Cybersec Essentials

Cybersecurity Statistics Report | 2021

The cyber-threat scene is ever-changing. Stay up to date with this year's malicious trends to ensure your business' infrastructure isn't caught off guard.

February 22, 2021

The cyber-threat scene is ever-changing. Stay up to date with this year’s malicious trends to ensure your business’ infrastructure isn’t caught off guard.

As cyber-attacks and data breaches become increasingly common, it’s more important than ever to protect your business and personal devices from growing threats. Just like many businesses and homes have alarm systems to protect from intruders, the same prevention is necessary to ward off cybercrime. Let’s dig into what cybersecurity is and why it’s so important.

What is Cybersecurity?

At its core, cybersecurity is protection against digital attacks. Cybersecurity methods protect against the multitudes of digital threats that come to individuals and businesses. The Department of Homeland Security says it best: “Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.”

Top Stats

To start, let’s highlight some of the biggest stats we found from 2020

  • Healthcare was the most expensive industry in data breach costs, coming in at a whopping $7.13 million USD. (IBM)
  • IBM also found that it takes an average of 280 days to identify and contain a breach.

280 DAYS! How much damage can be done in 280 days?

  • Total security spend in 2020 was over $123 billion USD. (Gartner)
  • 76% of respondents in a Guardicore study did have the security infrastructure to quickly secure new apps or configure existing apps. (Guardicore+Ponemon)
  • 80% of breaches contained customer PII. (Capita+Ponemon)

The need for cybersecurity is fueled by the threat of hackers that compromise important data and systems. However, not all hackers are created equal. There are three main types of hackers:

Types of Hackers

  1. White hat hacker. These hackers are legal professionals that break into protected systems to test their security. White hat hackers, or “ethical” hackers detect vulnerabilities in networks and systems to expose them before malicious hackers do.
  2. Black hat hacker. Black hat hackers maliciously break into computer networks and security protocols to spread malware, steal data, modify it, or destroy it.
  3. Grey hat hackers. Like white hat hackers, grey hat hackers expose vulnerabilities in systems and report issues to the owners. However, similar to black hat hackers, this type of hacking is illegal because permission was never given. Grey hat hackers often request a fee to fix the issues they find.

Black hat hackers pose the largest threat to digital networks and systems. Not only do they break into networks and systems – they’ve created common attacks like phishing, ransomware, and crypto-jacking.

Need help taking the first steps towards securing your devices? Learn more about the different solutions you can implement as a first barrier.

The world of digital security is continuously changing and evolving, making it important to understand the current landscape to protect your devices from malware. To help illustrate the current state of cybersecurity, we’re sharing some eye-opening statistics.

Listen to the story of a user who caught a thief with his Mac at a cafe!

Cybersecurity Statistics that Matter in 2021

Cybersecurity Facts

  • 70% of organizations say that they believe their security risk increased significantly in 2017. (Ponemon Institute)
  • By 2020, the number of passwords used by humans and machines worldwide is estimated to grow to 300 billion. (SC Media)
  • 43 percent of cyber attacks are aimed at small businesses. (Small Business Trends)
  • 230,000 new malware samples are produced every day — and this is predicted to only keep growing. (Panda Security)
  • 90% of hackers cover their tracks by using encryption. (Vanson Bourne)
  • It takes most companies over six months, or around 197 days to detect a data breach. (ZD Net)
  • Windows is the most targeted platform by hackers; Android is number two. (Computer World)
  • There were over 3 million crypto-jacking hits between January and May 2018. (Quick Heal)
  • The number of mobile crypto-jacking malware variants grew from 8 variants in 2017 to 25 variants by May 2018 – making a 3x increase. (Quick Heal)
  • F-Secure’s 2019 report showed that China, the US, Russia, and Germany were the countries whose IP addresses were the most attacked
  • Iran,Tunisia, and Belarus were ranked as the least cyber-safe countries while Finland, Japan, Denmark, and the UK were identified as the most cyber-safe. (Comparitech)
  • Almost all malware arrives on computers via email, in fact, this was found true in 94% of cases. (Verizon)

