The 2020 Must-Know Security Breach Statistics

Security breaches are becoming increasingly commonplace and dangerous. The World Economic Forum nominated cyber-attacks as one of the major threats to global stability for 2019. Not only money is at stake, as breaches have an appalling effect on organizations’ reputation, trustworthiness, and often prove to a business killer. Most important, however, is the data – our personal data that once stolen is available to cybercriminals to exploit.

We would like to draw your attention to 96 meaningful statistics concerning not only the hefty cost of data breaches but also the origins of risk, the menace for small companies, and the origin of the problem – cybercriminals. We will also focus on the effects of the COVID-19 pandemic on cybersecurity and the situation in the healthcare sector. We will finish with examples of good practices to mitigate the data breach risk, which we should not run away from, but act upon.

Data breaches – a high-frequency phenomenon

  1. A cyberattack occurs every 39 seconds (University of Maryland).
  2. It is estimated that a business will fall victim to a ransomware attack every 11 seconds by 2021 (Herjavec Group).

webinar-2021-cybersecurity-strategy

The hefty cost of a data breach

  1. On average, the cost of a data breach is $8.64 million. (IBM).
  2. The cost of one stolen record in a data breach is roughly $146. (IBM).
  3. 61% of the costs come in the first year after the data breach. (IBM).
  4. Breaches discovered and contained within the first 200 days of their occurrence cost companies 1.12 million dollars less than breaches contained for more than 200 days. (IBM).
  5. Breaches of 1 million to 10 million records cost an average of $50 million, more than 25 times the average cost of $3.86 million for breaches of less than 100,000 records. (IBM).
  6. A massive breach of 50 million records cost was $392 million, which is more than 100 times the average cost. (IBM).
  7. In 2019, data breaches cost companies a total of 2 trillion dollars. (Juniper).
  8. On average, the presence of an incident response team and the incident response plan testing in organizations reduces the cost of a breach by $2 million (IBM).
  9. The estimate for a global Cybercrime cost in 2021 is $6 trillion (Cybersecurity Ventures).
  10. In 2019, the country with the highest average total cost of a data breach was the United States at $8.64 million (IBM).
  11. Enterprise spending on cloud security solutions is predicted to increase from $636M in 2020 to $1.63B in 2023, attaining a 26.5% CAGR.  (Gartner)
  12. The average cost of a data breach in 2020 for big businesses is more than $150 million. (BigCommerce)
  13. The market value of numerous companies has fallen by 25% over the year following a cyber-attack. (AON)
  14. Including customer turnover, increased customer acquisition activities, reputation losses, and diminished goodwill, the total cost of lost business globally was highest for United States companies at $4.13 million per company. (Ponemon Institute’s Cost of Data Breach Study)
  15. Losses related to cybercrime are projected to reach $6 trillion per annum by 2021. (Cybersecurity Ventures)
  16. The most expensive part of a cyber attack is information loss at $5.9 million. (Accenture)

The real numbers on data breaches

  1. 24% of incidents where malware is used involve ransomware. (Verizon).
  2. 34% of data breaches in 2018 involved internal actors. (Verizon).
  3. 36% of external data breach actors in 2019 were involved in criminal organizations. (Verizon).
  4. 48% of malicious email attachments are MS Office documents (Symantec).
  5. 71% of breaches are due to financial motivation. (Verizon).
  6. The average time to contain a data breach was 73 days (IBM).
  7. The average time to identify a breach in 2020 was 220 days (IBM).
  8. The data breach lifecycle of a malicious or criminal attack in 2020 took an average of 280 days (IBM).
  9. An average of 4,800 websites per month is compromised with form jacking code (Symantec).
  10. 49,07% of accidents with data leakage from databases without confidentiality disclosure have happened to stored data. (Veris)
  11. 1244 data breaches took place in the US in 2018 and 446.5 million records were exposed (Statista).
  12. 1 billion records were exposed in data breaches in the first six months of 2019 (Forbes).

The huge risk for small companies

  1. The cost of cyber-attacks for small businesses is between $84,000 and $148,000. (USA Today)
  2. 60% of small businesses go bankrupt within six months of an attack. (USA Today)
  3. According to the Verizon Data Breach Investigation Report, 61% of breaches hit smaller businesses last year, which is a rise compared to the previous year’s 53%. (USA Today)
  4. The main reason SMEs and large entities purchased cyber insurance were for risk transfer in 2018 (Statista).
  5. 43% of data breach victims are small businesses (Verizon).
  6. In 2019, data breaches cost smaller organizations relatively more than large organizations. The average cost per employee was $204 for companies with less than 25 000 employees. (IBM).
  7. 3.5 million cybersecurity jobs are unfilled. This number grew by 350% from 2013 when there were 1 million unfilled jobs to 3.5 million which is the projected number for 2021. (Cybersecurity Ventures)

banner-siem-buyers-guide

Healthcare is in danger

  1. Data breaches are come at the highest price in the Healthcare industry and cost $7.13 million dollars on average. (IBM).
  2. 15% of breaches involved Healthcare institutions (Verizon)
  3. During the last three years, 93% of healthcare organizations were subjected to cyberattacks (Verizon)
  4. Healthcare spent the most time tackling a data breach – 329 days (IBM).
  5. Hospitals spend 64% per annum on advertising over the two years after a breach (American Journal of Managed Care).
  6. Confirmed data breaches in the healthcare sector increased by 58% in 2020. (Verizon)

