Key Takeaways
- In 2023, phishing attacks represented 36% of all data breaches analyzed in the Verizon Data Breach Investigations Report
- Globally, 83% of organizations experienced at least one successful phishing attack in 2022 according to Proofpoint's State of the Phish report
- Phishing was the initial attack vector in 44% of breaches involving social engineering per Verizon DBIR 2023
- Ransomware attacks grew 93% year-over-year in 2023 per Sophos State of Ransomware report
- 66% of organizations hit by ransomware in 2023 paid the ransom per Sophos
- Average ransomware recovery cost $1.54 million in 2022 per Sophos data
- Global data breaches cost $4.45 million average in 2023 per IBM report
- 2,365 confirmed data breaches in US in 2023 per Identity Theft Resource Center
- 82% of breaches involve human element per Verizon DBIR 2023
- 42% of internet users experienced online harassment in 2023 per Pew Research
- 41% of Americans faced cyberbullying in 2022 per Statista survey
- 59% of US teens experienced cyberbullying per Pew 2022 Teens and Cyberbullying
- Identity theft complaints reached 1.1 million in 2023 per FTC
- $12.5 billion in fraud losses in 2023 per FTC Consumer Sentinel
- 465,000 credit card fraud reports in 2023 per FTC data
Phishing remains the leading cause of devastating cyberattacks and data breaches globally.
Cyberbullying and Harassment
Cyberbullying and Harassment Interpretation
Data Breaches and Leaks
Data Breaches and Leaks Interpretation
Identity Theft and Financial Fraud
Identity Theft and Financial Fraud Interpretation
Malware and Ransomware
Malware and Ransomware Interpretation
Phishing and Social Engineering
Phishing and Social Engineering Interpretation
Sources & References
- Reference 1VERIZONverizon.comVisit source
- Reference 2PROOFPOINTproofpoint.comVisit source
- Reference 3KEEPNETLABSkeepnetlabs.comVisit source
- Reference 4COFENSEcofense.comVisit source
- Reference 5STATISTAstatista.comVisit source
- Reference 6DOCSdocs.apwg.orgVisit source
- Reference 7IC3ic3.govVisit source
- Reference 8KNOWBE4knowbe4.comVisit source
- Reference 9BLACKCLOAKblackcloak.ioVisit source
- Reference 10PHISHLABSphishlabs.comVisit source
- Reference 11IBMibm.comVisit source
- Reference 12RESEARCHresearch.checkpoint.comVisit source
- Reference 13SANSsans.orgVisit source
- Reference 14BARRACUDAbarracuda.comVisit source
- Reference 15ZSCALERzscaler.comVisit source
- Reference 16LOOKOUTlookout.comVisit source
- Reference 17GARTNERgartner.comVisit source
- Reference 18ABNORMALSECURITYabnormalsecurity.comVisit source
- Reference 19MIMECASTmimecast.comVisit source
- Reference 20APWGapwg.orgVisit source
- Reference 21AV-TESTav-test.orgVisit source
- Reference 22MICROSOFTmicrosoft.comVisit source
- Reference 23SOPHOSsophos.comVisit source
- Reference 24COVEWAREcoveware.comVisit source
- Reference 25AV-COMPARATIVESav-comparatives.orgVisit source
- Reference 26MALWAREBYTESmalwarebytes.comVisit source
- Reference 27D3SECURITYd3security.comVisit source
- Reference 28NVLPUBSnvlpubs.nist.govVisit source
- Reference 29SECURELISTsecurelist.comVisit source
- Reference 30CYBLEcyble.comVisit source
- Reference 31VEEAMveeam.comVisit source
- Reference 32ANYany.runVisit source
- Reference 33SOCRADARsocradar.ioVisit source
- Reference 34EMSISOFTemsisoft.comVisit source
- Reference 35CORVUSINSURANCEcorvusinsurance.comVisit source
- Reference 36TRENDMICROtrendmicro.comVisit source
- Reference 37BLOGblog.virustotal.comVisit source
- Reference 38THREATFABRICthreatfabric.comVisit source
- Reference 39UNIT42unit42.paloaltonetworks.comVisit source
- Reference 40IDTHEFTCENTERidtheftcenter.orgVisit source
- Reference 41HHShhs.govVisit source
- Reference 42RISKBASEDSECURITYriskbasedsecurity.comVisit source
- Reference 43CISAcisa.govVisit source
- Reference 44CYBERNEWScybernews.comVisit source
- Reference 45ENISAenisa.europa.euVisit source
- Reference 46PONEMONponemon.orgVisit source
- Reference 47UBERuber.comVisit source
- Reference 48BLOGblog.23andme.comVisit source
- Reference 49UPGUARDupguard.comVisit source
- Reference 50SURFSHARKsurfshark.comVisit source
- Reference 51PEWRESEARCHpewresearch.orgVisit source
- Reference 52CYBERBULLYINGcyberbullying.orgVisit source
- Reference 53ADLadl.orgVisit source
- Reference 54ENEAenea.comVisit source
- Reference 55UNICEFunicef.orgVisit source
- Reference 56GLSENglsen.orgVisit source
- Reference 57FBIfbi.govVisit source
- Reference 58NEAnea.orgVisit source
- Reference 59JAMANETWORKjamanetwork.comVisit source
- Reference 60CYBERCIVILRIGHTScybercivilrights.orgVisit source
- Reference 61STOPBULLYINGstopbullying.govVisit source
- Reference 62NEWZOOnewzoo.comVisit source
- Reference 63COUNTERHATEcounterhate.comVisit source
- Reference 64NCESnces.ed.govVisit source
- Reference 65DITCHTHELABELditchthelabel.orgVisit source
- Reference 66STREAMLABSstreamlabs.comVisit source
- Reference 67TODAYtoday.yougov.comVisit source
- Reference 68FRAfra.europa.euVisit source
- Reference 69CIPDcipd.orgVisit source
- Reference 70ISAFEisafe.orgVisit source
- Reference 71ISDGLOBALisdglobal.orgVisit source
- Reference 72THORNthorn.orgVisit source
- Reference 73FTCftc.govVisit source
- Reference 74JAVELINSTRATEGYjavelinstrategy.comVisit source
- Reference 75CONSUMERconsumer.ftc.govVisit source
- Reference 76EXPERIANexperian.comVisit source
- Reference 77AITEGROUPaitegroup.comVisit source
- Reference 78CHAINALYSISchainalysis.comVisit source
- Reference 79AARPaarp.orgVisit source
- Reference 80USPSOIGuspsoig.govVisit source
- Reference 81IDRNDidrnd.aiVisit source
- Reference 82IRSirs.govVisit source
- Reference 83FEEDZAIfeedzai.comVisit source
- Reference 84IDANALYTICSidanalytics.comVisit source
- Reference 85JUNIPERRESEARCHjuniperresearch.comVisit source






