{"id":66834,"date":"2023-05-08T16:25:59","date_gmt":"2023-05-08T08:25:59","guid":{"rendered":"https:\/\/version-2.com\/?p=66834"},"modified":"2024-09-13T16:31:18","modified_gmt":"2024-09-13T08:31:18","slug":"must-know-cybersecurity-statistics-of-2022","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/05\/must-know-cybersecurity-statistics-of-2022\/","title":{"rendered":"Must-know cybersecurity statistics of 2022"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"66834\" class=\"elementor elementor-66834\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/rrrYFYVzS8zJYW3jg0Lo3\/497396e897f096ad6295d7490ed2c42b\/Cybersecurity_statistics_for_2022_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"800\" \/><\/p><article><p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity is a critical concern for organizations worldwide. In 2022, we saw an unprecedented increase in the number and severity of cyber attacks. With more people working remotely, organizations have become more vulnerable to attacks. Cybercriminals continue to target businesses across all industries, using various tactics to breach networks and access personal data.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">This article will delve into the most significant cybersecurity statistics of 2022, including the key numbers, data breaches with the most substantial impact, vulnerable industries, types of attacks, prevention actions, and the cost of cybercrime. Understanding these statistics is mandatory for businesses to develop effective security strategies and protect their data from malicious actors.<\/p><h2 id=\"key-numbers-of-2022\" class=\"Heading Heading-h2 text-dark-blue\">Key numbers of 2022\u00a0<\/h2><ol class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">A staggering <strong>82% of all breaches involved the &#8220;human element&#8221;<\/strong> using stolen credentials, phishing, human error, and misuse. (<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.verizon.com\/business\/resources\/T30e\/reports\/dbir\/2022-data-breach-investigations-report-dbir.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Verizon<\/a>)<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Data compromises, such as data breaches, exposure, and leakage, impacted <strong>over 422 million people<\/strong>. (<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.idtheftcenter.org\/wp-content\/uploads\/2023\/01\/ITRC_2022-Data-Breach-Report_Final-1.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ITRC<\/a>)<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Supply chain attacks <strong>accounted for 19% of all cyber security incidents<\/strong>. (<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.ibm.com\/downloads\/cas\/3R8N1DZJ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IBM<\/a>)<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">In Q4 of 2022, the number of cyberattacks worldwide reached an unparalleled level, with each organization experiencing <strong>an average of 1168 attacks per week<\/strong>. (<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/blog.checkpoint.com\/2023\/01\/05\/38-increase-in-2022-global-cyberattacks\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Checkpoint<\/a>)<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Servers were involved in <strong>84% of all cyber security incidents<\/strong>, with web application servers and mail servers <strong>accounting for 56% and 28% of these incidents<\/strong>, respectively. (<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.verizon.com\/business\/resources\/T30e\/reports\/dbir\/2022-data-breach-investigations-report-dbir.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Verizon<\/a>)<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Nearly <strong>half of all cyber security incidents (47%) pertained to personally identifiable information (PII)<\/strong>, while another <strong>46% involved authentication credentials<\/strong>. Payment card data was affected in only <strong>7% of the incidents<\/strong>. (<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.verizon.com\/business\/resources\/T30e\/reports\/dbir\/2022-data-breach-investigations-report-dbir.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Verizon<\/a>)<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Cyberattacks surged in the USA, with <strong>a staggering 57% increase<\/strong>. Latin America experienced <strong>a 29% increase<\/strong>, while Europe and Singapore both saw <strong>a 26% increase<\/strong>. Meanwhile, the UK encountered <strong>a shocking 77% spike<\/strong> in cyberattacks. (<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/blog.checkpoint.com\/2023\/01\/05\/38-increase-in-2022-global-cyberattacks\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Checkpoint<\/a>)<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>83%<\/strong> of organizations experienced more than one data breach. (<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.ibm.com\/downloads\/cas\/3R8N1DZJ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IBM<\/a>)<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">There was <strong>a 38% increase in global cyberattacks<\/strong> compared to the previous year. (<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/blog.checkpoint.com\/2023\/01\/05\/38-increase-in-2022-global-cyberattacks\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Checkpoint<\/a>)<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Almost 1 billion emails were exposed, affecting one in five internet users. (<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/aag-it.com\/the-latest-cyber-crime-statistics\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">AAG<\/a>)<\/p><\/li><\/ol><h2 id=\"the-top-10-most-significant-data-breaches-of-2022\" class=\"Heading Heading-h2 text-dark-blue\">The top 10 most significant data breaches of 2022<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">We present the most impactful data breaches of the last year.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">10. The Axie Infinity\u2019s crypto theft<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Axie Infinity is an online video game that uses Ethereum-based cryptocurrencies and NFTs. As the games services heavily rely on blockchain service Ronin, cyber criminals managed to infiltrate the system. They were able to take control of the network and send <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.nbcnews.com\/tech\/tech-news\/hackers-steal-600-million-maker-axie-infinity-rcna22031\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">173,600 ethers worth about $600 million and withdraw $25.5 million worth of coin<\/a>. This has now become one of the largest thefts in the history of cryptocurrencies and online gaming.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">9. Cash App data breach<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">In April, a disgruntled former employee of Cash App, a payment company, took it upon himself to breach the company&#8217;s system. The hacker managed to <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.upguard.com\/blog\/how-did-the-cash-app-data-breach-happen\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">access sensitive reports<\/a>, including the names, portfolio values, and brokerage account numbers of more than 8 million clients, which they then stole.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">8. Costa Rica\u2019s government ransomware attack<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">The Costa Rican government suffered a major cyberattack when the Conti ransomware gang successfully breached their systems. The group gained access to highly valuable data, which they stole and then demanded <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/securityintelligence.com\/news\/costa-rica-state-emergency-ransomware\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">a hefty ransom of $20 million<\/a>.