free ebook: HIPAA IT Compliance requirements

The appalling effect of the pandemic on data security

  1. 47% of employees pointed out to distraction as the reason for falling for phishing scams while working from home. (Tessian)
  2. Web application breaches are the reason for 43% of all breaches. The latter has doubled since 2019. (Verizon)
  3. 52% of legal and compliance leaders are concerned about third-party cyber-security risks due to remote work during the COVID-19 pandemic. (Gartner)
  4. Remote work has resulted in an increase in the average cost of a data breach by $136,974. (IBM)
  5. 81% of cybersecurity specialists have reported that their job function has changed during the pandemic. ((ISC)²)
  6. In April, 83% of tech companies reported new customer inquiries, 36% of which in the cybersecurity sector. (CompTIA)
  7. The search for the term “how to remove a virus” increased by 42% in March 2020. (Google Trends)
  8. From January to March 2020 there was an increase of 8.3% in the usage of mobile VPN. (WatchGuard)
  9. 76% of remote workers report that working from home would increase the time to identify and contain a breach. (IBM)
  10. 33,000 unemployment applicants were subject to a data breach from the Pandemic Unemployment Assistance program in May. (NBC)
  11. Scams increased by 400% over the month of March. This has made the COVID-19 pandemic the largest security threat ever. (ReedSmith)
  12. In April, Google blocked 18 million malware and phishing emails related to Coronavirus per day. (Google)
  13. 500 thousand Zoom user accounts were compromised and sold on a dark web forum. (CPO Magazine)
  14. Every day 1,767 high-risk Coronavirus-themed domain names are created. (Palo Alto Networks)
  15. 471 fake online shops selling fraudulent COVID-19 items were taken down in the United Kingdom. (ZDNet)
  16. 450 active WHO email addresses and thousands of email addresses of COVID-19 response teams leaked in April 2020. (WHO)
  17. Visits to popular hacker websites and forums increased by two thirds (66%) between the months of March and May. (cybernews)
  18. Since COVID-19, the US Federal Bureau of Investigation reported a 300% increase in reported cybercrimes (Cybint)

Webinar_Privacy in time of pandemic

Where does the risk really come from?

  1. As of 2019, cyber-attacks are among the top five risks to global stability (World Economic Forum).
  2. Cyber risk is the biggest concern for risk managers in the United States (Actuary).
  3. The average number of files and folders that an employee had access to on average in 2019 is respectively 17 million and 1.21 million (Varonis).
  4. 15% of companies found more than 1 million folders open to every employee on the company (Varonis).
  5. 53% of companies found that more than 1000 sensitive files were open to every employee (Varonis).
  6. 58% of companies found that more than 1000 of their files had inconsistent permissions (Varonis).
  7. 80% of companies possessing more than 1 000 000 folders found that more than 50 000 folders (5%) were open to every employee. (Varonis).
  8. 80% of companies with over 1 million folders found over 50,000 folders open to every employee (Varonis).
  9. Enterprise spending on cloud security solutions (Cyber Edge)
  10. The overall volume of Internet of Things attacks remained high in 2018 and routers and cameras were within the most infected devices and accounted for respectively 75% and 15% of the attacks (Symantec).
  11. 95% of companies found over 100,000 folders containing stale data (Varonis).
  12. On average, 50% of user accounts are stale (Varonis).
  13. Only 5% of a firm’s folders are protected (Varonis).
  14. The source of 90% of malware emails (Verizon).
  15. 38% of users reported that they have a password that never expires (Varonis).
  16. The number of supply chain attacks grew by 78% in 2018 (Symantec).
  17. The larger the data breach, the smaller the chance for the organization to have another breach in the following two years (IBM).
  18. 24% of data breaches are caused by human error (IBM).
  19. 52% of breaches are caused by a malicious attack (IMB).
  20. 23% of breaches are caused by system glitches. (IBM).
  21. 62% of breaches not involving an error, misuse, or physical action involved the use of stolen credentials, phishing or brute force (Varonis).
  22. Routers and connected cameras make up 90% of infected devices (Symantec).
  23. In 2019, c-level executives were 12 times more likely to be the target of social incidents and 9 times more likely to be the target of social breaches than in the previous years. (Verizon).
  24. Office applications were the most common object of exploitation worldwide in Q3 of 2018 (Statista).
  25. 52% of compliance leaders report that the most-increased third-party risk for their organization is cybersecurity. (Gartner)

Cybercriminals – the ‘bad guys’ of our time

  1. Nearly one in ten targeted attack groups use malware to disrupt business operations (Symantec).
  2. By stealing only 10 credit cards from the website, cyber criminals earn up to $2.2 million through for jacking. (Symantec).
  3. Attackers will take aim on biometric hacking and expose vulnerabilities in touch ID sensors, facial recognition, and passcodes (Experian).
  4. The online gaming community will be an emerging field of action for hackers, with cybercriminals posing as gamers and gaining access to the computers and personal data of the players that choose to trust them. (Experian).

Cybersecurity spending

  1. 17% of IT security professionals reported information security as the major budget increase for 2018 (ZDNet).
  2. 50% of large enterprises (with over 10,000 employees) are spending $1 million or more annually on security, with 43% spending $250,000 to $999,999, and just 7% spending under $250,000. (Cisco)
  3. Spending on Cloud Security is predicted to increase by 33% becoming a $585M market in 2020. (Forbes)
  4. Security Services is forecast to drive $64.2 billion in global revenue in 2020 comprising 51.9% of the total market. (Forbes)
  5. Data Security will grow by 7.2% becoming a $2.8 billion market in 2020. (Forbes)

LogSentinel SIEM for SMEs (1)

In case you are currently evaluating options for integrating a SIEM product to achieve regulatory compliance, protect data, and improve your information security posture, you should consider LogSentinel. With LogSentinel Next-Gen SIEM, you get a strong set of compliance features as as well a great cybersecurity solution, so you can demonstrate compliance at reduced operational cost and minimal effort on audit, forensics, and fraud detection.

REQUEST DEMO

Like this article? Share it with your network!