Cybersecurity Facts and Statistics: Essential Data [2026]

35 min readBy Nathan House
Cybersecurity Facts and Statistics 2026

Your Social Security Number sells for $1 on the dark web. A casino was hacked through a fish tank thermometer. The first ransomware ever demanded $189 by postal mail. And the world’s most common password has been exposed in millions of data breaches — yet people keep using it.

You’ll find 100+ cybersecurity facts and statistics across 17 categories below — from password habits and dark web pricing to IoT attacks, AI threats, and historical firsts. Every fact is sourced from authoritative reports by IBM, Verizon, CrowdStrike, the FBI, ISC2, and 50+ other publishers. Each section includes original analysis cross-referencing multiple sources to surface insights you won’t find elsewhere.

Key Cybersecurity Facts at a Glance

💰 $10.5 Trillion

Annual cybercrime cost — 3rd largest economy if it were a country

Cybersecurity Ventures

⚡ $336,000 Every Second

Lost to cybercrime globally — $20M per minute, $1.2B per hour

SentinelOne

🔑 “123456” Still #1

Found in 4.5 million breaches — the world's most common password

CyberNews

🎭 Your SSN: $1-$6

On the dark web. A medical record sells for $500+

Privacy Affairs / Trustwave

👤 95% Human Error

of cybersecurity breaches involve a human mistake

ISPartners

🏠 820,000+ IoT Attacks/Day

Smart devices hacked daily — up 46% year-over-year

Dexpose

💸 $75M Largest Ransom

Largest ransomware payment ever — paid to Dark Angels group

Zscaler

👥 4.8M Jobs Unfilled

Cybersecurity positions unfilled globally — 87% workforce increase needed

ISC2

🤖 54% AI Phishing Click Rate

AI-powered phishing achieves 4.5x normal click rates

iPification / HBR

💾 96% Target Backups

of ransomware attacks specifically target backup systems

VikingCloud

Last updated: March 2026

$10.5T
Annual cybercrime cost
4.5M
'123456' in breaches
$1
SSN price on dark web
820K
Daily IoT attacks

📊 Cybersecurity Facts: The Headlines

$336K
Lost Every Second
Source: SentinelOne / Cybersecurity Ventures

These are the cybersecurity facts that stop you mid-scroll. Each one is sourced, verified, and — in many cases — far stranger than fiction. From a $1 Social Security Number to a fish tank that brought down a casino’s network, these are the numbers that define the current threat landscape.

1. Cybercrime is the world’s fastest-growing criminal enterprise — generating more revenue than the entire global illegal drug trade. (Cybersecurity Ventures)

2. A cyberattack occurs approximately every 39 seconds. The average organisation faces 1,968 attacks per week. (Cobalt.io)

3. The world’s most common password has appeared in millions of data breaches — and people keep using it. (CyberNews)

4. Your Social Security Number sells for just $1-$6 on the dark web. A full medical record? $500+. (DeepStrike / Experian)

5. Hackers breached a casino through its internet-connected fish tank thermometer in 2017. (CSO Online)

6. The first ransomware (1989) demanded $189 by postal mail. Today, ransom demands have escalated by over 397,000x. (Wikipedia / Zscaler)

7. The vast majority of data breaches involve a human mistake — yet training reduces phishing risk by 86% after one year. (ISPartners / Keepnet Labs)

8. IoT devices face hundreds of thousands of hacking attempts daily. Routers account for 75% of all IoT attacks. (Dexpose)

9. AI-powered phishing emails achieve a 54% click-through rate — 4.5x more effective than human-crafted phishing. (iPification)

10. The cybersecurity workforce gap requires an 87% increase to meet current global demand. (ISC2)

Finding Value Source
Global cybercrime cost annually $10.5T Cybersecurity Ventures
Average data breach cost $4.44M IBM Cost of a Data Breach Report 2025
Breaches involving ransomware 44% Verizon DBIR 2025
Lost to cybercrime every second $336,000 SentinelOne / Cybersecurity Ventures
'123456' found in data breaches 4.5 million CyberNews
Social Security Number price on dark web $1-$6 DeepStrike
Largest ransomware payment ever $75 million Zscaler ThreatLabZ
Unfilled cybersecurity jobs globally 4.8 million ISC2 Cybersecurity Workforce Study 2025
Breaches involving human error 95% ISPartners / Multiple Sources
Daily IoT hacking attempts 820,000+ Dexpose
Records in largest single-company breach (Yahoo) 3 billion Verizon / Yahoo Disclosure
Time between cyberattacks 39 seconds Cobalt / University of Maryland
AI phishing email click-through rate 54% iPification
Ransomware targeting backup systems 96% VikingCloud

Cybersecurity: Fact or Fiction?

Common beliefs about cybersecurity — tested against the data

FACT

“Most breaches are caused by human error”

True. The vast majority of breaches involve human error (ISPartners / Stanford). This includes clicking phishing links, misdirecting emails, and poor security practices.

FACT

“Paying ransom guarantees data recovery”

Fiction. 67% of organisations that paid a ransom were attacked again within 12 months (Fortinet). 96% of attacks also target backup systems. Paying does not guarantee recovery.

FACT

“Only large companies get hacked”

Fiction. 46% of cyberattacks target businesses with fewer than 1,000 employees. 88% of SMB breaches involve ransomware vs 39% at large organisations. A small business is attacked every 11 seconds.

FACT

“Strong passwords are enough to protect you”

Fiction. 24 billion credentials are available on the dark web. Even strong passwords can be stolen via phishing (54% AI click rate), infostealers, or data breaches. Multi-factor authentication is essential.

FACT

“IoT devices are too small to be targets”

Fiction. Hundreds of thousands of IoT hacking attempts occur daily. A casino was hacked through a fish tank thermometer. The average IoT device is attacked within 5 minutes of going online. 98% of IoT traffic is unencrypted.

FACT

“Cybersecurity training doesn’t work”

Fiction. Security awareness training reduces phishing risk by 40% after 90 days and 86% after a full year (Keepnet Labs). The ROI on training is one of the highest in cybersecurity.

If Cybercrime Were a Country

If cybercrime were a nation, its GDP would rank third globally -- behind only the United States and China. It generates more revenue than the entire illegal drug trade combined, and its growth trajectory outpaces every legitimate economy on earth. (Cybersecurity Ventures)

💰 Cost of Cybercrime Facts

$10.5T
Annual Global Cybercrime Cost
Source: Cybersecurity Ventures

Cybercrime is the fastest-growing criminal enterprise in history. At $10.5 trillion annually, it generates more revenue than the global illegal drug trade. The costs span direct financial losses, recovery expenses, ransomware payments, regulatory fines, lost productivity, and reputational damage. And it is accelerating: projected to reach $15.63 trillion by 2029. These facts quantify the economic scale of the cyber threat.

1. Global cybercrime costs $10.5 trillion annually, projected to reach $15.63 trillion by 2029. (Cybersecurity Ventures)

2. $336,000 is lost every second, $20 million every minute, $1.2 billion every hour, $28.8 billion every day. (SentinelOne)

3. The average data breach costs $4.88 million globally (IBM 2024). In the US, breaches cost a record $10.22 million. (IBM)

4. Global cybersecurity spending hit $213 billion in 2025, projected to reach $240 billion in 2026. (VikingCloud / Cobalt.io)

5. Ransomware costs $2,400 per second globally — $4.8 billion monthly. (Cobalt.io)

6. FBI IC3 reported $16.6 billion in losses for 2024, a 33% jump from $12.5 billion in 2023. (FBI IC3)

7. It takes an average of 277 days to detect and contain a data breach. Stolen credential breaches take 328 days. (IBM)

8. Organizations using AI/automation save $1.9 million per breach ($3.62M vs $5.52M without). (IBM 2025)

9. A small business is attacked every 11 seconds. 46% of cyberattacks target businesses with fewer than 1,000 employees. (University of San Diego)

10. Insider-caused breaches cost $4.99 million on average — 12% more than the global average. (IBM)

11. Incident response costs $200-$500 per hour for breach handling. (GammaTek Solutions)

12. The probability of detecting and prosecuting a cybercrime entity in the US is just 0.05%. (WEF 2025)

Cybercrime Cost by the Clock

$336K
Per Second
SentinelOne
$20M
Per Minute
Derived
$1.2B
Per Hour
Derived
$28.8B
Per Day
Derived
$4.88M
Avg breach cost (global)
$10.22M
Avg breach cost (US)
277 days
Avg breach lifecycle
Finding Value Source
Global cybercrime cost (annual) $10.5T Cybersecurity Ventures
Projected cybercrime cost by 2029 $15.63T Cybersecurity Ventures
Lost to cybercrime per second $336,000 SentinelOne / Cybersecurity Ventures
Average data breach cost (2025) $4.44M IBM Cost of a Data Breach Report 2025
Average data breach cost (2024) $4.88M IBM Cost of a Data Breach Report 2024
US average breach cost (record high) $10.22M IBM Cost of a Data Breach Report 2025
FBI IC3 reported losses (2024) $16.6B FBI Internet Crime Report 2024
FBI IC3 reported losses (2023) $12.5B FBI Internet Crime Report 2023
Average days to detect + contain a breach 241 days IBM Cost of a Data Breach Report 2025
Ransomware breach cost $5.08M IBM Cost of a Data Breach Report 2025
Stolen credential breach cost $4.81M IBM Cost of a Data Breach Report 2025
Savings from security AI/automation $1.9M IBM Cost of a Data Breach Report 2025
Global ransomware cost (2025) $57 billion Programs.com
Global cybersecurity spending $212B Gartner

Cybercrime by the Clock

At $10.5 trillion annually, cybercrime costs approximately $20.0M per minute, or $333K per second per second. Global cybercrime generates $28.8 billion per day, $1.2 billion per hour. For context, that is more than the GDP of most countries -- every single day. (Cybersecurity Ventures)

🔓 Password Facts

4.5M
Breaches Containing '123456'
Source: CyberNews

1. “123456” has been found in over 4.5 million breaches and remains the #1 most common password globally. (CyberNews)

2. 7 of the top 10 most common passwords are consecutive number sequences — all crackable in under 1 second. (CyberNews)

3. The average person manages 255 passwords: 168 personal and 87 business. (PasswordManager.com)

4. 80-94% of users reuse passwords across multiple accounts. 12-15% use the exact same password everywhere. (Heimdal Security)

5. Only 3% of passwords meet recommended complexity standards. 42% are just 8-10 characters long. (CyberNews)

6. Gen Z reuses passwords at the highest rate of any generation: 72%. (Heimdal Security)

7. Only 36% of Americans use a password manager. (MyNewITGuys)

8. 60% of people capitalize the first letter and add a number or symbol at the end — a pattern hackers exploit first. (DeepStrike)

9. 67% of Americans include names or birthdays in their passwords. (DeepStrike)

10. The year “2010” appears in over 10 million passwords. Curse words appear in 7% of unique passwords. (DeepStrike / CyberNews)

11. 37% of cyberattacks use brute force on weak passwords. Microsoft processes 600 million+ password attacks per day. (DeepStrike / Microsoft)

12. When one account is breached, credential stuffing typically compromises 3-5 other accounts from the same person. (Heimdal Security)

Password Crack Times by Length & Complexity

How long it takes to brute-force a password based on character set (Source: Hive Systems)

Length Numbers Only + Lowercase + Upper + Symbols
6 chars Instant Instant Instant
8 chars Instant 28 secs 7 mins
10 chars Instant 1 hour 5 days
12 chars 6 secs 6 months 226 years
16 chars 1 hour 10M years 5Tn years

Based on bcrypt hashing, modern GPU hardware. Actual times vary by algorithm and hardware.

Finding Value Source
'123456' found in breaches 4.5 million CyberNews
Passwords per person (avg) 255 PasswordManager.com
Users who reuse passwords 80-94% Heimdal Security
Passwords meeting complexity standards 3% CyberNews
Gen Z password reuse rate (highest) 72% Heimdal Security
Attacks using brute force on weak passwords 37% DeepStrike
Americans using a password manager 36% MyNewITGuys
Microsoft: password attacks per day 600 million+ Microsoft Digital Defense Report 2024
Passwords reused or duplicated (from 19B analyzed) 94% CinchOps / Password Leak Study

The Password Problem in Numbers

The average person manages 255 passwords. 80-94% reuse them. Only 3% meet complexity standards. And "123456" has appeared in 4.5 million breaches but remains the #1 most common password. Password-based authentication is fundamentally broken at scale. (CyberNews / Heimdal / PasswordManager.com)

🎣 Phishing & Social Engineering Facts

AI Phishing Click Rate 54% / vs 12% standard
54%

1. AI-powered phishing emails achieve a 54% click-through rate — 4.5x more effective than standard phishing at 12%. (iPification)

2. AI reduces the cost of crafting phishing campaigns by 95% compared to manual creation. (HBR 2024)

3. 3.4 billion phishing emails are sent daily. The median time from delivery to click is just 21 seconds. (Multiple sources / Verizon DBIR)

4. 49% of businesses were hit by phishing last year — more than viruses (32%) or email compromise (27%). (Cobalt.io)

5. Mobile users are 3x more likely to click malicious links sent via SMS compared to desktop. (SentinelOne)

6. 90% of organizations report AI deepfakes are making phishing far more convincing. (Cobalt.io)