Cybersecurity Costs

  • The information security market is expected to grow 8.7% in 2019 to $124bn, driven in part by spending on consultation and implementation services related to the European Union’s (EU’s) General Data Protection Regulation (GDPR) and other privacy legislation. (Computer Weekly)
  • Cybersecurity market was valued at $156.24 billion US dollars in 2020 and is on track to reach $352.25 US dollars by 2026. (MordorIntelligence)
  • The total cost of a successful cyber attack is over $5 million, or $301 per employee. (Ponemon)
  • The most expensive component of a cyber attack is information loss, which represents 43 percent of costs. (Accenture)
  • Damage related to cybercrime is projected to hit $6 trillion annually by 2021. (CyberSecurity Ventures)
  • The Equifax breach cost the company over $4 billion in total. (Time)
  • Malware and web-based attacks are the two most costly attack types — companies spent an average of US $2.4 million in defense. (Accenture)
  • Security services came in at the top of the charts in terms of spending for 2020, costing $64,270 million USD. Infrastructure protection came in second at $17,483 million USD. (Gartner)
Accenture found that attacks against weak links in the supply chain are now responsible for 40% of security breaches.


  • More than 4,000 ransomware attacks occur every day. (FBI)
  • 75% of organizations infected with ransomware were running up-to-date endpoint protection. (Sophos)
  • The global damage costs connected with ransomware attacks is estimated to reach $11.5 billion in 2019. (Cybersecurity Ventures)
  • It is estimated there will be a ransomware attack on businesses every 14 seconds by the end of 2019, up from every 40 seconds in 2016. This does not include attacks on individuals, which occurs even more frequently than in businesses. (Cybersecurity Ventures)
  • 91% of cyberattacks begin with a spear-phishing email, which is commonly used to infect organizations with ransomware.. (KnowBe4)24,610,126 "unique malicious objects" were identified by Kaspersky in 2019


  • In a survey of over 1,300 IT decision-makers, 56% of organizations identified targeted phishing attacks as their biggest current cybersecurity threat. (CyberArk)
  • 76% of businesses reported being a victim of a phishing attack in the last year. (Wombat Security)
  • Verizon reports that users in the U.S open 30 percent of phishing all emails, with 12 percent of those targeted by these emails clicking on the infected links or attachments. (Verizon)
  • Kaspersky’s Anti-Phishing system was triggered 246,231,645 times in 2017. The security company states over 91 million more phishing system triggers were set off in 2017 over 2016. (Kaspersky)

Wrap Up

Understanding the state of cybersecurity is important to protect yourself, your family, and your businesses from digital threats. The statistics we’ve shared show that even though many individuals and companies are aware of cyber threats, their protection is failing due to the continued expansion of attacks.

So what can you do to protect your devices from cybercrime? The first steps are staying educated on current threats and investing in device security. Use the statistics we’ve shared to plan how you will prevent the growing number of threats in 2020.

On the same Issue

My Computer Was Hacked! 3 Things To Do Immediately

What do you do when you get hacked? Aside from panic: you react. Many can relate to this: you open an attached file and bam... Your whole computer acts like a demonic force possessed it.

June 16, 2022
keep reading
Cybersecurity Frameworks 101 - The Complete Guide

Cybersecurity frameworks provide the structure and methodology you need to protect your important digital assets. Find out which framework best suits your needs!

June 3, 2022
keep reading
10 Essential Things to Do When You Get a New Computer

There are few more exciting moments in the life of a person than the hours after purchasing a new computer. What should you do now after you take the shiny new thing out of the box?

December 18, 2021
keep reading
7 Tips for Training Employees About Cybersecurity Awareness

According to the National Institute of Standards and Technology, organizations “should assume that malicious parties will gain control of telework client devices". Here are 7 tips to prevent that from happening.

November 5, 2021
keep reading