November 20, 2020 2 min read

Cyber Attack Statistics You Need to Know

cyber security infographic illustration
Cybercrime Cost Illustration
Cybercrime Cost for SMEs Illustration
the impact and severity of cyber attack is increasing illustration

cyber incidents by industry chart

breach discovery takes an average 197 days illustration


Longtail Cost of Cyber Attacks illustration
information security spending illustration


worldwide security spending by segment 2017-2019 chart
who's behind data breaches charts

How to Lower the Risk of Cyber Attacks

reduce data transfers illustration
Reduce Data Transfers

Transferring data between business and personal devices is often inevitable as a result of the increasing amount of employees who work remotely. Keeping sensitive data on personal devices significantly increases vulnerability to cyber attacks.

download carefully illustration
Download Carefully

Downloading files from unverified sources can expose your systems and devices to security risks. It’s important to only download files from sources and avoid unnecessary downloads to lower your device susceptibility from malware.

improve your passwords illustration
Improve Your Passwords

Password strength is the first line of defense against a variety of attacks. Using strings of symbols that don’t have a meaning, regular password changes and never writing them down or sharing them is a crucial step to protecting your sensitive data.

update your software illustration
Update Your Software

Software providers work hard on continuously making their software more secure, and regularly installing the latest updates will make your devices less vulnerable to attacks.

monitor for data leaks illustration
Monitor for Data Leaks

Regularly monitoring your data and identifying existing leaks will help mitigate the potential fallout from long-term data leakage.

develop a breach response plan illustration
Develop a Breach Response Plan

Data breaches can happen to even the most careful and disciplined companies. Establishing a formal plan to manage potential incidents will help organizations of any size respond to actual attacks and contain their potential damage. 



2017 Cybercrime Report, Cybersecurity Ventures, Steve Morgan, Editor-in-Chief
2018 Thales Data Threat Report, Thales eSecurity
The CEO’s Guide to Data Security, AT&T Cybersecurity Insights
Why Educating Your Employees on Cyber Intelligence And Security Will Reduce Risk, Cybint Solutions, Alex Aronovich
2019 Data Breach Investigations Report, Verizon
Cybersecurity: Industry Report & Investment Case, Nasdaq
Cisco 2018 Annual Cybersecurity Report, Cisco
2018 State of Cybersecurity in Small & Medium Size Businesses, Sponsored by Keeper Security, Inc./Independently conducted by Ponemon Institute LLC
2018 Cost of a Data Breach Study: Benchmark research sponsored by IBM Security Independently conducted by Ponemon Institute LLC Global Overview
Gartner Forecasts Worldwide Information Security Spending to Exceed $124 Billion in 2019, Gartner
Ninth Annual Cost of Cybercrime Study, Independently conducted by Ponemon Institute LLC and jointly developed by Accenture
Data Breach Response Times: Trends and Tips, Varonis, Rob Sobers,to%20those%20who%20take%20longer.
6 Ways to Reduce the Risk of Cyber Attacks, Align, Katie Sloane

Related Articles

A Guide to Cybersecurity Risk Management for Businesses

A Guide to Cybersecurity Risk Management for Businesses

11 min read

Learn why having a strong cybersecurity risk management plan is paramount for any modern business that relies on the Internet to connect with clients and business partners.

Read More
Understanding Additional Insured Endorsements and How They Work

Understanding Additional Insured Endorsements and How They Work

6 min read

Find out what an additional insured endorsement is and how it can affect the coverage your liability insurance policies provide.

Read More