Cyber Crime Claims Repeat Victims

In the US, businesses have felt the impact as last year the average attack amounted to a huge $4.35 million. Cybercrime attacks cost US and UK businesses into the hundreds of thousands with the majority targeted multiple times according to a new Cybercrime Statistics Report from the Independent Advisor.

The report reveals that 83% of organisations are attacked more than once and  that on average 277 days for companies to identify and respond to attacks. For breaches that were contained within 200 days, there is an average cost saving of $1.12 million (26.5%).

In Britain, businesses are regularly targeted by hackers with 31% being attacked at least once a week and according to the UK government, each attack amounts to an average cost of £4,200 per business (small businesses average cost £3,080, while medium to large businesses costs amounted to £19,400).

Cyber attacks targeting UK national bodies included  South Staffordshire Water and NHS 111, with 18 ransomware incidents requiring a national response. The UK’s NCSC chief executive officer, Lindy Cameron, believes ransomware to be the most immediate cybersecurity threat to UK businesses.

With multiple global companies having been primary targets already this year, the report calls for more steps to be taken for online protection - especially when faced with increasingly sophisticated attacks that use AI technology.

90% of company security breaches are the result of phishing attacks, the practice of deceiving, pressuring or manipulating people into sending information or assets to the wrong people - showing that more needs to be done to educate employees to threats online.

The principal author of the report, Camille Dubuis-Welch commented, "The majority of businesses and internet users have been a victim of cybercrime, whether they know it or not. The pandemic vastly ramped up the rate and methods of attacks, and many are unaware of just how vulnerable they could be. With record numbers being compromised every year, it's vital that users and companies learn how to protect themselves better online. Being vigilant about fraudulent emails, using a VPN, and choosing hard-to-crack passwords should now be standard practice, rather than an afterthought."

The report also recommends 5 steps for individuals on how to stay safe online:

1. Check emails carefully - be aware of what an authentic email looks like and whether the domain name matches the website/company

2. Protect online browsing data with a VPN - especially when using public WiFi or connecting with a information sensitive online platform

3. Use complex passwords - that are updated regularly, or use a password generator/management tool

4. Keep apps and software updated - minimising the risk of hackers finding a fault or vulnerability

5. Stay secure and vigilant on social media - keep profile settings private to avoid any key details being discovered

 The Costs Of Cybercrime Are Increasing

A main finding from the research is that if measured as a country, cybercrime would be the third largest global economy at $10.5 trillion by 2025. This is to be expected given that 33 billion records are estimated to be stolen in 2023, a huge increase of 175% from 2018.

The COVID pandemic was a huge driver in this rise. In 2021 alone, cybercrime increased by 125%. And there's no signs of slowing down. Over 422 million US accounts were affected by compromised data last year, and it's estimated that hackers now attack your computer every 39 seconds - averaging 2,244 attempts a day.

While the pandemic raged on in the UK, so did online criminals in targeted UK citizens. The report found that cybercrimes grew by 40% in 2021, and it's now estimated that there's an average of 4,783 victims for every million users. Additionally, UK social media has also been targeted with a 23.5% attack increase over the last year.

Mimecast:      Independent:     NCSI:    CyberCrime Magazine:        Image: 愚木混株 cdd20

You Might Also Read:

A Perfect Storm For Cybercrime:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« The Security Challenge: Mapping & Securing Your Distributed Data
Who Practices Digital Safety Better, Mac Or Windows Users? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

Bitfury Group

Bitfury Group

Bitfury Group is the largest full-service blockchain technology company in the world.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

CybrHawk

CybrHawk

CybrHawk is a leading provider of information security-driven risk intelligence solutions focused solely on protecting clients from cyber-attacks.

Camel Secure - ZeroRisk

Camel Secure - ZeroRisk

Camel Secure is a company specialized in the development of products for information security and technology risk management.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.

Stack Overflow

Stack Overflow

Founded in 2008, Stack Overflow’s public platform is used by nearly everyone who codes to learn, share their knowledge, collaborate, and build their careers.

Straiker

Straiker

Straiker's AI-native security platform is designed to protect enterprise AI applications and autonomous agents from evolving threats through automated assessment and runtime guardrails.