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">This forced the Central American government to declare a state of emergency. Shockingly, weeks after the attack, 670 GB of data, representing 90% of the information that had been accessed, was posted to a leak site by the threat group.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">7. Neopets data breach<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Last July, a database with account details of <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.theguardian.com\/technology\/2022\/jul\/22\/neopets-security-breach-users-data-reportedly-stolen\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">69 million Neopets game users was found for sale on an internet forum<\/a>. The data included names, email addresses, zip codes, genders, and birth dates. An inquiry found that cyber attackers had infiltrated the Neopets IT systems and had unauthorized access to it for a prolonged period, from January 3, 2021, to July 19, 2022, spanning over 18 months.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">6. Revolut data breach<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">In September 2022, a data breach occurred at fintech start-up Revolut, resulting in <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/techcrunch.com\/2022\/09\/20\/revolut-cyberattack-thousands-exposed\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">personal information of more than 50,000 users being accessed<\/a> by a third-party. The breached data included names, addresses, and partial payment card information. However, Revolut assured that the card details were masked. The Lithuanian government commended Revolut for taking immediate action to eliminate the attacker&#8217;s access to the data once the breach was detected.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">5. Shein data breach<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">In October, Shein and Romwe&#8217;s parent company Zoetop Business was fined <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/techcrunch.com\/2022\/10\/13\/shein-zoetop-fined-1-9m-data-breach\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">$1.9 million by the state of New York for not disclosing a data breach<\/a> that impacted 39 million customers. The breach occurred in July 2018 when a malicious third party accessed Shein&#8217;s payment systems. Shein was informed by their payment processor that their system had been infiltrated and customer card data had been stolen. The discovery was made after the credit card network found Shein customers\u2019 payment details for sale on the dark web.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">4. Hacker allegedly hits both Uber &amp; Rockstar<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Between September 15-19, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.cshub.com\/attacks\/news\/iotw-hacker-allegedly-hits-both-uber-and-rockstar\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">a hacker allegedly targeted both Uber and Rockstar<\/a>. In the Uber breach, the hacker accessed the company&#8217;s internal servers using malware installed on a contractor&#8217;s device. They then posted a message to a company-wide Slack channel and reconfigured Uber\u2019s OpenDNS to display a graphic image to employees on some internal sites.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">In the same timeframe, the Rockstar Games&#8217; developer suffered a network intrusion, leading an unauthorized third party to illegally access and download confidential information, including gameplay footage of the unreleased Grand Theft Auto 6 game. The hacker claimed they obtained the footage by hacking into a Slack channel used for communication about the game.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">3. Medibank data leak<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Australian healthcare and insurance provider Medibank detected \u201cunusual activity\u201d on its internal systems on October 13. By November 7, Medibank announced that a hacker <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.upguard.com\/blog\/what-caused-the-medibank-data-breach\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">had stolen the confidential data of 9.7 million past and present customers<\/a>, including personally identifying information and medical procedure codes. Despite the hacker\u2019s demands for ransom, Medibank refused to pay.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">On November 9, the hacker released files containing customer data labeled &#8220;good-list&#8221; and &#8220;naughty-list,&#8221; with the latter reportedly including sensitive information on those who sought medical treatment for HIV, drug addiction or alcohol abuse, and mental health issues like eating disorders. The hacker posted a file labeled \u201cabortions\u201d containing information on claimed procedures to a site backed by the Russian ransomware group REvil on November 10.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">2. BidenCash data breach<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">On October 12, carding marketplace BidenCash made <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bidencash-market-leaks-over-2-million-stolen-credit-cards-for-free\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">public the details of 1.2 million credit cards expiring between 2023 and 2026<\/a>. The leaked information, which included other necessary details for making online transactions, was posted on the dark web site for free.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">BidenCash had leaked the details of a few thousand credit cards in June, likely as a promotional stunt, and as the site had launched new URLs in September due to a series of DDoS attacks, some experts speculated that this new release could be another attempt at advertising.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">1. Twitter data breach<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Twitter faced accusations of <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.cshub.com\/attacks\/news\/iotw-twitter-accused-of-covering-up-data-breach-that-affects-millions\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">attempting to cover up a major data breach that compromised the personal information of millions of users<\/a>. In July, a hacker who went by the name &#8216;devil&#8217; claimed to have the data of 5.4 million Twitter accounts for sale on BreachForums, including email addresses and phone numbers belonging to celebrities, companies, and regular users.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">The stolen data also included information from &#8220;OGs,&#8221; which are highly desirable Twitter handles consisting of one or two letters or a word with no misspelling, numbers, or punctuation. The hacker demanded a minimum of $30,000 for the database. The data breach, resulting from a vulnerability in Twitter&#8217;s system that was discovered in January, caused significant concern among the public and further highlighted the ongoing need for strong cybersecurity measures.<\/p><h2 id=\"most-targeted-industries-in-2022\" class=\"Heading Heading-h2 text-dark-blue\">Most targeted industries in 2022<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">As we embark on a new year, the cyber threat landscape is continuously evolving, making it more challenging for organizations to keep up with the pace of these attacks. From ransomware to phishing scams, no industry is immune to cyber threats.