Small Businesses Face Ransomware Reckoning
Verizon’s 2025 Data Breach Report (DBIR) highlights a dramatic rise in global cyberattacks. Among the 12,195 confirmed data breaches analyzed, small and medium-sized businesses (SMBs) bore the brunt, especially from ransomware attacks. A staggering 88% of SMB breaches involved ransomware. That is more than double the rate seen in larger organizations. SMBs remain soft targets due to weaker cybersecurity infrastructure. Verizon’s findings suggest that cybercriminals capitalize on these vulnerabilities to demand ransoms or steal sensitive data.
“The DBIR’s findings underscore the importance of a multi-layered defense strategy,” said Verizon’s Chris Novak. “Businesses need to invest in robust security measures, including strong password policies, timely patching of vulnerabilities, and comprehensive security awareness training for employees.”
The rise in ransomware comes despite a 23% drop in median ransom payments. Victim organizations are increasingly refusing to pay, with 64% not succumbing to demands, up from 50% two years ago.

Social Engineering and Human Error Remain Major Risks
The cybersecurity report reveals that the human element continues to play a significant role in security breaches. Around 60% of breaches involved human actions, from phishing to accidental errors.
Social engineering, particularly phishing, appears in 19% of breaches in the EMEA region. Internal actors were also responsible for 29% of EMEA breaches. While insiders shrank by 41% year over year, their actions still accounted for many incidents, mainly mistakes or misuse of privileges.
Sanjiv Gossain, Group Vice President at Verizon Business, emphasized, “The alarming rate of employee-driven breaches in EMEA underscores a critical need for businesses to strengthen their internal cybersecurity… through comprehensive employee training, robust access controls, and zero-trust frameworks.”
Third-Party and Supply Chain Risks on the Rise
Globally, third-party involvement in breaches doubled, affecting 30% of incidents. As businesses increasingly rely on partners, vendors, and software platforms, this trend highlights critical risks in supply chain cybersecurity.
Incidents such as the Snowflake credential breach showcase the real-world impact of insecure configurations, particularly those lacking multi-factor authentication.
The report urges organizations to include cybersecurity performance as a key criterion when selecting vendors. Vendor lottery breaches, where one supplier’s lapse affects multiple clients, are growing concerns.
Vulnerability Exploitation and Espionage Surge
Exploitation of vulnerabilities surged 34%, often involving edge devices and VPNs. These gaps in defenses provided entry points for attackers, especially in state-sponsored espionage campaigns.
Manufacturing industries saw espionage-related breaches jump from 3% to 20%. Healthcare and financial services also reported increases. Zero-day vulnerabilities are frequently used as launchpads for attacks.
Verizon Data Breach Report Key Takeaways and Recommendations
- SMBs need immediate attention. They suffer disproportionately from ransomware and must bolster their defenses with modern tools.
- Train employees. Human error remains a top vector. Awareness training can drastically reduce phishing and accidental breaches.
- Strengthen vendor vetting. Third-party risks are now as critical as internal risks. Implement risk assessments in procurement processes.
- Patch vulnerabilities quickly. Exploited weaknesses, particularly in edge devices, are leading entry points for breaches.
- Adopt zero-trust security models. With insider misuse and credential abuse on the rise, strict access controls are essential.
The Verizon data breach report is over 100 pages, so this summary is just that, and it focuses on the SMB elements. The industries touched on are noted below, and we added a bit more on these areas.
Industry-Specific Threat Trends from the 2025 DBIR
Retail Sector
Retailers experienced a 15% rise in cyber incidents compared to the previous year. The attacker’s focus has shifted a bit from payment card data to stealing customer credentials, business plans, and internal reports.
This indicates a strategic pivot in the behavior of cybercriminals. They are targeting data that can be resold or used for secondary breaches. Retailers need to improve identity management and customer data protection. They also need to segment systems and enhance cloud security to reduce the chances of a successful breach.
Manufacturing Sector
Manufacturing saw a sixfold increase in espionage-related breaches, jumping from 3% to 20% year over year. These attacks often exploit vulnerabilities to access proprietary designs, processes, or supply chain data. Nation-state actors are suspected to be behind many of these breaches. The report suggests manufacturers enhance network segmentation and monitor for unusual internal access patterns. Intellectual property protection has never been more critical.
Healthcare Sector
Healthcare organizations faced rising threats, particularly from espionage-motivated actors. Sensitive patient data and medical research make the industry a high-value target. Threats include ransomware, phishing, and exploitation of unpatched systems. Healthcare systems must adopt zero-trust architecture and implement frequent cybersecurity drills. Timely software updates and backup strategies are critical to resilience.
Education Sector
As we’ve reported recently, the education industry continues to battle persistent cyber threats. The open-access nature of academic institutions and limited cybersecurity funding make education a vulnerable target. Common attacks involve stolen credentials and social engineering. The report recommends stricter access control policies and routine cybersecurity awareness for students and staff. Investing in endpoint protection and monitoring is vital to minimize damage.
Finance and Insurance
Data is worth cash! These sectors remain prime targets because of that fact. Attackers use sophisticated phishing, credential abuse, and vulnerability exploitation to infiltrate systems. Third-party risk is especially significant, given the reliance on fintech and external platforms. The DBIR emphasizes due diligence on vendor cybersecurity posture and proactive threat detection. Strong encryption and user authentication protocols are key to reducing risks.
Other News: IBM 2025 Cybersecurity Report: Credential Theft Skyrockets(Opens in a new browser tab)