{"id":46127,"date":"2022-04-08T20:00:08","date_gmt":"2022-04-08T20:00:08","guid":{"rendered":"https:\/\/www.darkreading.com\/attacks-breaches\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance"},"modified":"2022-04-08T20:00:08","modified_gmt":"2022-04-08T20:00:08","slug":"bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/","title":{"rendered":"BakerHostetler Launches 2022 Data Security Incident Response Report \u2014 Resilience And Perseverance"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong>WASHINGTON \u2014 April 7, 2022<\/strong><\/p>\n<p><strong>Key takeaways<\/strong><\/p>\n<ul>\n<li>Ransomware remained the most prevalent and impactful type of data security incident. Investments in security enhancements and business continuity practices are making companies more resilient and less likely to choose to pay, driving down the average ransom payment amount. Threat actors continue to evolve tactics to increase extortion leverage, such as using publication countdown timers and contacting employees and customers directly to pressure the company to pay.<\/li>\n<li>The pandemic, technology strategy and business continuity advantages are driving increased use of cloud assets, which also changes the risk landscape and makes additional security measures, like asset management and access controls, increasingly important.<\/li>\n<li>E-crime continued, including a surge of wire fraud precipitated by gaining access to email accounts. There are concerns about e-crime actors supporting state entities as a result of the Russia\/Ukraine war.<\/li>\n<\/ul>\n<p><strong>Why this matters<\/strong>\n<\/p>\n<p>The 2022 <a href=\"https:\/\/e.bakerlaw.com\/s\/4526dbb7403977f0574eb29abf597293645d316e\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/e.bakerlaw.com\/s\/4526dbb7403977f0574eb29abf597293645d316e&amp;source=gmail&amp;ust=1649534073341000&amp;usg=AOvVaw1cVbwz045m63r69B3NrrPd\" rel=\"noopener\">Data Security Incident Response Report<\/a> marks the eighth year that <a href=\"https:\/\/www.bakerlaw.com\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.bakerlaw.com\/&amp;source=gmail&amp;ust=1649534073341000&amp;usg=AOvVaw0t-cX38Sssx2bLF6vhk5IU\" rel=\"noopener\">BakerHostetler<\/a> has analyzed the data from incidents it managed in the prior year. The 2022 DSIR features insights and metrics from more than 1,270 incidents that members of the firm\u2019s <a href=\"https:\/\/www.bakerlaw.com\/DigitalAssetsDataManagement\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.bakerlaw.com\/DigitalAssetsDataManagement&amp;source=gmail&amp;ust=1649534073341000&amp;usg=AOvVaw1YqQ7KrpWQ4GVbvXa-32pm\" rel=\"noopener\">Digital Assets and Data Management Practice Group<\/a> helped clients manage in 2021. This one-of-a-kind report is a mix of aggregated data from security incidents and insights from its full suite of advisory services to clients across the entire data and technology life cycle.<\/p>\n<p>The inside cover features 19 key findings covered more in depth throughout the report, and then it is followed by a dashboard style \u201cAt a Glance\u201d section, with 39 key incident response data points. Recurring sections from past years \u2014 on industries affected, incident response life cycle timeline, forensics, the number of incidents that resulted in regulatory investigations and litigation, ransomware, and health care deep dives \u2014 include a trove of data and analysis to help readers track substantial changes and enhance their cybersecurity posture. The DSIR also includes checklists and industry updates to help companies improve their security measures and operational resilience.<\/p>\n<p><strong>Key quote<\/strong><\/p>\n<p>\u201cImplementing effective security measures is a challenge because the risk landscape is dynamic. Companies need to have one eye trained on threat intelligence while having another eye on execution and implementation. The data we collect from the thousands of incidents we have helped manage over the years enables clients to prioritize limited time, money and resources. A company that is nimble in its security strategy is likely more resilient and better positioned to leverage the value of technology to support organizational goals and missions,\u201d said <a href=\"https:\/\/www.bakerlaw.com\/TheodoreJKobusIII\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.bakerlaw.com\/TheodoreJKobusIII&amp;source=gmail&amp;ust=1649534073341000&amp;usg=AOvVaw3u0IihAVmnvkd09g3RA3l4\" rel=\"noopener\">Theodore J. Kobus III<\/a>, chair of BakerHostetler\u2019s DADM Practice Group.<\/p>\n<p><strong>Ransomware is front and center \u2014 for criminals and victims<\/strong><\/p>\n<p>Continued ransomware attacks and several high-profile incidents have drawn increased attention to the issue from government entities and regulators, as well as the victims.<\/p>\n<ul>\n<li>Ransomware accounted for 37% of 2021 matters, compared to 27% in 2020.<\/li>\n<li>Attackers are resorting to double or triple extortion tactics. In an effort to increase pressure on organizations to pay a ransom, ransomware groups \u2014 in addition to encrypting files to cause an outage \u2014 threaten to publish stolen data and add other tactics such as distributed denial of service attacks to further disrupt operations.