30+ Fear-Inducing Cyber Security Statistics
A business in the 21st century cannot be run offline. Everything from advertising to accounting benefits from the world wide web in some way, shape, or form. However, the dark underbelly of the internet shows itself in the form of cyber attacks on businesses. Cybersecurity statistics in 2018 show there are an average of 142 attacks on organizations annually. And while the number of cyberattacks per year is increasing, most small businesses spend less than $500 annually on IT security.
What follows is a list of cyberattacks stats, detailing their impact on small businesses and big corporations, the numbers on recent cybercrimes, and the best strategies to deal with them.
Small Business Cyber Security Statistics
1. Nearly half of all small businesses suffered a cyber attack in 2018.
Cybersecurity attacks are becoming the new norm, insurance provider Hiscox reports. 47% of small businesses in the US have had at least one attack in the last year, 44% of those having two to four registered attacks. The most common insurance claims in the cybersecurity sector include ransomware, hackers, and loss or misuse of data. While 66% of small businesses say they are afraid of cyber attacks, the vast majority do not employ even the most basic protection measures.
2. Cyber security-related incidents cost small businesses in the US $34,600 annually.
A data breach doesn’t have to be an elaborate scheme. It can be as simple as a stolen laptop with unencrypted delicate information. Mishaps like these, as well as organized hacker attacks, can cost your business tens of thousands of dollars in lawsuits, lost contracts and work hours to remedy the situation. Cybersecurity statistics show big companies (more than 1,000 employees) lost more than a million dollars on average annually due to security breaches.
3. Most small businesses spend less than $500 a year on cybersecurity.
Small businesses take up just 13% of the cybersecurity market, even though 99% of all companies fall into this category. Companies of this size usually use consumer-grade products, cybersecurity statistics show.
However, with the digitization process fully underway for most of the market, small businesses are slowly but surely becoming more and more vulnerable, according to cybersecurity attacks statistics.
4. Two-thirds of small businesses do not take the necessary follow up steps after a cyber attack has taken place.
We usually need a shocking experience to jolt us into preparing for the worst. However, a cybersecurity report published by the insurance company Hiscox claims 65% of small businesses do not take data safety seriously even after suffering an attack.
The three steps to a successful strategy are:
- Prevention – Setting up proper security measures, allowing space for it in your yearly budget, and educating your employees.
- Detection – Monitoring critical networks and logging security violations both manually and automatically.
- Mitigation – Being prepared for any situation and having a dedicated team on alert at all times.
5. 60% of small businesses go out of business six months after a cyber attack.
Small companies seem to think cyber-attacks are always something that happens to the neighbours. In reality, all it takes to jeopardize an entire business is one haphazard click on a link in a phishing email. According to information security statistics published by the Ponemon Institute, a hacker attack will cost a small business $690.000 on average, enough to put 60% of victims out of business within a six month period after it happens.
Assorted Malware and Ransomware Statistics
6. According to the latest ransomware statistics, overall occurrences of ransomware attacks went down by 20% in 2018, but the number of attacks on enterprises went up 12%.
Ransomware is malicious software that attackers use to encrypt files on the victim’s computer. After locking them out of their files, the attackers demand ransom from the victims in exchange for unlocking their files. This is one of the most common types of cybersecurity breaches.
Since most ransomware attacks go through Windows operating systems and more and more people use mobile devices exclusively, the number is declining.
Big enterprises usually communicate through emails, so they are still prime targets for this type of cybersecurity attack.
7. 48% of all malicious email attachments in 2018 were Windows Office files.
Employees open a massive amount of emails every day. The easiest way for hackers to perform network security attacks is disguising malicious code as an invoice or receipt. One in every 412 emails had a malicious attachment in 2018.
8. Large companies held a 60% share of the cybersecurity market in 2017, but that is soon going to change.
Due to the increase in policies encouraging small business employees to bring their own devices to work, cyber attacks in SME are on the rise. Accessing confidential information through privately-owned technology is a security hazard. This, in conjunction with the fact that the cost of the average cyberattack rose by 11% in 2017 alone, means that IT security is anticipated to be a key issue in the small business ecosystem.