<\/p><div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\"><p><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1WDebFN2ccI375xUGPAAx5\/2bbf197889948463496673f41bda04f8\/Most_targeted_industries_in_2022_web_1400x914.png?w=1400&amp;h=914&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"914\" \/><\/p><p><picture>This list highlights the top 10 most targeted industries in 2022, based on the <\/picture><a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.ibm.com\/downloads\/cas\/DB4GL8YM\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IBM X-Force 2022 Threat Intelligence Index report<\/a><picture>. And hopefully, a better understanding of the threat landscape in different industries can help organizations adopt robust cybersecurity strategies to safeguard their systems, data, and customers against cybercriminals.<\/picture><\/p><\/div><h3 class=\"Heading Heading-h3 text-dark-blue\">Media &amp; telecommunications &#8211; 0.5%<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Last year, media and telecommunications industries remained relatively unscathed, with a mere 0.5% of incidents reported. However, it is worth noting that external remote services such as VPNs and valid domain accounts were often exploited to gain unauthorized access, resulting in ransomware attacks.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">The consequences of these attacks were severe, ranging from data theft, leaks, and destruction to extortion, and involved the deployment of data exfiltration tools and ransomware. Despite their low incidence rate, the potential impact of cyber threats on media and telecom companies cannot be underestimated.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Transportation &#8211; 3.9%<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Transportation dropped from seventh to ninth place in the 2022 X-Force report, but the industry remained a frequent target, accounting for 3.9% of incidents. Phishing was the primary method of initial access, with links, attachments, and spear phishing equally represented. Valid local accounts were also exploited in 33% of cases, while valid cloud accounts were used in 17%.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">The top objectives were server access and deployment of remote access tools, followed by spam campaigns, ransomware, backdoors, and defacement. Data theft was the most common outcome, occurring in half of all cases, with extortion and brand reputation damage also common. European transportation entities were the hardest hit, accounting for 62% of cases, with Asia-Pacific in second place at just over 37%.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Government &#8211; 4.8%<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Government entities were one of the prime targets of cyberattacks in 2022, with backdoors and DDoS attacks accounting for 25% of cases each. Public sector networks contain a wealth of sensitive information, making them a popular objective for cyber espionage campaigns aimed at stealing PII and other data. Malicious Office documents were found in 17% of cases, while the remaining 83% involved cryptominers, credential acquisition tools, ransomware, and web shells.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">X-Force attributed incidents in this sector to cybercriminals, insider threats, hacktivists, and state-sponsored groups conducting espionage, each accounting for an equal share. Infection vectors were primarily public-facing applications and spear phishing attachments, with valid default accounts exploited in 20% of cases. Asia-Pacific governments were hit the hardest, with 50% of cases, followed by Europe at 30% and North America at 20%.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Healthcare &#8211; 5.8%<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Still being the top object of international cyberattacks, the healthcare industry experienced a decline from sixth place in 2021. X-Force responded to approximately 5%-6% of healthcare cases in the last three years. Backdoor attacks and web shells were prevalent, accounting for 27% and 18% of cases, respectively.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Adware, BEC, cryptominers, loaders, reconnaissance and scanning tools, and remote access tools made up 9% of cases each. Most of the observed impacts were from reconnaissance at 50%, while data theft and digital currency mining each accounted for 25% of cases. European-based healthcare entities were targeted the most, comprising 58% of incidents, with the remaining 42% in North America.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Education &#8211; 7.3%<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Backdoor attacks in the education sector comprised 20% of incidents X-Force responded to. Ransomware, adware, and spam each accounted for 13% of incidents. Exploitation of public-facing applications was the most common initial access vector at 42%, followed by spear phishing attachments at 25%. Asia-Pacific was the region with the highest number of cases at 67%, followed by North America at 27%, and Latin America at 6%.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Retail and wholesale &#8211; 8.7%<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">The retail and wholesale industry maintained its position as the fifth-most targeted industry, as per the X-Force report for 2022. Spear phishing emails with malicious links were the most common initial access vector at 33%. Ransomware, backdoors and BEC were the most common attack types, each accounting for 19% of incidents.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Victims experienced extortion in half of the cases, while credential harvesting and financial loss were observed in 25% of cases each. North America and Latin America had the highest number of cases at 39% each, while Europe accounted for 22% of incidents.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Energy &#8211; 10.7%<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">The energy sector, encompassing electric utilities and oil and gas companies, was the fourth-most targeted industry with 10.7% of attacks. Attackers commonly gained initial access through the exploitation of public-facing applications (40%), spear phishing links (20%), or external remote services (20%). Botnets were the top method of attack in 19% of cases, followed by ransomware and BEC at 15% each.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">North American organizations were the most targeted at 46%. Incidents involved data theft and extortion in 23% of cases, while credential harvesting and botnet infections were observed in 15% of cases each. The energy sector faces pressure from various global factors, particularly those exacerbated by Russia\u2019s aggression in Ukraine and its impact on the already unstable global energy trade.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Professional, business &amp; consumer services &#8211; 14.6%<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">The professional services industry, including consultancies and law firms, was the target of 52% of cyber attacks in this category. Business services, such as IT and advertising, accounted for 37% of attacks, while consumer services made up 11%.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Ransomware and backdoor attacks were the most frequent types of attacks, with public-facing applications and remote services being the top infection vectors. Extortion was the most common attack type.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Finance &amp; insurance &#8211; 18.9%<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Last year the finance and insurance organizations were the target of 18.9% of cyber attacks, earning it second place in this list. Despite a slight decrease in attacks over the past few years, finance and insurance organizations remain prime targets due to their advanced digital transformation and cloud adoption progress.