<\/li>\n<li>In 2021 ransomware matters, threat actors claimed to have stolen data 82% of the time. This is compared to 70% of the time in 2020, a continuation of a trend that first emerged late that year.<\/li>\n<li>The average ransom paid decreased to $511,957, roughly a 30% reduction from the average amount paid in 2020; this was the first drop after years of increases. Organizations took longer to pay, paying after eight days (median) compared with five days in 2020. This mostly reflects better business continuity practices; organizations were more often able to restore from backups and were paying to prevent publication so negotiations can be stretched out.<\/li>\n<\/ul>\n<p><strong>Key quote<\/strong>\n<\/p>\n<p>\u201cA key difference between organizations that had meaningful ransomware events and those that did not was the use of a fully deployed endpoint detection and response tool that was set in enforcement mode with the anti-uninstall feature enabled. Organizations that were affected by a ransomware attack in 2021 were more likely to have effective backups to restore from. Ransomware attacks are not going away. In addition to an EDR tool and a robust business continuity plan, effective measures to combat this risk include multi-factor authentication, effective patch management and addressing remote desktop protocol,\u201d said <a href=\"https:\/\/www.bakerlaw.com\/CraigAHoffman\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.bakerlaw.com\/CraigAHoffman&amp;source=gmail&amp;ust=1649534073341000&amp;usg=AOvVaw0f_fqkUfc-V3XN10J425vN\" rel=\"noopener\">Craig Hoffman<\/a>, co-leader of BakerHostetler\u2019s national <a href=\"https:\/\/www.bakerlaw.com\/DigitalRiskAdvisoryCybersecurity\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.bakerlaw.com\/DigitalRiskAdvisoryCybersecurity&amp;source=gmail&amp;ust=1649534073341000&amp;usg=AOvVaw0LavpmjZdaVB3CmPpCxGCD\" rel=\"noopener\">Digital Risk Advisory and Cybersecurity<\/a> team. \u201cThese measures apply to both the organization and its vendors.\u201d<\/p>\n<p><strong>Litigation on the rise, particularly for smaller incidents<\/strong><\/p>\n<p>In 2021, multiple lawsuits were filed in the same venue within weeks following incident notification, even for smaller events. There have also been handfuls of related cases filed in one federal forum and another handful of related cases filed in state venues. This duplicative litigation trend is increasing the initial defense costs and the ultimate cost of settlement because of the number of plaintiffs\u2019 attorneys involved.<\/p>\n<ul>\n<li>Of the incidents included in the 2022 report, 23 resulted in one or more lawsuits.<\/li>\n<li>Nineteen incidents involved Social Security numbers, five involved payment card data, three started with system misconfiguration, 16 involved medical\/health information, 15 involved ransomware and four were vendor related.<\/li>\n<li>Number of lawsuits filed by individuals notified: More than 1.2 million individuals \u2014 eight lawsuits; fewer than 700,000 individuals \u2014 eleven lawsuits; fewer than 8,000 individuals \u2014 three lawsuits.<\/li>\n<li>58+ lawsuits were filed related to the 23 incidents. Eight incidents had more than one (but less than five) lawsuits filed\u2014four incidents had five or more lawsuits filed\u2014and 43 of the 58+ lawsuits were against a healthcare organization.<\/li>\n<\/ul>\n<p><strong>Fraudulent fund transfer incidents persist<\/strong>\n<\/p>\n<p>Business email compromises, or BECs \u2014 phishing and social engineering attacks leading to unauthorized access to email accounts that are then used to trick organizations into wiring money to a threat actor-controlled bank account because they believe they are sending the money to the correct account \u2014 have been around for years. The prevalence slowed at the start of the pandemic and then surged in 2021.<\/p>\n<ul>\n<li>We saw an increase in the number of BECs that resulted in the organization having to provide notification of the incident to individuals\/regulatory agencies \u2014 60% of the time, up from 43% in 2020.<\/li>\n<li>The recovery rate increased in 2021. Funds involved in fraudulent fund transfer schemes last year were recovered 43% of the time, up from the 38% recovery rate BakerHostetler saw in 2020. There is a very effective unit of the Secret Service that works on recovery of funds.<\/li>\n<\/ul>\n<p>BakerHostetler\u2019s DADM Practice Group is a convergence practice addressing enterprise risks, disputes, compliance and opportunities throughout the life cycle of data, technology, advertising and innovation, including brand strategies and monetization. The practice group integrates seven service teams \u2014 digital risk advisory and cybersecurity; advertising, marketing and digital media; privacy governance and technology transactions; health care privacy and compliance; privacy and digital risk class action and litigation; digital transformation and data economy; and emerging technology.