• Globally, cybercrime was the 2nd most reported crime in 2016. (Source: PWC)
  • In proportion to the total number of crimes, cybercrime now accounts for more than 50% of all crimes in the UK. (Source: National Crime Agency)
  • Between April and June 2017, over 11,800 people reported incidents of cybercrime to the Australian Cybercrime Online Reporting Network. (Source: ACORN)
  • Mobile platforms are one of the fastest-growing targets for cyber criminals. Symantec identified 18.4 million malware detections in 2016, a 105 percent increase of 2015. (Source:Symantec (https://www.symantec.com/security-center/threat-report))
  • An attacker resides within a network for an average 146 days before detection. (Source: Microsoft)
  • A University of Maryland study found that hackers are attacking computers and networks at a “near-constant rate”, with an average of one attack every 39 seconds. (Source: University of Maryland)
  • Most network intrusions—63 percent—are the result of compromised user passwords and usernames. (Source: Microsoft (https://www.microsoft.com/en-us/cloud- platform/advanced-threat-analytics))
  • In their 2017 Annual Cybersecurity Report, Cisco found that globally, 8 percent of malicious email attachments were docm files (a type of Microsoft Word XML le that executes macros). (Source:Cisco (http://www.grouppbs.com/wpcontent/uploads/2017/02/Cisco_2017_ACR_PDF.pdf))
  • 18 million new malware samples were captured in In Q3 2016. (Source:Panda Security (https://www.pandasecurity.com/mediacenter/pandalabs/pandalabs-q3/))
  • •According to Gartner, by 2020, 25 percent of cyber attacks against enterprises will involve IoT devices. (Source: Gartner (https://www.gartner.com/newsroom/id/3291817))
  • The number of ransomware families increased from 30 in 2015 to 98 in 2016, revealing the distinct focus by cyber criminals on using ransomware to extort money from businesses and individuals. (Source: Symantec (https://www.symantec.com/security-center/threat- report))
  • The average ransomware demand also increased significantly, from $294 in 2015 to $1,077 in 2016. (Source:Symantec (https://www.symantec.com/security-center/threat- report))
  • Ransomware developers have been increasingly demanding popular cryptocurrency bitcoin in recent years, due to its improved privacy over at currencies. However, more private coins such as monero and Zcash are set to become popular with cybercriminals in 2018, due to their improved privacy over bitcoin. (Source:Bloomberg)
  • At 91.6 percent, “Theft of Data” continues to be the chief cause of data breaches in 2016 counting total by identities stolen. “Phishing, Spoofing, and Social Engineering” were a distant second at 6.4 percent. (Source:Symantec (https://www.symantec.com/security- center/threat-report))
  • The U.S. had the most data breaches of any other country, by a large margin. There were 1013 data breaches in the U.S. in 2016. By comparison, second place U.K. had just 38 breaches. (Source: Symantec (https://www.symantec.com/security-center/threat-report))
  • In 2017, Wikileaks released a stash of over 8,000 classified CIA documents. (Source: New York Times (https://www.nytimes.com/2017/03/07/world/europe/wikileaks-cia- hacking.html))
  • That same year, hackers released 2GB of emails from French presidential candidate Emmanuel Macron. (Source:Reuters (https://www.reuters.com/article/us-france-election- macron-leaks/french-candidate-macron-claims-massive-hack-as-emails-leaked- idUSKBN1812AZ))
  • In 2016, 70% of all financial fraud in the UK was done through remote purchases using stolen information or cards. (Source: FFA UK (https://www.financialfraudaction.org.uk/wp- content/uploads/2016/07/Fraud-the-Facts-A5-final.pdf))
  • There may be 3.5 million unfilled cybersecurity jobs by 2021. (Source: Cybersecurity Ventures (https://cybersecurityventures.com/jobs/))
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt