Key Takeaways
- 43% of all cyber attacks target small businesses despite them representing only 18% of the economy
- Small businesses experience 4,000 cyber attacks per day on average
- 66% of small businesses report experiencing at least one cyber attack in the past year
- 60% of small business data breaches involve stolen credentials
- Average time to identify a breach in small businesses is 200 days
- 83% of small businesses that suffer a breach close within 24 months
- Average cost of a data breach for small businesses is $25,000
- 60% of small businesses shut down after a cyber attack costing over $100K
- Ransomware costs small businesses $1.85M on average including downtime
- 95% of small businesses use antivirus software inconsistently
- Only 26% of SMBs have formal cybersecurity policies
- 57% of small businesses lack employee cybersecurity training
- Cyber attacks on small businesses expected to rise 15% in 2024
- By 2025, 75% of SMBs will face ransomware annually
- AI-driven attacks to impact 50% of small businesses by 2026
Small businesses are under constant and severe cyber attack threat despite inadequate security.
Data Breach Incidents
Data Breach Incidents Interpretation
Economic Impacts
Economic Impacts Interpretation
Emerging Trends and Predictions
Emerging Trends and Predictions Interpretation
Prevalence of Cyber Attacks
Prevalence of Cyber Attacks Interpretation
Security Measures and Adoption
Security Measures and Adoption Interpretation
Sources & References
- Reference 1VERIZONverizon.comVisit source
- Reference 2KEEPERSECURITYkeepersecurity.comVisit source
- Reference 3CNBCcnbc.comVisit source
- Reference 4SOPHOSsophos.comVisit source
- Reference 5NATIONWIDEnationwide.comVisit source
- Reference 6IBMibm.comVisit source
- Reference 7CLOUDFLAREcloudflare.comVisit source
- Reference 8PONEMONponemon.orgVisit source
- Reference 9STATISTAstatista.comVisit source
- Reference 10MICROSOFTmicrosoft.comVisit source
- Reference 11UPGUARDupguard.comVisit source
- Reference 12PROOFPOINTproofpoint.comVisit source
- Reference 13IC3ic3.govVisit source
- Reference 14CHECKPOINTcheckpoint.comVisit source
- Reference 15ZDNETzdnet.comVisit source
- Reference 16CROWDSTRIKEcrowdstrike.comVisit source
- Reference 17DARKTRACEdarktrace.comVisit source
- Reference 18HHShhs.govVisit source
- Reference 19APWGapwg.orgVisit source
- Reference 20BLEEPINGCOMPUTERbleepingcomputer.comVisit source
- Reference 21MCAFEEmcafee.comVisit source
- Reference 22KASPERSKYkaspersky.comVisit source
- Reference 23TENABLEtenable.comVisit source
- Reference 24AKAMAIakamai.comVisit source
- Reference 25FTCftc.govVisit source
- Reference 26SALTsalt.securityVisit source
- Reference 27DRAGOSdragos.comVisit source
- Reference 28LOOKOUTlookout.comVisit source
- Reference 29OCRPORTALocrportal.hhs.govVisit source
- Reference 30FINCENfincen.govVisit source
- Reference 31IDENTITYTHEFTidentitytheft.govVisit source
- Reference 32NCESnces.ed.govVisit source
- Reference 33HAVEIBEENPWNEDhaveibeenpwned.comVisit source
- Reference 34CISAcisa.govVisit source
- Reference 35SPECTEEspectee.comVisit source
- Reference 36TSAtsa.govVisit source
- Reference 37GDPRgdpr.euVisit source
- Reference 38BREACHSENSEbreachsense.comVisit source
- Reference 39NONPROFITTECHYnonprofittechy.comVisit source
- Reference 40MARSHmarsh.comVisit source
- Reference 41RESILIENTXresilientx.comVisit source
- Reference 42ISC2isc2.orgVisit source
- Reference 43KNOWBE4knowbe4.comVisit source
- Reference 44GARTNERgartner.comVisit source
- Reference 45CSOONLINEcsoonline.comVisit source
- Reference 46CISCOcisco.comVisit source
- Reference 47NISTnist.govVisit source
- Reference 48SPLUNKsplunk.comVisit source
- Reference 49AV-TESTav-test.orgVisit source
- Reference 50CYBERARKcyberark.comVisit source
- Reference 51BITDEFENDERbitdefender.comVisit source
- Reference 52CISCO-ANNUAL-INTERNET-REPORTcisco-annual-internet-reportVisit source
- Reference 53QUALYSqualys.comVisit source
- Reference 54FIDOALLIANCEfidoalliance.orgVisit source
- Reference 55CYBERSECURITYVENTUREScybersecurityventures.comVisit source
- Reference 56GSMAgsma.comVisit source
- Reference 57DIGITAL-STRATEGYdigital-strategy.ec.europa.euVisit source
- Reference 58CHAINALYSISchainalysis.comVisit source






