Key Takeaways
- 74% of organizations saw an increase in phishing attempts targeting remote workers in 2022
- Remote workers clicked on 1.5 times more phishing links than office workers in 2021
- 91% of cybersecurity professionals reported phishing as the top threat to remote employees
- VPN usage among remote workers reached 85% in 2023, but 32% use weak protocols
- 41% of remote access breaches involved compromised VPN credentials
- Only 54% of organizations enforce MFA on all remote VPN connections
- Endpoint detection failed on 61% of remote devices in 2022
- 82% of malware infections occurred on remote home devices
- Only 39% of remote laptops have full disk encryption enabled
- Remote work data breaches averaged $4.24M cost in 2023
- 60% of remote-related breaches involved stolen credentials
- Ransomware incidents up 93% linked to remote work flaws
- 45% of remote training programs reduced phishing susceptibility by 40%
- Only 31% of remote workers receive quarterly cyber training
- Security awareness training cut remote incidents by 70% in trained groups
Rising remote work has drastically increased phishing attacks, compromising security for many businesses and individuals.
Data Breaches and Incidents
- Remote work data breaches averaged $4.24M cost in 2023
- 60% of remote-related breaches involved stolen credentials
- Ransomware incidents up 93% linked to remote work flaws
- Avg downtime from remote breach 23 days, costing $9.44M
- 43% of all 2022 breaches traced to remote worker errors
- Identity theft from remote incidents affected 15M users in 2022
- 71% of healthcare remote breaches exposed PHI data
- Financial sector remote breaches cost 2.5x industry avg at $5.9M
- 28% of remote breaches undetected for over 200 days
- Supply chain breaches via remote partners up 42%
- 65% of SMBs suffered remote data breach in past 2 years
- Cloud misconfigs in remote access caused 19% of exposures
- 54% of remote incidents involved insider threats
- Avg remote breach notification time 49 days past legal limits
- 77% of large orgs had at least one remote breach in 2022
- DDoS tied to remote breaches disrupted 51% of victims over a week
- 36% of remote breaches led to regulatory fines averaging $4.5M
- Exfiltration volume from remote breaches avg 100GB per incident
- 62% of remote breaches exploited unpatched remote software
- Third-party remote access caused 44% of vendor breaches
- 49% recovery rate from remote ransomware below 50% success
- Remote incident response time avg 277 days to contain
- 58% of breaches involved remote customer data exposure
- Insurance claims from remote cyber incidents up 225% since 2020
- 67% of remote breaches required C-level notification
- Multi-stage remote attacks in 39% of incidents
- 73% of orgs paid ransom in remote ransomware cases
- Remote work increased breach probability by 300% for non-prepped orgs
- 81% of CISOs expect more remote incidents in 2024
Data Breaches and Incidents Interpretation
Device and Endpoint Security
- Endpoint detection failed on 61% of remote devices in 2022
- 82% of malware infections occurred on remote home devices
- Only 39% of remote laptops have full disk encryption enabled
- Remote endpoint breaches cost average $4.45M per incident
- 67% of remote workers use unpatched personal devices for work
- BYOD policy violations on 53% of remote endpoints
- Ransomware hit remote endpoints 2.7x more than office ones
- 71% of orgs lack EDR on all remote devices
- USB drive infections from remote home use up 192%
- 48% of remote mobile devices have jailbreak/root vulnerabilities
- Patch management lags 45 days average on remote endpoints
- 64% of remote IoT devices unsecured in home offices
- Lost/stolen remote laptops caused 18% of data breaches
- 55% of remote endpoints bypass corporate firewalls via cloud apps
- Firmware attacks on remote hardware up 337% in 2022
- 79% of CISOs report endpoint visibility issues in remote setups
- Remote printer vulnerabilities exploited in 12% of attacks
- 62% of remote Windows endpoints run unsupported versions
- Mobile endpoint malware up 50% for remote users
- 41% of remote devices lack anti-malware real-time scanning
- Shadow IT apps on remote endpoints at 74% usage rate
- 68% of orgs saw endpoint compromise lead to network breach remotely
- Remote virtual desktop (VDI) vulns in 29% of deployments
- 83% increase in remote endpoint supply chain attacks
- Avg remote endpoint dwell time 21 days vs 11 in-office
- 57% of remote smart home devices pose endpoint risks