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Backdoor attacks were the most common objective at 29%, followed by ransomware and maldocs at 11% each. Spear phishing attachments were the top infection vector, responsible for 53% of attacks. Europe experienced the highest volume of attacks at 33%, followed by Asia-Pacific at 31%. Latin America, North America, and the Middle East and Africa experienced approximately 15%, 10%, and 10% of incidents, respectively.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Manufacturing &#8211; 24.8%<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">The manufacturing industry was the most targeted in 2022, with backdoors being deployed in 28% of incidents and spear phishing and public-facing applications being the top infection vectors at 28% each. External remote services accounted for 14% of incidents, while spear phishing links and valid default accounts were tied for third place at 10%.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Extortion was the top impact on manufacturing organizations, followed by data theft and leaks. The Asia-Pacific region had the most incidents at approximately 61% of cases, while Europe and North America tied for second place at 14%. Latin America accounted for 8% of incidents, and the Middle East and Africa had 4%.<\/p><h2 id=\"most-common-cyber-attacks-in-2022\" class=\"Heading Heading-h2 text-dark-blue\">Most common cyber attacks in 2022<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">With the increasing use of technology in our daily lives, cybercriminals are finding new ways to exploit vulnerabilities in web applications, cloud services, Internet of Things (IoT) devices, and human behavior.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">We present to you the top 10 list of cyber attacks with the hope that you can take steps to protect yourself and your data from potential cyber threats in the future.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">10. SQL injection &amp; Cross-site Scripting (XSS)<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">SQL injection and Cross-site Scripting (XSS) are <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.geniussystems.co\/blog\/top-10-types-of-cyber-attacks-2022\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">common types of cyber attacks in 2022<\/a> that exploit vulnerabilities in web applications. SQL injection attacks can be used to insert malicious code into an SQL database, potentially giving attackers access to sensitive information or control over the entire system. Use parameterized queries to prevent SQL injection attacks and keep your software up-to-date.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">XSS attacks use third-party online resources to insert malicious scripts into legitimate websites or applications to obtain user information. Attackers commonly use JavaScript, Microsoft VBScript, ActiveX, or Adobe Flash for XSS attacks. Web apps are often vulnerable to XSS attacks when they receive user input without validating or encoding it in their output.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">9. Cloud jacking<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud jacking, also known as cloud hijacking, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/venturebeat.com\/security\/crowdstrike-report-shows-identities-under-siege-cloud-data-theft-up\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">targets data stored in external cloud services such as Salesforce or Microsoft Azure<\/a>. Hackers exploit poorly secured loopholes to steal data since modern enterprises increasingly use cloud-based services. Since most users do not store many files locally, cyber criminals find targeting the centers housing the data more worthwhile. Common methods include exploiting cloud provider management software vulnerabilities or cracking default security configurations.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">8. Internet of Things (IoT) attacks<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">An IoT attack targets Internet of Things devices or networks, allowing hackers to take control of devices, steal data, or join a network of infected devices to execute DoS or DDoS attacks. The IoT encompasses a wide range of internet-connected devices, from smartphones to smart home appliances, making them vulnerable to cyberattacks.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Attackers can exploit IoT devices to launch attacks on other devices, causing significant damage that can be challenging to detect. There was <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.statista.com\/statistics\/1322216\/worldwide-internet-of-things-attacks\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">a noticeable increase of IoT attacks last year<\/a>.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">7. Insider threats<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Insider threats refer to the risks associated with an organization&#8217;s own staff. These threats can come from rogue employees with malicious intent or from employees who are simply negligent. In some cases, hackers can bribe insiders to help them gain access to sensitive information. However, the line between insider threat and whistleblower can sometimes be blurry.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Unlike social engineering, where attackers pretend to have legitimate access, insiders actually have legitimate access but use it for malicious purposes. Organizations must have policies and procedures to detect and prevent insider threats. It\u2019s also reported that insider threats <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.proofpoint.com\/sites\/default\/files\/threat-reports\/pfpt-us-tr-the-cost-of-insider-threats-ponemon-report.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">have risen 44% over the past two years<\/a>.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">6. Man-in-the-Middle attack<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Man-in-the-middle attacks aim to steal sensitive information by intercepting and manipulating messages between two parties who believe they are communicating directly and securely. While most communication channels use some encryption to make such snooping attempts more difficult, expired SSL certificates on various websites and the use of freemium VPNs, proxies, or public wifi can create open gaps that attackers can exploit.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Attackers can read, modify, or even delete data during such attacks, which can be challenging to detect. To protect against man-in-the-middle attacks, it is essential to use encryption whenever possible, be mindful of which websites and emails you access, and avoid using public networks. Estimates show that <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.strongdm.com\/blog\/man-in-the-middle-attack\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">35% of exploits involve man-in-the-middle attacks<\/a>.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">5. Dictionary, brute-force &amp; password spray attacks<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Cyber attackers use various methods to break into password-protected systems, including dictionary attacks, brute-force attacks, and password spray attacks. A dictionary attack involves systematically entering every word in a dictionary as a password or key to decrypt an encrypted message. On the other hand, a brute-force attack involves automated trial and error by spraying all possible character combinations and lengths into a password field until a match is found. <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">More than 80 percent of breaches involve brute-force<\/a> or the use of lost or stolen credentials.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Meanwhile, password spray attacks, involve hackers trying many common passwords against many different accounts using automated software. To protect yourself, use strong and unique passwords, enable two-factor authentication if available, and avoid using common words or phrases that can be easily guessed.