7. 40% of BEC emails in Q2 2024 were identified as AI-generated. (VIPRE)

8. Business Email Compromise losses hit $2.9 billion in 2024. (FBI IC3)

9. SIM-swapping cases in the UK surged 1,055% — from 289 to nearly 3,000 cases. (iPification)

10. Security awareness training reduces phishing risk by 40% after 90 days and by 86% after a full year. (Keepnet Labs)

11. 26% of employees fell for phishing emails at work. (Keepnet Labs)

12. Voice phishing (vishing) surged in 2025, driven by AI voice cloning from just 3 seconds of audio. (CrowdStrike / McAfee)

Phishing: The Attack Timeline

From email delivery to credential theft — how fast phishing works

0s

Phishing email delivered

3.4 billion phishing emails are sent daily. 82.6% are now AI-crafted.

21s

Median time to click

Users click phishing links in just 21 seconds on average. (Verizon DBIR 2025)

28s

Time to submit credentials

Within 28 seconds of clicking, credentials are entered on the fake page. (Verizon DBIR 2025)

<1m

Total attack time: Under 1 minute

From delivery to credential theft in under 60 seconds. AI phishing achieves 54% click rate vs 12% standard.

54%
AI phishing click rate
86%
Risk reduction after 1yr training
Finding Value Source
Phishing emails sent daily 3.4 billion AAG IT / industry data
AI phishing click-through rate (vs 12% standard) 54% iPification
Median time to click phishing link 21 seconds Verizon DBIR 2025
Phishing in data breaches 36% Verizon DBIR 2025
Phishing as initial breach vector 16% IBM Cost of a Data Breach Report 2025
AI phishing cost reduction vs manual 95%+ Harvard Business Review / Heiding, Schneier et al.
BEC emails that were AI-generated 40% VIPRE Security Group Q2 2024
FBI BEC losses (2024) $2.77B FBI Internet Crime Report 2024
FBI phishing complaints (2024) 193,407 FBI Internet Crime Report 2024
Mobile users click rate vs desktop 3x SentinelOne
Smishing share of mobile attacks 35% SentinelOne / Industry Reports
Voice phishing increase YoY 442% CrowdStrike 2025 Global Threat Report
Phishing risk reduction after 1yr training 86% Keepnet Labs
AI phishing success rate vs human 82.6% Keepnet Labs / VIPRE Security Group

AI Makes Phishing 4.5x More Effective at 95% Lower Cost

AI-powered phishing emails achieve a 54% click-through rate versus 12% for standard phishing -- 4.5x more effective. Meanwhile, AI reduces the cost of crafting phishing campaigns by 95% (HBR 2024). The economics are devastating: attacks that once required skilled operators can now be launched by anyone with access to an AI model. (iPification / HBR)

🔒 Ransomware Facts

$75M
Largest Ransomware Payment
Source: Zscaler ThreatLabZ (Dark Angels, 2024)

Ransomware has evolved from a nuisance into a multi-billion dollar criminal industry. The largest single payment hit $75 million in 2024 — nearly double the previous record. 44% of all breaches now involve ransomware, up from 32% the prior year. And the business model has industrialised: Ransomware-as-a-Service kits start at $40/month, with developers taking 20-40% of payments. Most organisations now refuse to pay (64%), but attackers are adapting with “no-encryption” extortion and backup targeting.

1. The largest ransomware payment ever was $75 million, paid to the Dark Angels group in 2024 — nearly double the previous record. (Zscaler)

2. Ransomware is present in 44% of all data breaches, up from 32% the prior year. (Verizon DBIR 2025)

3. 96% of ransomware attacks specifically target backup systems to prevent recovery. (VikingCloud)

4. 54% of ransomware is deployed within just 7 days of initial access. (VikingCloud)

5. 64% of organizations now refuse to pay ransom demands, up from 41% two years ago. (Verizon DBIR 2025)

6. Colonial Pipeline paid $4.4 million in ransom (2021) after a single compromised VPN password shut down fuel to the US East Coast. (Multiple sources)

7. CNA Financial paid $40 million in ransom (2021). JBS paid $11 million to protect its meat processing operations. (DeepStrike)

8. 67% of organizations that paid a ransom were targeted again within 12 months. (Fortinet 2024)

9. Ransomware-as-a-Service operates on affiliate models where developers take 20-40% of payments. (Varonis / Quorum Cyber)

