JOIN OUR TEAM

Top 10 Downright Scary Cybersecurity Facts for 2018


David Eichkorn
Author: David Eichkorn Date: 10/30/2018

October is the month we associate with things that go bump in the night — that time when children, sometimes disguised as tricksters, go door to door. It’s also a time when people acknowledge a different kind of nefarious trickster, often perceived as a shadowy figure who lurks in the Dark Web — a hacker who goes from one computer network to the next in an attempt to steal your data or hold your systems ransom.

October is National Cyber Security Awareness Month. To better understand the precautions you can take to secure your organization’s networks, it’s important to first know what you’re up against. So we’ve compiled this top 10 list of cybersecurity statistics for 2018...so far.

1. 58% of malware attack victims are categorized as small businesses. (SOURCE) 
Click to Tweet This Stat!

The big victims are often small businesses that lack the people and resources to mitigate the risks of a cyberattack.

2. Cyberattacks cost small and medium-sized businesses (SMBs) an average of $2.2 million last year. (SOURCE – Click to Tweet This Stat!

Despite major corporate data breaches making the headlines, it’s often smaller enterprises that are targeted the most. 

3. 87% of compromises took only minutes or a few seconds for hackers to access systems, yet 68% of breaches took months to be discovered. (SOURCE – Click to Tweet This Stat!

Today’s cybercriminals often fly in under the radar and can lurk inside systems for months retrieving sensitive data. It’s important to know the signs your computer’s been hacked.

4. 77% of compromised attacks in 2017 were fileless.  (SOURCE – Click to Tweet This Stat!

Unlike traditional attacks that install malware files on a user's computer and are more likely to draw attention, fileless attacks use legitimate applications or an operating system to access systems, so antivirus tools can sometimes miss them.

5. 92.4% of malware is delivered via email.  (SOURCE – Click to Tweet This Stat!

Hackers will seek out the path of least resistance. Since every business uses email, it’s often the easiest way to access systems.

Top 10 Email Phishing Scam Clues – Get the Infographic   <https://www.gflesch.com/email-phishing-scams-infographic-lp> 

6. On average, each user at a small business (fewer than 250 employees) receives nine malicious emails per month.  (SOURCE – Click to Tweet This Stat! 

Email phishing scams are increasingly deceptive and can appear to be legitimate. It only takes one click from an unsuspecting user to compromise an entire network.

7. A successful attack costs an organization on average $301 per employee — or over $5 million for a large organization.  (SOURCE – Click to Tweet This Stat! 

The costs of downtime and disruptions to business operations can add up. What is often immeasurable is the damage caused from a tarnished brand reputation and diminished customer loyalty.

8. The number of records compromised in the first half of 2018 surpassed the total number of breached records for all of 2017, which had already grown by a dramatic 88% over the year prior.  (SOURCE – Click to Tweet This Stat!  

The amount of digital data being generated is compounding exponentially each year, so it stands to reason that the number of compromised records has grown in tandem.

9. 42% of enterprises breached this year had been breached in the past.  (SOURCE – Click to Tweet This Stat!  

Despite being faced with the consequences of a previous cybersecurity event, many businesses are not adequately securing their systems.

10. 77% of IT professionals surveyed said their organizations do not have a formal cybersecurity incident response plan.  (SOURCE – Click to Tweet This Stat!  

A cyberattack may be the largest threat your organization faces. It’s critical for enterprises to establish a strategy for mitigating the risks and to outline a business continuity plan to address this rising threat.

Even if you’re a small business with a limited budget, you can achieve enterprise-level security by working with a Managed IT provider like the Gordon Flesch Company. We leverage the latest cybersecurity technology to monitor your systems 24/7, and have highly trained experts who will perform a full security sweep of your network and devices to identify threats and weaknesses. Then, we’ll develop a tailored IT roadmap to secure your systems and empower you and your employees to mitigate the risks of a security breach. Contact us for a no-cost assessment and to learn more.

New call-to-action

Topics: Cybersecurity

Leave a Comment

Written by David Eichkorn

Throughout David's 20-year career in IT support and management for big and small enterprises, he’s helped executives all over the world. David implements technology in a way that allows it to be the driving factor in how an organization accomplishes its business goals.

Need More Information?

We’re ready – and eager – to help you solve your technology challenges.