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">4. Social engineering<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Social engineering is a cyber attack that exploits human vulnerability rather than system weaknesses. It involves tricking individuals into revealing sensitive information through deception. Threat actors may even impersonate someone else to gain physical or remote access to a target system.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Unfortunately, these attacks are still prevalent in 2022, as approximately <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.freecodecamp.org\/news\/modern-social-engineering-cyberattacks\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">one-third of data breaches occur due to social engineering<\/a>. It is important to remain vigilant and cautious of unsolicited communication, verify identities, and practice proper security protocols to avoid falling victim to these attacks.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">3. Malware, ransomware &amp; spyware<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Malware is a type of malicious code designed to carry out specific tasks that hackers want, including taking over, using as a gateway, stealing data, or disabling the target&#8217;s machine. In 2021, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/spanning.com\/blog\/cyberattacks-2021-phishing-ransomware-data-breach-statistics\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">the average organization faced 1,748 attempts to be infected with malware<\/a>. The same trend held true last year, with malware attacks being <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.statista.com\/statistics\/873097\/malware-attacks-per-year-worldwide\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">one of the most popular cyberattack types<\/a>.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Meanwhile, ransomware is a more specific form of malware that infects a machine&#8217;s storage and encrypts stored data, demanding payment for decryption. These attacks can be highly profitable for hackers, as organizations often pay the ransom with no guarantee of a successful outcome.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Keyloggers are a type of spyware that captures every keystroke made on a device, allowing malicious actors to access sensitive information such as passwords and credit card numbers. Keylogger spyware is typically installed on a user&#8217;s device by clicking on a malicious link or attachment. Protect yourself from keyloggers by using strong and unique passwords for all accounts, as well as enabling two-factor authentication where possible.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">2. DoS and DDoS<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">DoS and DDoS attacks flood servers or routers with requests, making it impossible for legitimate users to access a website or service. Attackers may use botnets or darknet marketplaces to orchestrate large-scale attacks. Defend against these attacks by having a robust firewall and keeping software up-to-date. These attacks are difficult to defend against, so be vigilant and prepared. According to reports, DDoS attacks <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.radware.com\/newsevents\/pressreleases\/2023\/radware-full-year-2022-report-malicious-ddos-attacks\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">grew 150% compared to the year before<\/a>.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">1. Phishing &amp; vishing<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Phishing, the list&#8217;s leader, tricks users into revealing sensitive information by posing as a legitimate institution. Attackers often use genuine-looking emails that redirect victims to fake websites where they input their actual credentials. Once attackers have the user&#8217;s information, they can take over their account, blackmail them, or sell the data on dark web marketplaces.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Vishing, a combination of voice and phishing, tricks victims into revealing confidential information through social engineering tactics. Protect yourself by being suspicious of emails asking you to click on links or download attachments. If in doubt, contact the company directly to verify the email&#8217;s legitimacy. Phishing attacks amount to more than 255 million attacks, a <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.securitymagazine.com\/articles\/98536-over-255m-phishing-attacks-in-2022-so-far\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">61% increase in the rate of phishing attacks compared to 2021<\/a>.<\/p><h2 id=\"the-top-10-musttake-actions-to-protect-your-organization-from-cyberattacks\" class=\"Heading Heading-h2 text-dark-blue\">The top 10 must-take actions to protect your organization from cyberattacks<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">With the increasing sophistication of cybercriminals, it&#8217;s crucial to take proactive steps to safeguard your organization&#8217;s sensitive data and protect it in all ways possible.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Here we&#8217;ll explore the top 10 must-take actions to secure your business from cyber incidents. Implementing these measures can significantly reduce the risk of potential financial and reputational damage.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">10. Backup your data regularly<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Regularly backing up your data is crucial for protecting your organization against cyber attacks. In the event of a ransomware attack, having backup servers allows you to restore your data without having to pay a ransom.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">However, ensuring that your backups are secure and protected from cyber threats is essential. Negligently leaving data backups unprotected in public cloud services can leave them vulnerable to cyber criminals. Organizations can recover quickly from a cyber attack using data backups and maintain business continuity.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">9. Have a response plan in place<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Even with all the necessary precautions, it&#8217;s impossible to guarantee that a cyber attack won&#8217;t happen. That&#8217;s why having a well-designed response &amp; risk management plan is crucial to minimize the damage caused by a cyber attack. A comprehensive response plan should include:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Clear steps for containing the attack.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Notifying stakeholders.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Restoring operations as quickly as possible.<\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">It&#8217;s important to regularly review and update the plan to ensure it remains effective and relevant to your organization&#8217;s evolving risks and operational needs. The impact of a breach can be minimized by having a response plan in place. Quickly and effectively responding to a cyber attack can get your organization back to normal operations.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">8. Conduct regular security audits<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Regular security audits are a crucial step in protecting organizations from cyberattacks. These audits can help identify vulnerabilities in systems and processes, allowing organizations to address them before hackers can exploit them.