- BIOS/UEFI attacks doubled on remote unmanaged devices
- 52% of remote endpoints use weak local admin passwords
Device and Endpoint Security Interpretation
Phishing and Social Engineering
- 74% of organizations saw an increase in phishing attempts targeting remote workers in 2022
- Remote workers clicked on 1.5 times more phishing links than office workers in 2021
- 91% of cybersecurity professionals reported phishing as the top threat to remote employees
- Phishing attacks rose by 220% during the shift to remote work in 2020
- 36% of remote workers admitted to falling for phishing scams in the past year
- Spear-phishing attacks on remote executives increased by 424% in 2021
- 68% of phishing emails target remote work tools like Zoom and Microsoft Teams
- Home-based phishing incidents accounted for 43% of all breaches in 2022
- 82% of remote phishing attacks use COVID-19 related lures even in 2023
- Vishing calls to remote workers surged 158% year-over-year in 2022
- 55% of organizations lack anti-phishing training for remote staff
- Smishing attacks on mobile devices of remote workers up 300% since 2020
- 64% of remote workers use personal email for work, increasing phishing risk
- Phishing simulation tests show remote workers fail at 28% rate vs 15% in-office
- 47% of all data breaches start with phishing on remote endpoints
- Business email compromise via phishing cost remote orgs $2.4B in 2022
- 71% of CISOs cite phishing as primary remote work vulnerability
- Remote phishing success rate 3x higher due to lack of oversight
- 89% of orgs saw phishing volume increase post-remote shift
- Quishing (QR code phishing) attacks on remote users up 51% in 2023
- 62% of remote workers ignore phishing warnings more often than in-office
- Adversary-in-the-middle phishing hit 25% of remote sessions in 2022
- 78% of ransomware starts with phishing on remote home networks
- Remote worker phishing reports dropped 40% due to fatigue
- 51% increase in multi-channel phishing campaigns targeting remotes
- 66% of remote phishing uses legitimate remote tool branding
- Home router phishing exploits affected 19% of remote users
- 83% of CISOs worry about social engineering on remote teams
- Phishing led to 22% of remote work identity compromises
- 59% of remote breaches traced to social engineering tactics
Phishing and Social Engineering Interpretation
Training and Compliance
- 45% of remote training programs reduced phishing susceptibility by 40%
- Only 31% of remote workers receive quarterly cyber training
- Security awareness training cut remote incidents by 70% in trained groups
- 66% of orgs lack remote-specific compliance policies
- Phishing test pass rate for trained remote staff at 92% vs 60% untrained
- 52% of remote employees ignore password policies without training
- Compliance audits skipped for remote workers in 47% of firms
- Gamified training boosted remote compliance 55%
- 78% of untrained remote workers violate data handling rules
- Annual training mandated but only 43% complete for remotes
- 61% reduction in remote errors post-simulation training
- 69% of CISOs prioritize remote training budget increases
- Policy acknowledgment rates 89% with remote micro-training
- 54% of compliance failures due to remote oversight gaps
- VR training for remote phishing cut failures by 63%
- 72% of orgs use video for remote compliance delivery
- Training ROI shows $7 saved per $1 spent on remote security
- 48% of remote non-compliance from lack of role-based training
- Continuous training adopted by 35% reduces incidents 50%
- 83% awareness after training but drops to 45% in 6 months without refreshers
- GDPR compliance training for remote up 120% demand
- 67% of SMBs skip remote training due to cost
- Metrics show 40% incident drop post-remote tabletop exercises
- 76% employee engagement higher with interactive remote modules
- Compliance certification rates 95% with automated remote tracking
- 59% untrained remotes share screens insecurely in meetings
- Peer-led remote training 2x more effective than top-down
- 64% of orgs measure training via remote quiz scores avg 85%
- Multi-language remote training covers 92% global workforce gaps
Training and Compliance Interpretation
VPN and Access Security
- VPN usage among remote workers reached 85% in 2023, but 32% use weak protocols
- 41% of remote access breaches involved compromised VPN credentials
- Only 54% of organizations enforce MFA on all remote VPN connections
- VPN traffic attacks surged 300% during peak remote work in 2020
- 67% of VPNs in remote setups vulnerable to known exploits
- Legacy VPNs used by 28% of remote orgs lack modern encryption
- 73% of CISOs report VPN as top remote access risk vector
- DDoS attacks on VPN endpoints up 150% against remote firms
- 49% of remote workers share VPN credentials insecurely
- Zero-trust VPN adoption only at 23% for remote access in 2023
- VPN brute-force attacks increased 4x post-remote shift
- 62% of orgs experienced VPN outages due to cyber attacks in 2022
- Shadow VPN usage by remote employees at 37%, bypassing security
- 81% of remote VPN sessions lack session timeout enforcement
- VPN protocol flaws exploited in 15% of remote breaches
- Remote VPN split-tunneling enabled in 56% of configs, risking leaks
- 70% of small businesses use free VPNs for remote work, highly vulnerable
- VPN credential stuffing hit 2.3 billion attempts in 2022 for remotes
- Only 46% audit remote VPN logs regularly
- SASE replacing VPN for 29% of remote orgs in 2023
- 65% of VPN attacks target Pulse Secure vulnerabilities in remote setups
- Remote RDP over VPN abused in 34% of lateral movement cases
- 77% of enterprises plan VPN upgrades for remote security by 2024
- VPN misconfigs caused 21% of remote data exposures
- 88% of remote workers connect via unsecured public Wi-Fi despite VPN
- Mobile VPN adoption for remote at 52%, but app vulns high
- 59% of orgs saw unauthorized VPN access attempts weekly
- VPN gateway failures impacted 44% of remote productivity in attacks
- 76% of CISOs prioritize VPN hardening for remote threats
VPN and Access Security Interpretation
Sources & References
- Reference 1CISCOcisco.comVisit source
- Reference 2PROOFPOINTproofpoint.comVisit source
- Reference 3KEEPERSECURITYkeepersecurity.comVisit source
- Reference 4VERIZONverizon.comVisit source
- Reference 5PONEMONponemon.orgVisit source
- Reference 6CROWDSTRIKEcrowdstrike.comVisit source
- Reference 7ZDNETzdnet.comVisit source
- Reference 8IBMibm.comVisit source
- Reference 9DARKTRACEdarktrace.comVisit source
- Reference 10SANSsans.orgVisit source
- Reference 11LOOKOUTlookout.comVisit source
- Reference 12FLEXERAflexera.comVisit source
- Reference 13KNOWBE4knowbe4.comVisit source
- Reference 14MANDIANTmandiant.comVisit source
- Reference 15FBIfbi.govVisit source
- Reference 16ESECURITYPLANETesecurityplanet.comVisit source
- Reference 17FORCEPOINTforcepoint.comVisit source
- Reference 18PALOALTONETWORKSpaloaltonetworks.comVisit source
- Reference 19CHECKPOINTcheckpoint.comVisit source
- Reference 20NETSKOPEnetskope.comVisit source
- Reference 21ZSCALERzscaler.comVisit source
- Reference 22SOPHOSsophos.comVisit source
- Reference 23MICROSOFTmicrosoft.comVisit source
- Reference 24TRENDMICROtrendmicro.comVisit source
- Reference 25SYMANTECsymantec.comVisit source
- Reference 26AKAMAIakamai.comVisit source
- Reference 27DELOITTEdeloitte.comVisit source
- Reference 28OKTAokta.comVisit source
- Reference 29RAPID7rapid7.comVisit source
- Reference 30IMPERVAimperva.comVisit source
- Reference 31GREENBONEgreenbone.netVisit source
- Reference 32CLOUDFLAREcloudflare.comVisit source
- Reference 33NORDVPNnordvpn.comVisit source
- Reference 34DASHLANEdashlane.comVisit source
- Reference 35GARTNERgartner.comVisit source
- Reference 36CISAcisa.govVisit source
- Reference 37IDCidc.comVisit source
- Reference 38UPGUARDupguard.comVisit source
- Reference 39EXPRESSVPNexpressvpn.comVisit source
- Reference 40MALWAREBYTESmalwarebytes.comVisit source
- Reference 41BITSIGHTbitsight.comVisit source
- Reference 42AV-TESTav-test.orgVisit source
- Reference 43CITRIXcitrix.comVisit source
- Reference 44SENTINELONEsentinelone.comVisit source
- Reference 45IDENTITYTHEFTidentitytheft.comVisit source
- Reference 46HIPAAJOURNALhipaajournal.comVisit source
- Reference 47HISCOXhiscox.comVisit source
- Reference 48PWCpwc.comVisit source
- Reference 49COVEWAREcoveware.comVisit source
- Reference 50TRUSTWAVEtrustwave.comVisit source
- Reference 51MARSHmarsh.comVisit source
- Reference 52FIREEYEfireeye.comVisit source
- Reference 53ISACAisaca.orgVisit source
- Reference 54COFENSEcofense.comVisit source
- Reference 55NOVACOASTnovacoast.comVisit source
- Reference 56NISTnist.govVisit source
- Reference 57ROI-INSTITUTEroi-institute.comVisit source
- Reference 58GDPRgdpr.euVisit source
- Reference 59EDXedx.comVisit source
- Reference 60SERVICE-NOWservice-now.comVisit source
- Reference 61ZOOMzoom.comVisit source
- Reference 62HARVARDharvard.eduVisit source
- Reference 63COURSERAcoursera.comVisit source






