incident response capabilities.

Cyber Risk Retainers

Insights

Compliance

Levelling the Playing Field: Innovation in the Service of Consumers and the Market

Compliance
Compliance

FCA and Bank of England Statement on LIBOR Transition

Compliance
Compliance

Firms Should Ensure That Permissions Are Reviewed Regularly

Compliance
Compliance

FCA Launches Consultation on Long-term Asset Fund (LTAF), Designed to Invest in Efficient Long-term Illiquid Assets, and Works on Liquidity Mismatch in Open-ended Property Funds

Compliance