9. Over 200,000 individuals and more than 300,000 computers were affected by the 2017 WannaCry ransomware attack.
In May 2017, hackers used holes in outdated Windows software to infiltrate and encrypt files on more than 300,000 computers worldwide. Some of the world’s leading nations, including the US and the UK, agreed that North Korean hackers were behind the recent cyber attacks. The attack lasted for 4 days and targeted PCs in 150 countries. The “file kidnappers” demanded $300 to $600 in the Bitcoin cryptocurrency for ransom, resulting in hundreds of millions of dollars in damages.
10. According to ransomware statistics from 2018, 96% of all attacks targeted medical centres.
It turns out that hospitals are very vulnerable to cyber-attacks. Hackers know institutions of this type must address security breaches quickly because people’s lives are literally on the line. With the widespread implementation of the internet of things (IoT) combined with subpar security staff training, hospitals are easy prey for cybercriminals. Hospital employees open one out of every seven phishing emails, so 75% of medical centres in the US are infected by malware.
11. 4,800 e-commerce sites a month were victims of form jacking software in 2018.
A hacker uses malicious code to reach credit card details from online shop users. This is called form jacking, and it is the way the latest cyberattacks usually carry out. A single set of credit card information can be sold for $45 on the underground market. This means that if criminals steal information from just ten credit cards from a single site, they would accumulate a lot of money.
12. Cryptojacking had a 52% decrease in popularity in 2018.
Cryptojacking security attacks unfold when a hacker takes over part of the victim’s CPU for cryptocurrency mining. The victim’s computer is slowed down and sometimes rendered unusable.
The profitability, and therefore the frequency, of cryptojacking, is directly tied to the value of cryptocurrency. That’s the reason behind the procedure’s dropping popularity. However, while some altcoins like Monero have depreciated in value by 90%, cryptojacking has become just 52% less frequent.
13. In 2018, 52,48% of all mail traffic was spam.
The antivirus software providers had loads of work in the previous year – the Kaspersky Anti-Phishing system was triggered 482,465,211 times. Yet, because of new legislation regarding internet security, the total number of spam emails in 2018 was less than in the previous year. China was responsible for 11.69% of all spam, the biggest share a single nation held, phishing statistics for 2018 show.
14. The WannaCry global ransomware attack cost the UK’s National Health Service an estimated £92 million.
In one of the most recent cyber attacks, the WannaCry ransomware attack, some 19,000 doctor’s appointments in the UK were cancelled. The 2017 attack took advantage of the fact that many Windows operated machines were not properly patched to break into the systems and encrypt the files for ransom.
15. More than 20% of emails inboxes in Brazil were attacked by phishers, a bigger share than in any other country in the world.
Phishing statistics published by one of the world’s leading antivirus software developers, Kaspersky, show one in every five Brazilian internet users was a target of phishing attacks. Australia is in second place, with 17.20%, and Spain is in a close third with 16.96%.
In the first three months of 2019, Kaspersky prevented almost 112 million attempts to redirect users to scam websites.
General Cyber Security Statistics
16. The average number of attacks against an organization in 2018 is 145, up from 130 in 2017.
Cyber attack statistics by year indicate that there has been a 67% increase in security breaches in the last five years. Accenture, the publisher of this study, defines cyberattacks as “malicious activity conducted against the organization through the IT infrastructure via the internal or external networks, or the Internet.”
17. A projected 146 billion records will be exposed in the five year period between 2018 and 2023, data breaches statistics suggest.
Juniper’s 2018 study predicts that this is the number of actual breaches, not reported breaches. The new legislature prescribing mandatory reports will lead to 90% of breaches in North America being known. The US will stay at the top of the list of priorities for hackers since that’s where the most valuable information is.
18. 500 million data records were breached from Marriot’s Starwoods Hotel in one of the largest 2018 cyber attacks.
The hospitality industry remains one of the most vulnerable. Chinese hackers are suspected to be behind the attack on Starwoods Hotel discovered in September 2018. The breach is considered to be one of the biggest cyberattacks in history, with valuable and personal travel information of hotel guests dating back from 2014, many of them politicians and diplomats.
