The 2026 Verizon Data Breach Investigations Report dropped this week. Verizon analyzed over 22,000 incidents and 12,195 confirmed breaches. That's the largest dataset in DBIR history.

The short version: most breaches are still preventable. The hard part is consistent execution.

Here's what the data actually shows.

The Human Element Still Runs the Table

Phishing, stolen credentials, and social engineering drove more than 60% of confirmed breaches. Eight percent of employees accounted for 80% of incidents. That's not evenly distributed risk. It concentrates in a small number of accounts and behaviors.

Business Email Compromise losses hit $6.3 billion this year. The median BEC incident cost $50,000. That number doesn't take down an enterprise, but it lands hard on a 60-person firm in North Jersey.

The fix for the human element isn't a new tool. It's consistent security awareness training, monitored accounts, and a real response process when something looks wrong. Those aren't things you configure once and walk away from.

Vulnerability Exploitation Jumped 34 Percent

This is the number that deserves more attention. Vulnerability exploitation climbed 34% in the 2026 report, making it the second most common initial attack vector. Edge device targeting jumped eightfold year over year.

For critical vulnerabilities affecting VPNs and perimeter devices, the median time from public disclosure to mass exploitation was zero days. Not three weeks. Not "we'll catch it next Patch Tuesday." Zero.

That's not hypothetical. In April, a Windows Defender privilege escalation flaw called BlueHammer (CVE-2026-33825) went from a published proof-of-concept exploit to active in-the-wild attacks in under three days. Microsoft patched it on April 14. CISA added it to its Known Exploited Vulnerabilities catalog and set a May 7 deadline for federal agencies.

Two companion vulnerabilities from the same disclosure, RedSun and UnDefend, remain unpatched as of this writing.

The question for a growing business isn't whether to patch. It's who is actually watching the CISA KEV catalog, and how fast do your systems get updated when something like BlueHammer surfaces?

Third-Party Risk Doubled Year Over Year

Third-party involvement in breaches jumped from 15% to 30%. Software supply chain compromises, service providers with excessive access, vendor credentials that outlasted the actual vendor relationship.

This one is easy to overlook because the instinct is to focus inward. Lock down the endpoints. Train the staff. Deploy MFA. But if a vendor or a software provider is compromised, every business that relies on them is in scope.

Knowing what third parties have access to your environment, and actually revoking that access when those relationships change, is the kind of work that gets skipped when nobody owns it.

The GenAI Shadow Nobody's Counting

The 2026 DBIR includes a finding that hasn't gotten much coverage. Fourteen percent of employees are using generative AI tools on corporate devices. Seventy-two percent of those users are accessing them with personal email accounts or without any authenticated company system in place.

Data walks out through unmonitored AI sessions constantly. The tools themselves aren't the problem. The shadow deployment pattern is. If you want more on where AI actually fits into business operations, there's a related post on what to automate first with AI in your business.

The Pattern That Shows Up Every Year

The DBIR comes out annually and confirms the same root causes every time. Credential theft. Phishing. Unpatched systems. Third-party risk. The specific ransomware groups change. The underlying patterns don't.

That's not an indictment of the businesses getting hit. It's a structural problem. Keeping up with vulnerability disclosures, monitoring the CISA KEV feed, pushing patches before the window closes, tracking who has access to what, training employees on phishing that looks more convincing every year. That's a lot of work to run consistently.

The businesses that stay out of next year's breach report tend to share one thing. Someone is watching. When something breaks or spikes or triggers an alert, there's a response. The basics are running in the background without anyone needing to remember to run them.

That's what managed IT services actually deliver. Not tools. Execution.

Frequently Asked Questions

What is the Verizon DBIR? The Verizon Data Breach Investigations Report is an annual analysis of tens of thousands of cybersecurity incidents and confirmed breaches. The 2026 edition covers incidents from November 2024 through October 2025 and analyzed over 22,000 incidents and 12,195 confirmed breaches.

What was the BlueHammer vulnerability? BlueHammer (CVE-2026-33825) is a Windows Defender zero-day that lets an attacker with local access escalate to SYSTEM-level privileges. Microsoft patched it in the April 2026 Patch Tuesday update. CISA added it to its Known Exploited Vulnerabilities catalog with a May 7 patch deadline for federal agencies. Businesses that applied the April update are covered.

How quickly are attackers exploiting new vulnerabilities in 2026? Fast. For critical vulnerabilities affecting edge devices, the 2026 DBIR found the median time between public disclosure and mass exploitation was zero days. The assumption that businesses have weeks to respond to new vulnerability disclosures no longer holds.

What does the 2026 DBIR say about phishing and credential theft? The human element was involved in more than 60% of confirmed breaches. Phishing and stolen credentials are the leading initial access methods. Business Email Compromise alone accounted for $6.3 billion in losses, with a median incident cost of $50,000.

What is the CISA Known Exploited Vulnerabilities catalog? CISA's KEV catalog lists vulnerabilities confirmed to be actively exploited in real attacks. While the patch deadlines apply to federal agencies, the catalog is a valuable early warning signal for any business running affected software. Monitoring it, or having someone monitor it on your behalf, gives early warning of what attackers are actively using against live systems.

Wondering where your business stands on patching, credential monitoring, or shadow AI? Reach out and let's take a look.