\n<\/p>\n<p>For more information on BakerHostetler\u2019s DADM Practice Group, visit <a href=\"https:\/\/www.bakerlaw.com\/DigitalAssetsDataManagement\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.bakerlaw.com\/DigitalAssetsDataManagement&amp;source=gmail&amp;ust=1649534073341000&amp;usg=AOvVaw1YqQ7KrpWQ4GVbvXa-32pm\" rel=\"noopener\">https:\/\/www.bakerlaw.com\/DigitalAssetsDataManagement<\/a>. Connect with us on Twitter at <a href=\"https:\/\/twitter.com\/BakerHostetler\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/twitter.com\/BakerHostetler&amp;source=gmail&amp;ust=1649534073341000&amp;usg=AOvVaw0Wv16GQp56aC-GbqBrxz9T\" rel=\"noopener\">@BakerHostetler<\/a> or on LinkedIn at <a href=\"https:\/\/www.linkedin.com\/company\/bakerhostetler\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.linkedin.com\/company\/bakerhostetler\/&amp;source=gmail&amp;ust=1649534073341000&amp;usg=AOvVaw0Vs3YA-cZGtOreLKaPymQW\" rel=\"noopener\">@BakerHostetler<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/tedkobusprofile\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.linkedin.com\/in\/tedkobusprofile\/&amp;source=gmail&amp;ust=1649534073341000&amp;usg=AOvVaw1cGFimzJhOMoSn2jln-LPl\" rel=\"noopener\">@TedKobus<\/a> and <a href=\"https:\/\/www.linkedin.com\/in\/craig-hoffman-9402543\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.linkedin.com\/in\/craig-hoffman-9402543\/&amp;source=gmail&amp;ust=1649534073341000&amp;usg=AOvVaw1IPAysiMEGCAPCO53nUwJ7\" rel=\"noopener\">@CraigHoffman<\/a>.<\/p>\n<p>###<\/p>\n<p><strong>About BakerHostetler<\/strong><br \/>With scores of highly ranked attorneys across multiple practice areas, BakerHostetler helps clients around the world address their most complex and critical business and regulatory issues, delivering sophisticated counsel and outstanding client service. The firm has six core practice groups \u2014 Business, Digital Assets and Data Management, Intellectual Property, Labor and Employment, Litigation, and Tax \u2014 composed of more than 1,000 lawyers located coast to coast. For more information, visit <a href=\"http:\/\/bakerlaw.com\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/bakerlaw.com&amp;source=gmail&amp;ust=1649534073341000&amp;usg=AOvVaw2rHjfxNZve-NYZr45R4n-z\" rel=\"noopener\">bakerlaw.com<\/a>.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware remained the most prevalent and impactful type of data security incident.Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-46127","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BakerHostetler Launches 2022 Data Security Incident Response Report \u2014 Resilience And Perseverance 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BakerHostetler Launches 2022 Data Security Incident Response Report \u2014 Resilience And Perseverance 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-08T20:00:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"BakerHostetler Launches 2022 Data Security Incident Response Report \u2014 Resilience And Perseverance\",\"datePublished\":\"2022-04-08T20:00:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/\"},\"wordCount\":1231,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/\",\"name\":\"BakerHostetler Launches 2022 Data Security Incident Response Report \u2014 Resilience And Perseverance 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"datePublished\":\"2022-04-08T20:00:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"contentUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BakerHostetler Launches 2022 Data Security Incident Response Report \u2014 Resilience And Perseverance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BakerHostetler Launches 2022 Data Security Incident Response Report \u2014 Resilience And Perseverance 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/","og_locale":"en_US","og_type":"article","og_title":"BakerHostetler Launches 2022 Data Security Incident Response Report \u2014 Resilience And Perseverance 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-04-08T20:00:08+00:00","og_image":[{"url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"BakerHostetler Launches 2022 Data Security Incident Response Report \u2014 Resilience And Perseverance","datePublished":"2022-04-08T20:00:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/"},"wordCount":1231,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/","url":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/","name":"BakerHostetler Launches 2022 Data Security Incident Response Report \u2014 Resilience And Perseverance 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","datePublished":"2022-04-08T20:00:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/#primaryimage","url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","contentUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/bakerhostetler-launches-2022-data-security-incident-response-report-resilience-and-perseverance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"BakerHostetler Launches 2022 Data Security Incident Response Report \u2014 Resilience And Perseverance"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46127"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46127\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}