19. American companies lose the most funds from cyberattacks annually – $27.37 million on average.
That’s twice as much as the second most expensive country to get hacked, Japan ($13 million annually). Recent cyberattacks in 2018 in the UK increased compared to the year before by 30%.
20. In 2017, US consumer losses to cyberattacks totalled $19.4 billion.
More than half of the adult US population, 143 million people, were victims of online theft, cyber-attacks statistics show. Poor password hygiene – namely using the same password for multiple accounts – is the biggest reason behind the latest security breaches. An average victim will lose 20 hours remedying the effects of an online attack.
21. The US Federal Government’s budget for cybersecurity in 2019 is $15 billion.
This represents an increase of $594 million compared to 2018. According to the information security stats, the Department of Defense is the biggest contributor with over $8.5 billion reported investments.
22. Information leaks are the most costly consequence of cyber attacks, with organizations losing almost $6 million annually from them.
Accenture recognizes four categories of cyber attack consequences:
- Business disruption
- Information loss
- Revenue loss
- Equipment damage
Out of these four, the most costly in recent security breaches is information theft. Information loss is most commonly caused by malware and web-based attacks. Denial of service (DoS) attacks do most business disruption, costing companies $1.1 million in revenue annually.
23. There is a hacker attack every 39 seconds, according to a study done by experts at the University of Maryland.
Security Magazine cited the University of Maryland when they published one of the most alarming cybersecurity facts – a hacker attack happens every 39 seconds.
The experiment consisted of setting up four computers running the Linux operating system with poor security measures. The research team monitored the activity. Most attackers used simple, brute force “dictionary” software which tries to open up computers by trying common account name and password combinations. The computers were attacked 2.244 times a day, chief researcher Michel Cukier said.
24. Computer security news show 90% of all security breaches are due to human error.
While investing in cybersecurity hardware and defence systems may seem like the most logical measure against cybercrime, staff training is actually the best investment a CEO can make. Teaching employees to not fall for simple tricks like impersonations of company executives and other phishing tactics by applying some common sense will yield the best results.
25. 97% of companies with the best cybersecurity measures have an extensive staff training program.
Raising data security awareness through training is the most vital step to make in order to increase data safety. It’s also important to have a defined emergency strategy, make changes after a breach happens, and have insurance, according to cybersecurity statistics.
26. Seven out of ten businesses are not prepared for a data breach emergency.
In spite of the fact that recent data breaches have demonstrated no company under the sun is safe from a cyberattack, a study including interviews with 4100 professionals in leadership positions has found that 70% of businesses are completely unfit to handle a cyber-attack. Information security stats show big companies lose $1.05 million on average annually from insufficient hacker defence.
27. A cybersecurity breach has been identified in 32% of business in the UK in 2018.
A study dealing with cyber awareness from 2019 has revealed that one-third of all businesses and over a fifth of charities in the UK have had come under attack in the last 12 months. Of those attacked, roughly a third needed new measures for protection.
28. The cybersecurity market will be worth an estimated $300 billion in 2024.
The rise of cybercrime and computer-related attacks has led to an increasing need for cybersecurity services. Cybersecurity statistics from 2017 show the market was worth $120 billion back then, and projections show it will be worth $300 billion in 2024.
29. 20% of the workforce in the cybersecurity industry will be female by the end of 2019.
While the balance of gender representation is still off kilt, more and more women are taking key roles in all branches of the cybersecurity industry, cybersecurity industry stats show. The total ratio is still far from 50%, but the RSA Conference 2019, the industry’s biggest conference featuring more than 40.000 visitors and participants, hosted 46% female keynote speakers.
30. High-risk applications can be found in one in thirty-six mobile phones.
The overall number of malware infections has dropped in the previous year, but the number of ransomware infections has been on the rise. There were 33% more than in 2017. Cyber attacks statistics for 2018 show most ransomware attacks happened in the US – 63%.
31. 75% of smart devices that get infected by malware are routers.
Hackers use routers as a spring-board to other devices. They are also the easiest to reach, given their connection to the internet.
