Key Takeaways
- 17% of organizations paid a ransom multiple times
- 86% of malware is delivered through phishing and social engineering in Microsoft’s threat intelligence summary
- The CISA KEV catalog contained 93 vulnerabilities as of a specific snapshot in 2025, indicating continuing expansion (as shown in the catalog entry count on CISA)
- IBM reported that 1,000 records exposed increased breach costs significantly; it cites the cost per record approach in 2023 report
- FBI and CISA warned that business email compromise median loss per incident was $15,000 in 2023 (FBI IC3 BEC section)
- In Verizon DBIR 2024, the estimated cost of breaches is described as varying by incident type; the report’s incident-type distributions include quantification of cost drivers
- 55% of organizations reported using EDR (endpoint detection and response) in 2024 (survey-based measure in SonicWall’s 2024 report coverage).
- Cybersecurity spending in North America reached $30.2 billion in 2024 (projected by IDC).
- IDC forecasts global cybersecurity spending to grow at a 13.8% CAGR from 2024 to 2027.
- 48% of organizations said their backup systems are not fully protected against ransomware, according to Druva’s 2024 data resilience research.
- 75% of organizations reported using multifactor authentication (MFA) in Microsoft’s Digital Defense Report (2024)
- In 2023, phishing accounted for 76% of reported security incidents in APWG’s Quarterly Phishing Activity Trends report
- 52% of organizations report they use security automation to improve response times, according to the SANS 2024 survey on security automation
- 70% of organizations planned to increase investment in security operations (SecOps) in 2024, based on a CrowdStrike survey of IT and security leaders
- 57% of organizations reported deploying threat intelligence feeds in 2024, per a ThreatConnect/industry survey
Phishing and credential theft drive most breaches, while patching and ransomware readiness lag despite rising security spending.
Threat Landscape
Threat Landscape Interpretation
Cost Analysis
Cost Analysis Interpretation
Market & Adoption
Market & Adoption Interpretation
Security Practices
Security Practices Interpretation
Industry Trends
Industry Trends Interpretation
User Adoption
User Adoption Interpretation
Performance Metrics
Performance Metrics Interpretation
How We Rate Confidence
Every statistic is queried across four AI models (ChatGPT, Claude, Gemini, Perplexity). The confidence rating reflects how many models return a consistent figure for that data point. Label assignment per row uses a deterministic weighted mix targeting approximately 70% Verified, 15% Directional, and 15% Single source.
Only one AI model returns this statistic from its training data. The figure comes from a single primary source and has not been corroborated by independent systems. Use with caution; cross-reference before citing.
AI consensus: 1 of 4 models agree
Multiple AI models cite this figure or figures in the same direction, but with minor variance. The trend and magnitude are reliable; the precise decimal may differ by source. Suitable for directional analysis.
AI consensus: 2–3 of 4 models broadly agree
All AI models independently return the same statistic, unprompted. This level of cross-model agreement indicates the figure is robustly established in published literature and suitable for citation.
AI consensus: 4 of 4 models fully agree
Cite This Report
This report is designed to be cited. We maintain stable URLs and versioned verification dates. Copy the format appropriate for your publication below.
Marcus Engström. (2026, February 13). Computer Security Statistics. Gitnux. https://gitnux.org/computer-security-statistics
Marcus Engström. "Computer Security Statistics." Gitnux, 13 Feb 2026, https://gitnux.org/computer-security-statistics.
Marcus Engström. 2026. "Computer Security Statistics." Gitnux. https://gitnux.org/computer-security-statistics.
References
- 1assets.sophos.com/X14/secure-notification/2023-state-of-ransomware-ebook.pdf
- 13assets.sophos.com/X14/secure-notification/sophos-state-of-ransomware-2024.pdf
- 2microsoft.com/en-us/security/business/security-intelligence-report
- 25microsoft.com/en-us/security/business/microsoft-digital-defense-report
- 3cisa.gov/known-exploited-vulnerabilities-catalog
- 17cisa.gov/known-exploited-vulnerabilities
- 4enisa.europa.eu/publications/enisa-threat-landscape-2023
- 5blog.google/threat-analysis-group/
- 6ibm.com/reports/data-breach
- 14ibm.com/security/data-breach
- 7ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf
- 8verizon.com/business/resources/reports/dbir/
- 9gov.uk/government/statistics/cyber-security-breaches-survey-2024
- 10weforum.org/reports/global-risks-report-2024/
- 11blog.chainalysis.com/reports/ransomware-2024/
- 12spglobal.com/ratings/en/research/articles/230601-cyber-insurance-market-remains-volatile-12919401
- 15spglobal.com/ratings/en/research/articles/101223-cyber-insurance-a-whole-new-business-risk-12481702
- 16crowdstrike.com/resources/reports/global-threat-report/
- 28crowdstrike.com/resources/reports/
- 18isc2.org/Research/Workforce-Study
- 19sonicwall.com/products/threat-reports/2024/sonicwall-cybersecurity-threat-report-2024
- 20idc.com/getdoc.jsp?containerId=US51716824
- 21idc.com/getdoc.jsp?containerId=prUS52042724
- 22sailpoint.com/resources/identity-security-report/
- 23gartner.com/en/newsroom/press-releases/2023-09-25-gartner-says-zero-trust-architectures-are-moving-to-implementation
- 24druva.com/resources/state-of-data-resilience-report/
- 26apwg.org/trendsreports/
- 27sans.org/reading-room/whitepapers/automation
- 29threatconnect.com/resources/
- 30cloud.google.com/blog/topics/threat-intelligence/mandiant-m-trends-2023-report
- 31cloud.google.com/blog/topics/threat-intelligence/mandiant-m-trends-2024-report