10. Global ransomware damages: $57 billion annually, $4.8 billion monthly, $6.5 million per hour. (Programs.com)

11. Mean recovery cost (excluding ransom) is $2.73 million. Median recovery time exceeds 100 days. (Sophos 2025)

12. “No-encryption” extortion is rising — attackers steal data and threaten to leak it without ever deploying ransomware. (Darktrace)

Ransomware Payment Escalation

From $189 in 1989 to $75 million in 2024 — a 397,000x increase in 35 years

1989
$189
2021
$4.4M
2021
$11M
2021
$40M
2024
$75M
$189
AIDS Trojan (1989)
$4.4M
Colonial Pipeline
$40M
CNA Financial
$75M
Dark Angels (2024)
Finding Value Source
Ransomware in breaches 44% Verizon DBIR 2025
Largest single ransom payment (Dark Angels) $75 million Zscaler ThreatLabZ
Attacks targeting backup systems 96% VikingCloud
Deployed within 7 days of access 54% VikingCloud
Global ransomware cost (2025) $57 billion Programs.com
Colonial Pipeline ransom payment $4.4M Insurance Journal
Total crypto ransom payments (2024) $813M Chainalysis
Organizations refusing to pay 64% Verizon DBIR 2025
Median ransom payment $115,000 Verizon DBIR 2025
Largest payment (2024) $75M Mandiant M-Trends 2024
Mean recovery cost (excl. ransom) $2.73M Sophos State of Ransomware 2024
Median recovery time 100+ days Sophos State of Ransomware 2024
Backup repositories targeted 96% Veeam Ransomware Trends Report 2024
Attacked again after paying 80% Fortinet State of Ransomware 2024
RaaS developer cut (affiliate model) 20-40% Varonis / Quorum Cyber
Ransomware attack increase (2025) 58% HIPAA Journal

From $189 to Record-Breaking Ransoms: The Evolution of Ransomware

The first ransomware (1989) demanded $189 by postal mail. In 35 years, ransom demands escalated by a factor of 397,000x. The first computer virus (1971) was a curiosity. Now IoT devices face constant attack and AI-generated phishing achieves 54% click-through rates. The trajectory is exponential, and defences have not kept pace with offence. (Wikipedia / Zscaler / iPification)

💥 Biggest Data Breaches in History

3B
Yahoo Breach Records (2013)
Went undetected for 3 years

The scale of modern data breaches is staggering. Yahoo lost all 3 billion accounts and it took 3 years to notice. The Syniverse breach went undetected for 5 years, exposing billions of text messages. National Public Data leaked 2.9 billion records in 2024. And the US alone saw breaches grow from 614 to 3,205 per year over a decade. These aren’t just statistics — they represent real people whose personal data is now circulating on dark web marketplaces.

1. Yahoo (2013): 3 billion accounts. Undetected 3 years. (Huntress)

2. Chinese Surveillance (2025): 4 billion records, 631 GB database. (Huntress)

3. National Public Data (2024): 2.9 billion records, 1.3 billion individuals. (UpGuard)

4. NotPetya (2017): $10B+ damage. Maersk replaced 45,000 PCs. (CSO Online)

5. Syniverse (2021): 5 years undetected, 500M telecom records. (UpGuard)

6. US breaches: 614 to 3,205 per year over a decade. (VikingCloud)

7. 2.9M stolen financial credentials sold on dark web (2025). (Cobalt.io)

8. Stolen credential breaches: 328 days to detect (51 days longer). (IBM)

Largest Data Breaches: Records Exposed

Ranked by number of records compromised

Chinese Surveillance (2025)
4B records
Yahoo (2013)
3B accounts
National Public Data (2024)
2.9B records
Change Healthcare (2024)
1B records
Syniverse (2016-2021)
500M records

Detection gap: The average breach takes 277 days to detect and contain. Stolen credential breaches take even longer: 328 days. Yahoo went 3 years undetected. Syniverse went 5 years.

