Key Takeaways
- In 2023, 61% of small and medium-sized businesses (SMBs) experienced at least one cyber attack, with phishing being the most common vector accounting for 36% of incidents
- SMBs with fewer than 100 employees faced a 28% increase in ransomware attacks compared to 2022, totaling over 1.2 million attempts blocked across surveyed firms
- 43% of all cyber breaches targeted SMBs, despite them representing only 30% of the market economy
- Ransomware accounted for 24% of SMB malware detections in 2023, with LockBit variant at 41% share
- Phishing emails targeting SMBs increased 15% YoY, with 91% containing malicious links or attachments
- DDoS attacks on SMBs lasted average 45 hours, peaking at 1.2 Tbps volume
- Average SMB data breach cost reached $4.45 million in 2023, up 15% from 2022
- Ransomware payments by SMBs averaged $1.54 million per incident, with 46% paying demands
- Phishing-related losses for SMBs totaled $52 million quarterly in US
- 81% of SMBs lack formal cybersecurity training programs, leading to higher vulnerability
- Only 26% of SMBs use multi-factor authentication (MFA) across all accounts
- 57% of SMBs have not updated antivirus software in over 6 months
- 44% of SMBs recovered fully from ransomware within 24 hours due to backups
- Average SMB breach detection time: 277 days, with containment in 84 days
- 54% of SMBs restored operations within a week post-incident using offsite backups
SMBs faced a surge in cyberattacks last year with damaging financial consequences.
Financial Losses
Financial Losses Interpretation
Prevalence of Attacks
Prevalence of Attacks Interpretation
Recovery and Resilience
Recovery and Resilience Interpretation
Security Practices
Security Practices Interpretation
Types of Threats
Types of Threats Interpretation
Sources & References
- Reference 1VERIZONverizon.comVisit source
- Reference 2SOPHOSsophos.comVisit source
- Reference 3IBMibm.comVisit source
- Reference 4CISCOcisco.comVisit source
- Reference 5PONEMONponemon.orgVisit source
- Reference 6MICROSOFTmicrosoft.comVisit source
- Reference 7PROOFPOINTproofpoint.comVisit source
- Reference 8ENISAenisa.europa.euVisit source
- Reference 9CROWDSTRIKEcrowdstrike.comVisit source
- Reference 10AUSCERTauscert.org.auVisit source
- Reference 11PTSECURITYptsecurity.comVisit source
- Reference 12NCSCncsc.gov.ukVisit source
- Reference 13MCAFEEmcafee.comVisit source
- Reference 14CHECKPOINTcheckpoint.comVisit source
- Reference 15HHShhs.govVisit source
- Reference 16CICcic.gc.caVisit source
- Reference 17CODE42code42.comVisit source
- Reference 18: HTTPS:: https:Visit source
- Reference 19ZSCALERzscaler.comVisit source
- Reference 20KASPERSKYkaspersky.comVisit source
- Reference 21AKAMAIakamai.comVisit source
- Reference 22RADWAREradware.comVisit source
- Reference 23KNOWBE4knowbe4.comVisit source
- Reference 24BARRACUDAbarracuda.comVisit source
- Reference 25EDUCATIONSUPERHIGHWAYeducationsuperhighway.orgVisit source
- Reference 26INTERPOLinterpol.intVisit source
- Reference 27MANDIANTmandiant.comVisit source
- Reference 28DRAGOSdragos.comVisit source
- Reference 29PALOALTONETWORKSpaloaltonetworks.comVisit source
- Reference 30FORTINETfortinet.comVisit source
- Reference 31APWGapwg.orgVisit source
- Reference 32CLOUDFLAREcloudflare.comVisit source
- Reference 33IC3ic3.govVisit source
- Reference 34CISAcisa.govVisit source
- Reference 35MALWAREBYTESmalwarebytes.comVisit source
- Reference 36SPYCLOUDspycloud.comVisit source
- Reference 37EXPLOIT-DBexploit-db.comVisit source
- Reference 38GUARDICOREguardicore.comVisit source
- Reference 39LOOKOUTlookout.comVisit source
- Reference 40OWASPowasp.orgVisit source
- Reference 41CYBEREASONcybereason.comVisit source
- Reference 42UNIT21unit21.aiVisit source
- Reference 43NETSKOPEnetskope.comVisit source
- Reference 44TENABLEtenable.comVisit source
- Reference 45BINARYEDGEbinaryedge.ioVisit source
- Reference 46EFFICIENTIPefficientip.comVisit source
- Reference 47FIREEYEfireeye.comVisit source
- Reference 48ARUBANETWORKSarubanetworks.comVisit source
- Reference 49IMPERVAimperva.comVisit source
- Reference 50FBIfbi.govVisit source
- Reference 51INCAPSULAincapsula.comVisit source
- Reference 52FTCftc.govVisit source
- Reference 53INSURANCETHOUGHTLEADERSHIPinsurancethoughtleadership.comVisit source
- Reference 54GARTNERgartner.comVisit source
- Reference 55GDPRgdpr.euVisit source
- Reference 56BAKERLAWbakerlaw.comVisit source
- Reference 57DELOITTEdeloitte.comVisit source
- Reference 58CLOUDSECURITYALLIANCEcloudsecurityalliance.orgVisit source
- Reference 59COVEWAREcoveware.comVisit source
- Reference 60IOTSECURITYFOUNDATIONiotsecurityfoundation.orgVisit source
- Reference 61SALESFORCEsalesforce.comVisit source
- Reference 62CASEIQcaseiq.comVisit source
- Reference 63PCISECURITYSTANDARDSpcisecuritystandards.orgVisit source
- Reference 64BITSIGHTbitsight.comVisit source
- Reference 65VEEAMveeam.comVisit source
- Reference 66QUALYSqualys.comVisit source
- Reference 67NISTnist.govVisit source
- Reference 68SANSsans.orgVisit source
- Reference 69CYBERARKcyberark.comVisit source
- Reference 70VMWAREvmware.comVisit source
- Reference 71IVANTIivanti.comVisit source
- Reference 72SPLUNKsplunk.comVisit source
- Reference 73OKTAokta.comVisit source
- Reference 74OFFSECoffsec.comVisit source
- Reference 75FORCEPOINTforcepoint.comVisit source
- Reference 76MARSHmarsh.comVisit source
- Reference 77COMMVAULTcommvault.comVisit source
- Reference 78NUTANIXnutanix.comVisit source
- Reference 79EDELMANedelman.comVisit source
- Reference 80COHESITYcohesity.comVisit source
- Reference 81ISACAisaca.orgVisit source
- Reference 82DARKTRACEdarktrace.comVisit source
- Reference 83NSAnsa.govVisit source
- Reference 84NATIONALISACnationalisac.orgVisit source
- Reference 85RUBRIKrubrik.comVisit source