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Hiring an external audit firm or cybersecurity consultant agency can provide valuable insights into potential weak points in a network. By actively seeking out and addressing these vulnerabilities, organizations can save themselves the cost and headache of dealing with a successful hacking attempt in the future.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">7. Engage in active threat monitoring<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Active threat monitoring is critical in protecting an organization from cyber attacks. Network monitoring tools can be used to detect unusual activity that could signal an ongoing attack.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">By monitoring network activity, organizations can quickly detect and respond to security incidents, including suspicious activity, using intrusion detection systems to alert the security team to potential threats.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">6. Control access to your network &amp; resources<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Controlling access to your network and resources is essential for protecting your organization from cyberattacks. With the rise of remote work and temporary employees, enforcing security policies for every worker or device is difficult, increasing the risk of malware infections and insider threats.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">IP allowlisting can help mitigate these risks by limiting access to only the resources required to complete their work. Organizations should also limit access to sensitive data to only those employees who need it, reducing the risk of unauthorized access and data breaches. Organizations can better protect their network and data from potential security incidents by controlling access.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">5. Encrypt your data<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Encrypting your organization&#8217;s data, especially user passwords, is critical in preventing cyber attacks. Hashing and salting are effective methods of encryption that scramble passwords into unintelligible characters and add additional elements before hashing, making them impossible to reverse-engineer.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Unfortunately, many significant data breaches occur because encryption was not implemented. As a business manager, prioritize data encryption to enhance the security of your user data. By adopting encryption, you can significantly reduce the likelihood of a data breach and protect your organization&#8217;s sensitive data.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">4. Keep software updated<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">It&#8217;s crucial for organizations to keep their software up-to-date. Outdated software is an easy target for hackers always looking for vulnerabilities to exploit. This is especially true for large organizations, as their large pool of users may postpone updates. Therefore, it&#8217;s recommended to have forced updates to ensure that all machines are updated with the latest patches.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Additionally, it&#8217;s important to have antivirus and anti-malware software installed, kept up-to-date, and run regular scans to detect and remove any malicious software that could harm the system.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">3. Secure your network &amp; hardware<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Securing your network and hardware is crucial in protecting your organization from cyberattacks. Hackers often exploit unpatched loopholes and other vulnerabilities to gain access to your system. To minimize the attack surface, take all possible steps to secure every endpoint device.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">One effective measure is enforcing the use of a virtual private network (VPN) when accessing sensitive company documents to secure the exchanged data and prevent unauthorized access. Additionally, services such as NordLayer can provide a safety net to further enhance your network and data security. By securing your network and hardware, you can significantly reduce the risk of a cyberattack and protect your organization&#8217;s sensitive information.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">2. Enforce strong passwords and multi-factor authentication<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Using weak passwords, such as &#8216;Tom1234,&#8217; can make user accounts vulnerable to cyber attacks. To prevent this, organizations should implement password complexity requirements and provide guidance on using password phrases, which are secure and memorable.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Also, multi-factor authentication (MFA) systems should be used, which require multiple factors to verify a user&#8217;s identity. MFA provides reliable assurance of an authorized user&#8217;s identity, reducing the risk of unauthorized access and providing better data protection than passwords alone.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">1. Regularly train your workforce on cybersecurity awareness<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Regularly training your workforce on cybersecurity awareness is one of the most critical steps to protect your organization from cyberattacks. Employees, especially those working remotely, are often the weakest link and can unintentionally introduce security vulnerabilities.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Organizations can reduce their risk of a cyber attack by educating employees on best practices such as using strong passwords, identifying phishing emails, and reporting suspicious activity. A well-trained employee will be able to identify different types of cyber threats and distinguish them from genuine ones, as most cyber attacks follow common patterns. It&#8217;s essential to provide ongoing training that reflects your enterprise&#8217;s risks and proper responses to future attacks since cyberattacks are evolving daily.<\/p><h2 id=\"the-cost-of-cybercrime-security-incidents\" class=\"Heading Heading-h2 text-dark-blue\">The cost of cybercrime &amp; security incidents<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">The cost of cybercrime in 2022 <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/aag-it.com\/the-latest-cyber-crime-statistics\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">is at an all-time high<\/a>. Companies are facing an average cost of $4.35 million due to data breaches alone, with 60% of these breaches resulting in increased prices passed on to customers. In the UK, businesses have had to bear an average cost of \u00a34200, while nearly 1 in 10 US organizations remain uninsured against cyber attacks.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">These numbers are just the tip of the iceberg, indicating that constant vigilance and strong security measures are necessary to protect sensitive data and minimize the financial risks that come with cybercrime.