32. Europe had a 20% share of the cybersecurity industry in 2017; that percentage is estimated to grow exponentially.
Due to massive government investments in cybersecurity in Europe, the market share in this region is expected to rise exponentially. The massive industrialization and the rising number of mobile devices users in Asia-Pacific also indicate that the region will experience a 20% CAGR in the next 5 years, according to cybersecurity stats.
33. 30 million users’ personal data was compromised in a Facebook data leak in a recent cyber attack.
As if the Cambridge Analytica scandal did not shake the trust Facebook’s community puts in the most popular social network in the world, recent cyber attacks in 2018 affected 30 million profiles. Fortunately, no credit card information was leaked during the attacks.
34. In the UK, cyber-attacks cost charities twice as much money annually as they do businesses.
On average, charities that have been targeted by cyber attack lose £9,470 a year because of leaked data, compared to the £4,180 damage suffered by businesses. A third of charities had to take up staff time to take care of the breaches, a fifth had staff that had to halt daily work completely. A monthly breach is identified in 39% of charities, according to cyber security statistics.
Industry: Cyber Security
- SOC Manager. SC Clearance. Immediate opportunity.
Permanent SOC Manager. SC cleared / clearable, London / Birmingham. SOC Manager needed to replace a SOC contractor I placed into a client who is due to complete their assignment at the end of March. The ability to achieve SC clearance is essential. Looking for someone that is a blend of strategic stakeholder engagement with strong technical skills. The role will sit in a relatively new SOC environment. The position is to setup, implementation and management of resources to help with the initial and on-going stages of a new SOC. Experience engaging with and managing client stakeholder relationships as well as 3rd party relationships is critical. The role will involve; setting up, implementing and fine tuning the various initial stages of a SOC environment. Experience establishing and building out technical process / operational capability, managing of technical teams (analysts, engineers and architects, creation of policy / playbooks, fine turning is key. SPLUNK is the tooling of choice… Interviewing immediately. Set up a call with me today on https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-manager-role Direct contact details Chris.Holt@dclsearch.com or 07884666351
- Security engineer. Financial Services. UK. Permanent
CH7863 Security engineer. End User . Financial Services Security Engineer needed to monitor and manage a security suite of tools within an End User environment. The Security Engiener will be responsible monitoring, configuring, fine tuning, incident management and generally improving the security tool capability. Specific experience with CyberArk, Tripwire Log Center and Tripwire Enterprise is highly desirable). Current experience with Vulnerability management and penetration testing is highly desirable. Specifically the ability to effectively manage 3rd party pen tests. You will be working within a specialist security team reporting to the CISO. Experience working within an end user environment within financial services is highly desirable. Flexible location. This is an exclusive role to DCL Search & Selection. To book a call please use my Calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-role-
- DevSecOps - Security design / review consultant. SC Clearance. London
CH7858 London £70,000 DevSecOps - Security design / review consultant. DevSecOps - Security design / review consultant will ensure that newly created, public facing apps are secure by design and by default by aligning them to current / best practice security policies and standards into the design phases. The individual must have a technical software / application development background with specalist experinece in secure architecture design. (Frameworks, processes, best practice etc) Practical experience translating and ensuring that the OWASP top 10, ISO27001, HMG frameworks requirements are reviewed and embedded into project designs which are implemented is essential. Experience working projects through a full development lifecycle is key. You will work along side the design and project teams to idenitfy and mitigate risks throughout the design phases. This is a permanent role. SC clearance is essential as is the ability to get to the London office. (When appropiate #covid) Security DevSecOps consultant. To arrange a discreet call book via https://calendly.com/chris-holt/devsecopp--security-design-review-consultant
- CONTRACTOR Cyber Vulnerability Analyst, NESSUS, Rapid 7, SC clearance required.
Cyber Vulnerability analyst NESSUS, Rapid 7, needed for IMMEDIATE 3 month contract MUST have / be able to achieve UK SC clearance role to work within a live environment within a public sector department. The individual must have experience in using various security methods and tools such as Rapid7 and NESSUS scan for / identify vulnerabilities, prioritise them according to risk and raise appropriate tickets for remediation / follow up. In depth experience utilising Nessus highly beneficial. Current cyber public sector experience highly desirable.