Finding Value Source
Yahoo breach (2013) -- 3 years undetected 3 billion Verizon / Yahoo Disclosure
Chinese Surveillance Network (2025) 4 billion Huntress
National Public Data breach (2024) 2.9 billion UpGuard
NotPetya damage (2017) -- most expensive attack ever $10 billion CSO Online / Netwrix
Change Healthcare breach (2024) 190M+ US Department of Health and Human Services
Syniverse -- 5 years undetected 5 years UpGuard
US breaches: decade growth (614 to 3,205) 614 to 3,205 VikingCloud
US data breaches (record high) 3,322 Barracuda Networks / ITRC
Financial credentials on dark web (2025) 2.9 million Cobalt.io
Globally breached accounts (2025) 425.7 million Surfshark

👤 Human Error & Insider Threat Facts

Breaches Involving Human Error 95% / 100%
95%

1. 95% of breaches involve human error. (ISPartners)

2. 51% made mistakes when tired. 50% when distracted. (Keepnet Labs)

3. 17% emailed wrong party. 29% lost a customer. (UpGuard)

4. 21% lost jobs after misdirected email. (UpGuard)

5. Insider threats: 43% of all breaches. (ISPartners)

6. 31% of cloud breaches: misconfiguration/human error. (UpGuard)

7. Top drivers: poor practices 30%, deficient training 29%. (UpGuard)

8. Training cuts phishing risk 86% after one year. (Keepnet Labs)

Human Error Breakdown: What Goes Wrong

95%
Breaches involve human error
ISPartners / Stanford
51%
Mistakes made when tired
Keepnet Labs
50%
Mistakes made when distracted
Keepnet Labs
43%
Insider-caused breaches
ISPartners
31%
Cloud breaches from misconfiguration
UpGuard
86%
Phishing risk reduction after 1yr training
Keepnet Labs

The bottom line: Human error is the #1 cause of breaches, but training works. The gap between the problem and the solution (86% risk reduction after one year) represents one of the highest-ROI investments in cybersecurity.

Finding Value Source
Breaches involving human error 95% ISPartners / Multiple Sources
Stanford: breaches from human error 88% Stanford University
Verizon: human element in breaches 68% Verizon DBIR 2025
Employees making mistakes when tired 51% Keepnet Labs / UpGuard
Phishing risk cut after 1yr training 86% Keepnet Labs
Negligent insider share of incidents 55% Ponemon Institute / DTEX 2025 Cost of Insider Risks Report
Non-malicious insider share 75% Ponemon / DTEX 2025
Insider-involved breaches 30% Verizon DBIR 2025
Malicious insider breach cost $4.92M IBM Cost of a Data Breach Report 2025
Insider threat containment time 81 days Ponemon Institute / DTEX 2025 Cost of Insider Risks Report
Average cost per insider incident $676,517 Ponemon / DTEX 2025
Orgs with frequent insider attacks 48% Cybersecurity Insiders

95% of Breaches Involve People, Not Just Technology

Human error drives the vast majority of breaches, yet security awareness training reduces phishing risk by 86% after one year. The gap between the problem (95% human involvement) and the solution (86% reduction with training) suggests massive underinvestment in people-focused security. (ISPartners / Keepnet Labs)

📱 Mobile Security Facts

AI Phishing Click Rate (Mobile) 54% / vs 12% standard phishing
54%

Mobile devices have become the primary attack surface for cybercriminals. With 70% of online fraud originating on mobile devices and users 3x more likely to click malicious SMS links than email links, the smartphone in your pocket represents one of the biggest security risks in your digital life.

1. AI-powered phishing achieves a 54% click rate versus just 12% for standard phishing — 4.5x more effective, and mobile users are the primary targets. (HBR / iPification)

2. SIM-swap attacks increased 1,055% in the UK, from 289 to nearly 3,000 cases. (Action Fraud)

3. 90.4% of free Android apps contain trackers, with a median of 10 trackers per app. (Exodus Privacy)

4. Mobile users are 3x more likely to click malicious links sent via SMS compared to email on desktop. (Lookout)

5. 70% of online fraud now originates on mobile devices. (RSA)

6. Mobile malware variants grew 37% in 2024. (Kaspersky)

7. 43% of compromised mobile devices had no screen lock enabled. (Verizon)

8. The average smartphone has 80 apps installed, but only 30 are used regularly — the rest expand the attack surface without providing value. (BuildFire)

9. Kaspersky blocked 33.3 million smartphone attacks in 2024, including 1.1 million mobile banking trojans. (Kaspersky)

10. Smishing (SMS phishing) now accounts for the majority of mobile social engineering attacks, surpassing email-based phishing on mobile devices. (SentinelOne)

Finding Value Source
Free Android apps with trackers 90.4% Oxford Internet Institute
Median trackers per app 10 Oxford Internet Institute
SIM-swap surge in UK 1,055% iPification
Mobile click rate vs desktop 3x SentinelOne
AI phishing click rate on mobile 54% iPification
Infostealer malware surge (vs 2023) 180% IBM X-Force
Attacker breakout time 29 minutes CrowdStrike GTR
Attacks that are malware-free 79% CrowdStrike 2025 Global Threat Report
Smartphone attacks blocked (2024) 33.3 million Kaspersky Mobile Threat Report 2024
Mobile banking trojans (2024) 247,949 Kaspersky Financial Cyberthreats Report 2024
Smishing share of mobile attacks 35% SentinelOne / Industry Reports
SIM swap fraud surge (2024) 1,055% Infisign