<\/p><p><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/FObKUsh0lxLXp1cCi2HQK\/a8d28a4ad166932c84c4e8a9b096cb43\/The_cost_of_cybercrime___security_incidents_1400x752.png?w=1400&amp;h=752&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"752\" \/><\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\"><picture><\/picture><noscript><br data-mce-bogus=\"1\"><\/noscript><noscript><br data-mce-bogus=\"1\"><\/noscript><noscript><br data-mce-bogus=\"1\"><\/noscript><noscript><picture><source type=\"image\/webp\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/FObKUsh0lxLXp1cCi2HQK\/a8d28a4ad166932c84c4e8a9b096cb43\/The_cost_of_cybercrime___security_incidents_1400x752.png?w=750&amp;h=403&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/FObKUsh0lxLXp1cCi2HQK\/a8d28a4ad166932c84c4e8a9b096cb43\/The_cost_of_cybercrime___security_incidents_1400x752.png?w=1080&amp;h=580&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/FObKUsh0lxLXp1cCi2HQK\/a8d28a4ad166932c84c4e8a9b096cb43\/The_cost_of_cybercrime___security_incidents_1400x752.png?w=1366&amp;h=734&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/FObKUsh0lxLXp1cCi2HQK\/a8d28a4ad166932c84c4e8a9b096cb43\/The_cost_of_cybercrime___security_incidents_1400x752.png?w=1400&amp;h=752&amp;q=50&amp;fm=webp 1400w\" sizes=\"100vw\"\/><img title=\"The cost of cybercrime &amp; security incidents\" width=\"1\" height=\"0.5371428571428571\" data-main-image=\"\" style=\"object-fit:cover;opacity:0\" sizes=\"auto, 100vw\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/FObKUsh0lxLXp1cCi2HQK\/a8d28a4ad166932c84c4e8a9b096cb43\/The_cost_of_cybercrime___security_incidents_1400x752.png?w=1400&amp;h=752&amp;q=50&amp;fm=png\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/FObKUsh0lxLXp1cCi2HQK\/a8d28a4ad166932c84c4e8a9b096cb43\/The_cost_of_cybercrime___security_incidents_1400x752.png?w=750&amp;h=403&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/FObKUsh0lxLXp1cCi2HQK\/a8d28a4ad166932c84c4e8a9b096cb43\/The_cost_of_cybercrime___security_incidents_1400x752.png?w=1080&amp;h=580&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/FObKUsh0lxLXp1cCi2HQK\/a8d28a4ad166932c84c4e8a9b096cb43\/The_cost_of_cybercrime___security_incidents_1400x752.png?w=1366&amp;h=734&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/FObKUsh0lxLXp1cCi2HQK\/a8d28a4ad166932c84c4e8a9b096cb43\/The_cost_of_cybercrime___security_incidents_1400x752.png?w=1400&amp;h=752&amp;q=50&amp;fm=png 1400w\" alt=\"The cost of cybercrime &amp; security incidents\"\/><\/picture><\/noscript><\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">In this part, we delve into the cost of cybercrime in 2022 and examine the key findings that underscore the importance of organizations taking proactive steps to guard against potential cyber threats.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">5. $4.35 million \u2013 average total cost of a data breach<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">In 2022, the average data breach cost hit <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.ibm.com\/downloads\/cas\/3R8N1DZJ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">an unprecedented peak of $4.35 million<\/a>, surging by 2.6% from the previous year&#8217;s average cost of $4.24 million. This year-on-year increase has been consistent, with the average cost rising by a staggering 12.7% from $3.86 million as reported in 2020. These statistics demonstrate the relentless nature of cyber attacks, highlighting the need for constant vigilance and robust security measures to counter these threats.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">4. $4.82 million \u2013 average cost of a critical infrastructure data breach<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">When analyzing critical infrastructure organizations, such as those operating in financial services, industrial, technology, energy, transportation, communication, healthcare, education, and public sector industries, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/krontech.com\/highlights-of-the-2022-cost-of-a-data-breach-report\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">the average cost of a data breach was notably higher at $4.82 million<\/a>. This cost was $1 million more than the average cost of data breaches in other industries.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Shockingly, 28% of critical infrastructure organizations studied had been subjected to destructive or ransomware attacks, whereas 17% had encountered a breach due to their business partners&#8217; security compromise. These findings underscore the importance of strengthening cyber security strategies for critical infrastructure organizations and their third-party partners to safeguard against potential cyber threats.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">3. $4.54 million \u2013 average cost of a ransomware attack<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Ransomware attacks accounted for 11% of all breaches, marking a 41% increase from the previous year&#8217;s figures of 7.8%. Despite this surge, the average cost of a ransomware attack experienced a slight decrease, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/terranovasecurity.com\/truth-about-cost-of-data-breaches\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">from $4.62 million in 2021 to $4.54 million in 2022<\/a>. However, this cost was still marginally higher than the average total data breach cost, which stood at $4.35 million.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">These findings highlight the continued threat of ransomware attacks and the necessity for organizations to implement robust preventive measures to mitigate the associated risks.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">2. $1 million \u2013 average difference in cost where remote work was a factor<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Security breaches caused by remote work resulted in significantly higher costs compared to those without remote work involvement. On average, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.yeoandyeo.com\/resource\/data-breach-costs-increase-when-remote-workers-are-involved\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">the costs associated with remote work-related breaches were nearly $1 million higher<\/a>, with a reported cost of $4.99 million, as opposed to $4.02 million for breaches unrelated to remote work.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">This difference amounts to remote work-related breaches costing approximately $600,000 more than the global average cost. These figures underscore the financial risks and consequences associated with remote work and the importance of implementing strong security measures to safeguard sensitive data when remote work is necessary.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">1. $9.44 million \u2013 average cost of a breach in the United States<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">The top five countries and regions that experienced the highest average cost of a data breach were the United States, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.ibm.com\/downloads\/cas\/3R8N1DZJ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">with a staggering $9.44 million<\/a>, followed by the Middle East at $7.46 million, Canada at $5.64 million, the United Kingdom at $5.05 million, and Germany at $4.85 million. Notably, the United States has held the top position for 12 consecutive years.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Additionally, the country with the highest growth rate from the previous year was Brazil, with a significant increase of 27.8% from $1.08 million to $1.38 million. These findings reveal the persistence and costly nature of cyber attacks, irrespective of location, emphasizing the importance of maintaining robust cyber security measures to prevent such incidents.<\/p><h2 id=\"to-sum-up-2022\" class=\"Heading Heading-h2 text-dark-blue\">To sum up 2022<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">As we close out 2022, it&#8217;s clear that cyber security continues to be a top concern for businesses of all sizes and industries. The year saw unprecedented levels of attacks, with organizations worldwide experiencing an average of 1168 attacks per week in Q4 alone.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Unsurprisingly, the human element was involved in a staggering 82% of all breaches, with phishing and stolen credentials continuing to be a significant concern. Despite the increase in attacks, however, many businesses still don&#8217;t have adequate security measures, and the cost of cybercrime continues to rise.