Key Takeaways
- 74% of cybersecurity breaches involve the human element including social engineering
- Phishing accounts for 36% of all data breaches
- 82% of breaches involved a human element in 2022
- Phishing emails evade filters 1 in 10 times
- Vishing (voice phishing) used in 20% of attacks
- Smishing (SMS phishing) attacks up 328% in 2022
- Average BEC scam costs $4.91 million to detect
- Phishing causes $4.91 billion annual losses
- Global cost of cybercrime $8 trillion, 50% social eng related
- 75% of executives targeted more likely to suffer breach
- Millennials 36% more likely to fall for phishing
- Finance sector 24% of phishing targets
- 87% of users fail to recognize phishing
- Security awareness training reduces clicks by 40%
- MFA blocks 99.9% account compromise
Social engineering attacks are alarmingly common because humans are the weakest security link.
Common Types
Common Types Interpretation
Financial and Economic Impact
Financial and Economic Impact Interpretation
Mitigation and Awareness
Mitigation and Awareness Interpretation
Prevalence and Frequency
Prevalence and Frequency Interpretation
Victim Characteristics
Victim Characteristics Interpretation
Sources & References
- Reference 1VERIZONverizon.comVisit source
- Reference 2APWGapwg.orgVisit source
- Reference 3PROOFPOINTproofpoint.comVisit source
- Reference 4IBMibm.comVisit source
- Reference 5KEEPERSECURITYkeepersecurity.comVisit source
- Reference 6STATIONXstationx.netVisit source
- Reference 7ZDNETzdnet.comVisit source
- Reference 8TALOSTYSTEMStalostystems.comVisit source
- Reference 9KNOWBE4knowbe4.comVisit source
- Reference 10CISCOcisco.comVisit source
- Reference 11FTCftc.govVisit source
- Reference 12GOVgov.ukVisit source
- Reference 13HBRhbr.orgVisit source
- Reference 14EMAILSECURITYCHECKERemailsecuritychecker.comVisit source
- Reference 15BARRACUDAbarracuda.comVisit source
- Reference 16SOPHOSsophos.comVisit source
- Reference 17ZSCALERzscaler.comVisit source
- Reference 18CROWDSTRIKEcrowdstrike.comVisit source
- Reference 19PHISHMEphishme.comVisit source
- Reference 20SECURITYsecurity.orgVisit source
- Reference 21IC3ic3.govVisit source
- Reference 22FBIfbi.govVisit source
- Reference 23PONEMONponemon.orgVisit source
- Reference 24MIMECASTmimecast.comVisit source
- Reference 25LOOKOUTlookout.comVisit source
- Reference 26CHECKPOINTcheckpoint.comVisit source
- Reference 27SANSsans.orgVisit source
- Reference 28CORESECURITYcoresecurity.comVisit source
- Reference 29ZIMPERIUMzimperium.comVisit source
- Reference 30IMPERVAimperva.comVisit source
- Reference 31BRANDSHIELDbrandshield.comVisit source
- Reference 32CYBERSECURITYVENTUREScybersecurityventures.comVisit source
- Reference 33HIMSShimss.orgVisit source
- Reference 34PHISHINGphishing.orgVisit source
- Reference 35MICROSOFTmicrosoft.comVisit source
- Reference 36NISTnist.govVisit source
- Reference 37VALIMAILvalimail.comVisit source






