Security

20 Shocking Cybercrime Statistics - 2022 Edition

Laurence Cadieux

Hello! My name is Laurence Cadieux, and I’m a Communication Coordinnator here at Devolutions. My role includes overseeing the content strategy and development of our blog, managing the content and communication for our VIP advocate platform “Devolutions Force,” and working closely with our PR partners around the world. I also handle our off-site content opportunities (magazines, journals, newspapers, etc.). Academically, I have a bachelor’s degree in marketing. When I’m not working, I sing in a band, and I enjoy watching my favorite movies again and again. I also love cooking, and during the pandemic, I became a bread expert — I can now bake the most amazing key lime pie on earth (if I do say so myself!). Plus, I recently discovered LEGO and there is no turning back — I’m hooked! I’m always happy to help, and you can reach me directly at lcadieux@devolutions.net.

View more posts

We keep hearing that the cybercrime landscape is getting worse. But just how bad have things become? We scoured a variety of sources to reveal the fresh — and frankly, terrifying — reality of cybercrime in 2022.

Cybercrime and SMBs:

  • 20% of ransomware victims are SMBs. [source]
  • 72% of SMBs are more concerned about cybersecurity now compared to a year ago. [Source]
  • 52% of SMBs have experienced a cyberattack in the last year — and 10% have experienced more than 10 cyberattacks. [Source]
  • 1 out of 5 SMBs are using insecure methods to store passwords, such as spreadsheets, documents, and writing passwords down on paper. [Source]
  • 61% of SMBs are not monitoring the full roster of privileged accounts in their organization. [Source]

Costs of Cybercrime:

  • Identity fraud losses have surged to $56 billion per year (all figures in this article USD). [source]
  • The average cost of a data breach has climbed to $4.24 million — the highest average ever recorded. [source]
  • The average ransomware payment has skyrocketed to $170.704 per incident. [source]
  • Only 8% of victims who pay a ransom get 100% of their data back. [source]
  • Lost business contributes to 38% of data breach costs. [source]

Data Breaches:

  • Data breaches have increased by nearly 70% since 2014. [source]
  • It takes an average of 212 days for security teams to identify a data breach. [source]
  • It takes an average of 287 days for security teams to contain a data breach. [source]
  • 20% of data breaches are triggered by compromised credentials. [source]
  • Phishing is the most common cyberthreat, and involved in 36% of data breaches. [source]

Looking Ahead:

  • By 2025, global cybercrime costs are predicted to reach $10.5 trillion annually by 2025, up from $3 trillion in 2015. [source]
  • By 2031, global ransomware damage costs are predicted to exceed $265 billion. [Source]
  • By 2025, there will be an estimated 3.5 million cybersecurity jobs open globally – a 350% increase from 2017. [Source]
  • By 2025, threat actors are expected to have the ability to weaponize operational technology environments in order to cause human casualties. [Source]
  • Each year through 2025, premiums for cyber insurance are expected to increase by 21% annually. [Source]

Now, for some good news!

These statistics are scary — or make that, terrifying. But that doesn’t mean companies need to hope for the best and brace for impact. They can, and frankly must, be proactive to limit the frequency and mitigate the severity of cyberattacks.

To help your company from being swept up in these chilling statistics, we invite you to access the Devolutions Cybersecurity Guide. This is our curated collection of cybersecurity-related content that highlights best practices and insights across multiple cybersecurity categories, including:

  • Threat Management
  • Access Management
  • Password Management
  • End User Management
  • Remote Working
  • Optimizing Security
  • Tools
  • Career Development
  • Statistics
  • Training

Access to the Devolutions Cybersecurity Guide is free, and available on-demand. Click here to access it now.

Related Posts

Read more Security posts