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">To protect their data and assets in 2023, organizations must prioritize implementing effective security strategies, risk management plans and staying up-to-date on the latest threats and prevention techniques.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">If your organization needs top-notch cybersecurity solutions, NordLayer provides flexible and easy-to-implement tools for all businesses. <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/contact-sales\/\">Get in touch with our specialists today<\/a> for more information.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is a critical concern for organizations w [&hellip;]<\/p>\n","protected":false},"author":148637484,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1075,1130,61],"tags":[1132,974,1076],"class_list":["post-66834","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-year2023","category-nordlayer","category-press-release","tag-nordlayer","tag-nord-security","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Must-know cybersecurity statistics of 2022 - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Must-know cybersecurity statistics of 2022 - Version 2\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is a critical concern for organizations w [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-08T08:25:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T08:31:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/rrrYFYVzS8zJYW3jg0Lo3\/497396e897f096ad6295d7490ed2c42b\/Cybersecurity_statistics_for_2022_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"versionpan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"versionpan\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"26 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/must-know-cybersecurity-statistics-of-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/05\\\/must-know-cybersecurity-statistics-of-2022\\\/\"},\"author\":{\"name\":\"versionpan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\"},\"headline\":\"Must-know cybersecurity statistics of 2022\",\"datePublished\":\"2023-05-08T08:25:59+00:00\",\"dateModified\":\"2024-09-13T08:31:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/05\\\/must-know-cybersecurity-statistics-of-2022\\\/\"},\"wordCount\":5193,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/must-know-cybersecurity-statistics-of-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/rrrYFYVzS8zJYW3jg0Lo3\\\/497396e897f096ad6295d7490ed2c42b\\\/Cybersecurity_statistics_for_2022_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"keywords\":[\"NordLayer\",\"Nord Security\",\"2023\"],\"articleSection\":[\"Nord Security\",\"2023\",\"NordLayer\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/must-know-cybersecurity-statistics-of-2022\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/05\\\/must-know-cybersecurity-statistics-of-2022\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/must-know-cybersecurity-statistics-of-2022\\\/\",\"name\":\"Must-know cybersecurity statistics of 2022 - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/must-know-cybersecurity-statistics-of-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/must-know-cybersecurity-statistics-of-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/rrrYFYVzS8zJYW3jg0Lo3\\\/497396e897f096ad6295d7490ed2c42b\\\/Cybersecurity_statistics_for_2022_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"datePublished\":\"2023-05-08T08:25:59+00:00\",\"dateModified\":\"2024-09-13T08:31:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/must-know-cybersecurity-statistics-of-2022\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/must-know-cybersecurity-statistics-of-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/must-know-cybersecurity-statistics-of-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/rrrYFYVzS8zJYW3jg0Lo3\\\/497396e897f096ad6295d7490ed2c42b\\\/Cybersecurity_statistics_for_2022_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/rrrYFYVzS8zJYW3jg0Lo3\\\/497396e897f096ad6295d7490ed2c42b\\\/Cybersecurity_statistics_for_2022_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/must-know-cybersecurity-statistics-of-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Must-know cybersecurity statistics of 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\",\"name\":\"versionpan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"caption\":\"versionpan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/versionpan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Must-know cybersecurity statistics of 2022 - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/","og_locale":"zh_HK","og_type":"article","og_title":"Must-know cybersecurity statistics of 2022 - Version 2","og_description":"Cybersecurity is a critical concern for organizations w [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/","og_site_name":"Version 2","article_published_time":"2023-05-08T08:25:59+00:00","article_modified_time":"2024-09-13T08:31:18+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/rrrYFYVzS8zJYW3jg0Lo3\/497396e897f096ad6295d7490ed2c42b\/Cybersecurity_statistics_for_2022_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","type":"","width":"","height":""}],"author":"versionpan","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"versionpan","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"26 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/05\/must-know-cybersecurity-statistics-of-2022\/"},"author":{"name":"versionpan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8"},"headline":"Must-know cybersecurity statistics of 2022","datePublished":"2023-05-08T08:25:59+00:00","dateModified":"2024-09-13T08:31:18+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/05\/must-know-cybersecurity-statistics-of-2022\/"},"wordCount":5193,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/rrrYFYVzS8zJYW3jg0Lo3\/497396e897f096ad6295d7490ed2c42b\/Cybersecurity_statistics_for_2022_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","keywords":["NordLayer","Nord Security","2023"],"articleSection":["Nord Security","2023","NordLayer","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/05\/must-know-cybersecurity-statistics-of-2022\/","url":"https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/","name":"Must-know cybersecurity statistics of 2022 - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/rrrYFYVzS8zJYW3jg0Lo3\/497396e897f096ad6295d7490ed2c42b\/Cybersecurity_statistics_for_2022_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","datePublished":"2023-05-08T08:25:59+00:00","dateModified":"2024-09-13T08:31:18+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/rrrYFYVzS8zJYW3jg0Lo3\/497396e897f096ad6295d7490ed2c42b\/Cybersecurity_statistics_for_2022_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/rrrYFYVzS8zJYW3jg0Lo3\/497396e897f096ad6295d7490ed2c42b\/Cybersecurity_statistics_for_2022_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/must-know-cybersecurity-statistics-of-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Must-know cybersecurity statistics of 2022"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8","name":"versionpan","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","caption":"versionpan"},"url":"https:\/\/version-2.com\/zh\/author\/versionpan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hnY","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/66834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/148637484"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=66834"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/66834\/revisions"}],"predecessor-version":[{"id":66843,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/66834\/revisions\/66843"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=66834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=66834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=66834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}