当前位置:网站首页>A quick look at the statistical data of 23 major cyber crimes from 2021 to 2022
A quick look at the statistical data of 23 major cyber crimes from 2021 to 2022
2022-06-30 02:25:00 【Racent_ Y】
Since the new outbreak , Cybercrime has been on the rise . Focus on the network security 2021 The most noteworthy statistics of cybercrime in and the opinions of industry experts on 2022 Forecast of Internet Security trend in .
One 、 What is? “ Cyber crime “?
" Cyber crime " The term can be used to describe a large number of different types of network related security events and activities . for example , Here are some of the most common types of cybercrime you may be familiar with :( Of course , There are many other types of cybercrime )
- Ransomware attacks and other malware attacks
- The data reveal that ( Stolen 、 Lose or manipulate )
- Account intrusion
- Identity theft or impersonation 、 Companies or other entities
- Encrypted hijacking , Crypto mining and other digital currency scams
Two 、2021-2022 year 23 Statistics on Cybercrime
( One ) Cybercrime cost statistics
Cybercrime is profitable for bad people , But for enterprises, it will pay a heavy price .
According to the 2021 According to the annual data disclosure cost report ,IBM Express 2020 year 5 Month to 2021 year 3 The average loss of data leakage events during the month was 424 Thousands of dollars . This is higher than that reported in the previous year's report 386 Million dollars up 10%.
Proofpoint Of 2022 According to the global report on the cost of internal threats in , The average annual cost of security incidents related to internal threats is 1540 Thousands of dollars .Ponemon The Institute is based on 6803 Research on security incidents related to internal personnel shows that , These events are mainly due to the following reasons .
56% Because of negligence
26% Because of insider crimes
18% Involving user credential theftaccording to Atlas VPN Research on the estimated income of cybercrime , Cyber criminals get... Every year 1.5 Trillions of dollars in cybercrime revenue .
2021 year ,GDPR A fine of more than 10 Billions of euros , Among them, Amazon has violated GDPR Fined for privacy 7.46 Billions of euros .
According to the 2021 It was acquired by Microsoft in RiskIQ call , Network security incidents cause enterprises to lose nearly every minute on average 180 Thousands of dollars .
( Two ) Statistics of the most common cyber crime methods and strategiesVerizon Of 2021 Data leakage Investigation Report (DBIR) Show ,36% All data leaks are phishing in some way .
Cyber criminals have 80% All violations are directed against Web application ;
Atlas VPN According to the study , stay 2021 In the global fraud attack in the third quarter of 2013 , Yes 45% The fraud is that criminals pretend to be legal brands and communicate with target objects .
according to Check Point Research Of 2021 Fourth quarter 2014 brand phishing report ,DHL This express company has become the brand most often impersonated by cyber criminals , Squeeze Microsoft into second place . Other top five brands most commonly counterfeited include :
Microsoft (20%)
WhatsApp (11%)
Google (10%)
LinkedIn (8%)According to the F5 Labs and Shape Security Of 2021 The annual certificate disclosure report shows that ,2020 Years have 18.6 Billion vouchers were leaked .
( Data sources :F5 Labs and Shape Security)
( 3、 ... and ) Statistics of enterprise defense against cybercrime
- Entrust Of 2021 According to the global encryption trend research data in ,72% American companies rely on hardware security modules (HSM), Followed by the proportion 70% Denmark of , The British , France and Mexico account for... Respectively 51%,45% and 31%.
- Besides ,81% American companies will HSM As a key component of effective encryption and key management ;
- stay DigiCert Of 2021 year PKI Automated status reporting , 91% The implementation of the enterprise plan PKI automation , Because public key infrastructure and digital certificates (SSL/TLS、 Client authentication 、 code signing 、 Document signature, etc ) It is an integral part of data security and integrity .
- Keyfactor 2021 Year zero trust PKI The survey data show that ,96% 's executives think PKI yes " The core of zero trust architecture ".
- Accenture's 2021 The annual network elasticity report shows that ,82% Of companies said they would increase IT Security budget .
- KnowBe4 Of 2021 The privacy and security awareness status report shows that , There are... In the financial industry 91% Employees have received at least one network security awareness training .
( Four ) The impact of network security measures on enterprises - IBM Of 2021 The annual data leakage cost data shows , The data leakage cost of enterprises using strong encryption technology is reduced on average 125 Thousands of dollars ;
- The same IBM According to the report , Having a mature zero trust architecture can reduce the average disclosure cost 176 Thousands of dollars ;
- Gartner forecast , Of the chief information security officer 30% Value is measured by the value they bring to the business .
( 5、 ... and ) The most common cybercrime challenge data - CyberEdge Group Of 2021 The cyber threat defense report shows that , Lack of network awareness is to build a strong network IT The first obstacle to security defense .
- according to Proofpoint Of 2022 The global report on the cost of internal threats in shows that , One of the five major risk factors of the enterprise is that employees are not trained in network security best practices and phishing awareness .
- Entrust Of 2021 According to the global encryption trend research data in ,65% Companies in think that the biggest challenge is not knowing where the data is , therefore , Paying close attention to all sensitive data is a major challenge for enterprises .
- Keyactor In its 2021 In the status report of machine identity management in, it is indicated that ,40% Your company uses spreadsheets to manually track PKI digital certificate . If a large enterprise manages tens of thousands of digital certificates in this way , There will undoubtedly be problems such as certificate expiration , Interruption and many other troubles . therefore , An efficient certificate management tool is essential .
3、 ... and 、 Conclusion
According to the above 23 Statistics on Cybercrime reveal the behavior of most attackers , So as to improve the enterprise network security defense strategy . Of course , Cybercriminals will always find better ways to break through the corporate defense line , As an enterprise , The following safety precautions should be taken as far as possible to prevent criminals from being able to make plans :
- Implement strong cyber security policies and procedures ;
- Ensure that the enterprise has employees and tools with relevant skills ;
- Invest money and resources to protect your network 、 Devices and Applications ;
- Use encryption technology to ensure the security of data in static and transmission process .
边栏推荐
猜你喜欢
Weekly recommended short video: why is the theory correct but can not get the expected results?
什么是证书透明度CT?如何查询CT logs证书日志?
How vscode debugs into standard library files / third-party package source code
Matlab code running tutorial (how to run the downloaded code)
Day_ 19 multithreading Basics
Tencent released the first Office Photo 23 years ago. It's so chronological
冒泡排序
选择排序
How to use SMS to deliver service information to customers? The guide is here!
Can autojs code be encrypted? Yes, display of autojs encryption skills
随机推荐
Day_ 19 multithreading Basics
Jenkins continuous integration environment construction VII (Jenkins parametric construction)
Record an oom exception in production
Large scale DDoS attacks and simulated DDoS tests against VoIP providers
Bucket sort
Entering Jiangsu writers and poets carmine Jasmine World Book Day
[on] [DSTG] dynamic spatiotemporalgraph revolutionary neural networks for traffic data impact
FDA ESG regulation: digital certificate must be used to ensure communication security
Creating exquisite skills in maker Education
Playful palette: an interactive parametric color mixer for artists
Shenzhen CPDA Data Analyst Certification in July 2022
What is a dangling pointer- What is a dangling pointer?
Share the source code of the website of graduation student record
What is certificate transparency CT? How to query CT logs certificate logs?
快速排序
Realization of a springboard machine
[论]【DSTG】Dynamic SpatiotemporalGraph Convolutional Neural Networks for Traffic Data Imputation
C语言 pivot_root的Invalid argument错误解决方案
DDoS surge in mobile and data centers
Implement vs to run only one source file at a time