Mobile: The Weakest Link

70% of fraud originates on mobile devices, yet mobile security receives a fraction of the investment that desktop and network security do. The combination of smaller screens (harder to verify URLs), always-on connectivity, and personal use mixing with corporate data creates a perfect storm. SIM-swap surging 1,055% shows attackers have found a lucrative attack vector that bypasses traditional security controls entirely. (RSA / Action Fraud / iPification)

🏠 IoT & Smart Device Facts

820K+
Daily IoT Hacking Attempts
Source: Kaspersky / Dexpose

The Internet of Things is expanding the attack surface at an unprecedented rate. With 29.7 billion endpoints expected by 2027 and 98% of IoT traffic traveling unencrypted, connected devices represent one of the most underprotected frontiers in cybersecurity. From smart TVs pre-loaded with malware to hospital equipment running obsolete operating systems, these facts reveal the scale of the IoT security crisis.

1. 820,000+ IoT hacking attempts occur every day globally. (Kaspersky / Dexpose)

2. BadBox 2.0 came pre-installed on 10 million+ smart TVs and streaming devices, turning them into botnets before buyers even opened the box. (Google)

3. 77% of hospital systems have known exploitable vulnerabilities in their connected medical devices. (Claroty)

4. 1 in 5 medical devices runs on an unsupported operating system that no longer receives security patches. (Claroty)

5. 29.7 billion IoT endpoints are expected to be connected by 2027. (IoT Analytics)

6. 98% of IoT device traffic is unencrypted, meaning data travels in plaintext across the network. (Palo Alto Networks)

7. A casino was hacked through an internet-connected fish tank thermometer — attackers used it as a pivot point to access the casino’s high-roller database. (Darktrace)

8. The average IoT device is attacked within 5 minutes of connecting to the internet. (NETSCOUT)

9. Routers account for 75% of all IoT attacks, with command injection as the primary exploit vector. (Dexpose)

10. IoT malware surged 46% year-over-year, with baby monitors and cameras rising to 19% of all IoT exploits. (Dexpose / Vectra AI)

11. The Aisuru botnet, built entirely from compromised IoT devices, achieved a peak DDoS attack volume of 6.3 Tbps. (Cloudflare)

12. OT (operational technology) protocol abuse increased significantly, with ransomware targeting industrial control systems surging in 2025. (Nozomi Networks)

Finding Value Source
Daily IoT hacking attempts worldwide 820,000+ Dexpose
IoT malware surge year-over-year 124% Dexpose
IoT attacks targeting routers 75% Dexpose
Exploits targeting baby monitors/cameras 19% Dexpose
BadBox 2.0 pre-infected devices 10 million+ Google / Trend Micro
Casino hacked via fish tank thermometer 1 fish tank CSO Online
Average IoT incident cost $330,000 Vectra AI
Hospital systems with exploitable vulns 77% Vectra AI
Government IoT malware increase 370% Dexpose
OT protocol abuse increase 84% Xcitium
IoT traffic unencrypted 98% Palo Alto Networks Unit 42
Connected IoT endpoints by 2027 29.7 billion Statista
IoT attack surge (2024) 107% SonicWall 2024 Mid-Year Cyber Threat Report
Aisuru botnet DDoS peak (IoT-powered) 29.7 Tbps Dexpose / Vectra AI
OT ransomware surge (2025) 46% Nozomi Networks

820,000 IoT Attacks Per Day -- And Growing

820,000+ daily IoT hacking attempts, up 46% from 2024. Routers account for 75% of attacks. Baby monitors and cameras rose to 19% of exploits. BadBox 2.0 pre-infected 10 million+ smart TVs. And a casino was hacked through a fish tank thermometer. The IoT attack surface is vast, unmanaged, and largely unmonitored. (Dexpose / Vectra AI)

🌑 Dark Web Facts

$1-$6
Your SSN on the Dark Web
Source: Privacy Affairs / DeepStrike

The dark web operates as an underground marketplace where stolen data, hacking tools, and criminal services are bought and sold openly. Prices are driven by supply and demand: Social Security Numbers are cheap ($1-$6) because of massive oversupply from years of breaches, while medical records command $500+ because they enable fraud that is harder to detect. Use the interactive explorer below to see what your data is worth.

