Key Takeaways
- 57% of organizations reported deploying security automation to reduce the time to respond to threats (IBM 2024 report summary).
- 48% of organizations reported using identity governance and administration (IGA) capabilities to reduce account misuse (SailPoint 2024 survey).
- 65% of organizations said they use security logging/monitoring (SIEM/SOAR) to detect misuse and misconfigurations (Gartner, 2024 security monitoring).
- 54% of organizations said ransomware was the most financially impactful threat they experienced (2024 survey).
- In 2023, 38% of breaches involved malware spread through phishing or email attachments (Verizon DBIR 2024).
- $2.98 billion total reported losses from cybercrime in the US in 2023 (FBI IC3 2023 report).
- In 2023, malware accounted for 35% of breaches involving cyber-physical systems (ENISA threat landscape 2024, ICS).
- The global cloud access security broker (CASB) market was $1.2 billion in 2024 and forecast to reach $4.1 billion by 2030 (MarketsandMarkets, 2024).
- The global security orchestration, automation, and response (SOAR) market was valued at $2.7 billion in 2023 (Fortune Business Insights, 2024).
- The global security information and event management (SIEM) market was projected to be $35.6 billion in 2024 (Gartner market numbers summarized by vendor research).
- $1.95 million was the median cost of a data breach involving malicious or criminal conduct in 2023
- NIST SP 800-63B recommends that verifiers use MFA to mitigate account takeover and credential misuse, including phishing-resistant options
- NIST SP 800-171 requires access control policies and procedures and mandates audit logs for controlled access to protect against unauthorized use
From phishing to ransomware, most breaches and losses spur faster automation, stronger monitoring, and MFA to curb account misuse.
Related reading
Mitigation Adoption
Mitigation Adoption Interpretation
Threat Landscape
Threat Landscape Interpretation
Industry Trends
Industry Trends Interpretation
Market Size
Market Size Interpretation
Cost Analysis
Cost Analysis Interpretation
Governance & Controls
Governance & Controls Interpretation
How We Rate Confidence
Every statistic is queried across four AI models (ChatGPT, Claude, Gemini, Perplexity). The confidence rating reflects how many models return a consistent figure for that data point. Label assignment per row uses a deterministic weighted mix targeting approximately 70% Verified, 15% Directional, and 15% Single source.
Only one AI model returns this statistic from its training data. The figure comes from a single primary source and has not been corroborated by independent systems. Use with caution; cross-reference before citing.
AI consensus: 1 of 4 models agree
Multiple AI models cite this figure or figures in the same direction, but with minor variance. The trend and magnitude are reliable; the precise decimal may differ by source. Suitable for directional analysis.
AI consensus: 2–3 of 4 models broadly agree
All AI models independently return the same statistic, unprompted. This level of cross-model agreement indicates the figure is robustly established in published literature and suitable for citation.
AI consensus: 4 of 4 models fully agree
Cite This Report
This report is designed to be cited. We maintain stable URLs and versioned verification dates. Copy the format appropriate for your publication below.
James Okoro. (2026, February 13). Misusing Statistics. Gitnux. https://gitnux.org/misusing-statistics
James Okoro. "Misusing Statistics." Gitnux, 13 Feb 2026, https://gitnux.org/misusing-statistics.
James Okoro. 2026. "Misusing Statistics." Gitnux. https://gitnux.org/misusing-statistics.
References
- 1ibm.com/reports/data-breach
- 22ibm.com/security/data-breach
- 2sailpoint.com/resources/reports/2024-identity-security-risk-trends/
- 3gartner.com/en/newsroom/press-releases/2024-02-06-gartner-identifies-the-top-trends-in-security-operations-for-2024
- 17gartner.com/en/newsroom/press-releases/2024-04-17-gartner-says-worldwide-end-user-spending-on-security-services-will-reach-
- 18gartner.com/en/newsroom/press-releases/2024-04-17-gartner-says-worldwide-end-user-spending-on-security-products-and-services-will-reach-
- 4checkpoint.com/resources/reports/ransomware-report-2024/
- 5verizon.com/business/resources/reports/dbir/
- 6ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf
- 8ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf
- 7enisa.europa.eu/publications/enisa-threat-landscape-2024
- 9cvedetails.com/vulnerability/2022-OpenSSL-Directory-Traversal-CVE-2022-0778.html
- 10transparencyreport.google.com/safe-browsing/overview
- 11marketsandmarkets.com/Market-Reports/casb-market-143105861.html
- 16marketsandmarkets.com/Market-Reports/cloud-security-market-169140690.html
- 21marketsandmarkets.com/Market-Reports/privileged-access-management-market-154786704.html
- 12fortunebusinessinsights.com/soar-market-106107
- 13fortunebusinessinsights.com/security-information-event-management-market-103375
- 14fortunebusinessinsights.com/identity-access-management-market-102801
- 15fortunebusinessinsights.com/edr-market-102909
- 19imarcgroup.com/unified-endpoint-management-uro-market
- 20gminsights.com/industry-analysis/cloud-security-posture-management-market
- 23pages.nist.gov/800-63-3/sp800-63b.html
- 24csrc.nist.gov/pubs/sp/800/171/r2/final