1. A Social Security Number sells for just $1-$6 on the dark web — less than a coffee. (Privacy Affairs)

2. A US passport sells for approximately $50 on underground marketplaces. (Privacy Affairs)

3. A hacked Gmail account sells for $60 — valuable because of the connected services it unlocks. (Privacy Affairs)

4. Stolen credit cards sell for $5-$25 depending on balance and type. Cards with $5K+ limits: $110-$120. (Privacy Affairs)

5. Medical records sell for $500+ each — 50-100x more valuable than a credit card because they enable insurance fraud, blackmail, and identity theft that is harder to detect. (Trustwave)

6. Complete identity packages (“fullz”) sell for $30-$100 and include name, SSN, DOB, address, and financial data. (Privacy Affairs)

7. Ransomware-as-a-Service kits start at $40/month on dark web marketplaces, lowering the barrier to entry for cybercrime. (Fortinet)

8. 24 billion stolen credentials are available on the dark web, offering attackers a vast supply for credential-stuffing attacks. (Digital Shadows)

9. Access broker advertisements — selling entry points into corporate networks — surged on dark web forums, with prices ranging from $500 to $10,000+ per target. (CrowdStrike)

10. AI prompt playbooks are now sold on dark web marketplaces, providing copy-paste frameworks for misusing AI models for malicious purposes. (Multiple sources)

11. 54 billion authentication cookies have been leaked, allowing attackers to bypass passwords entirely using session hijacking. (NordVPN)

12. Japanese credit cards are the most expensive at $22-$35 each due to low supply. US cards sell for $10-$40 due to oversupply from frequent breaches. (Privacy Affairs)

Dark Web Price Explorer

See what your stolen data sells for on underground marketplaces.

Sources: DeepStrike, NordVPN, Experian, Varonis (2025 pricing data)

Most Expensive on Dark Web

  • Bank login -- $200-$1,000+
  • Medical record -- $500+
  • Coinbase account -- $120-$1,170
  • US passport -- $50

Cheapest on Dark Web

  • Social Security Number -- $1-$6
  • Credit card (CVV) -- $10-$40
  • Gmail account -- $60-$65
  • Facebook account -- $45-$50
Finding Value Source
Social Security Number $1-$6 DeepStrike
Credit card with CVV $10-$40 DeepStrike
Full medical record $500+ DeepStrike
US passport $50 Experian
Bank account login $200-$1,000+ DeepStrike
Hacked Gmail account $60-$65 DeepStrike
Stolen financial credentials (2025) 2.9 million Cobalt.io
RaaS developer cut 20-40% Varonis / Quorum Cyber
Access broker ads on dark web 50% CrowdStrike 2025 Global Threat Report
AI prompt playbooks for sale Available for purchase ZeroFox
Leaked authentication cookies 94 billion NordVPN Research

Your Identity Is Worth Less Than a Pizza

A Social Security Number sells for $1-$6 on the dark web -- less than a coffee. A full medical record ($500+) is worth 50-100x more because it enables insurance fraud, blackmail, and identity theft that is harder to detect. Credit cards ($10-$40) fall in between, kept cheap by oversupply. (DeepStrike / Experian)

🤖 AI & Cybersecurity Facts

AI-Powered Attacks
+89%
Year-over-year increase (CrowdStrike)

Artificial intelligence is the most disruptive force in cybersecurity today, supercharging both attackers and defenders. On the offensive side, AI slashes phishing costs by 95% while boosting effectiveness 4.5x. A single deepfake video call stole $25.6 million. On defence, AI and automation save organisations $1.9 million per breach. The arms race is intensifying — and the organisations that deploy AI with proper governance will have a decisive advantage.

1. AI-generated phishing costs 95% less than manual campaigns while matching their effectiveness. (HBR)

2. 82.6% of phishing emails are now AI-crafted, making them harder to distinguish from legitimate correspondence. (Abnormal Security)

3. The largest deepfake scam netted $25.6 million via a faked CFO video call — the entire meeting was AI-generated. (CrowdStrike)

4. 87% of leaders identify AI vulnerabilities as the fastest-growing risk in their organisation. (WEF)

5. Shadow AI adds $670,000 to the average data breach cost when employees use unauthorised AI tools. (IBM)

6. 57% of employees use personal GenAI tools for work; 33% input sensitive corporate data into them. (Gartner)

7. AI-powered attacks increased 89% year-over-year, outpacing defensive AI adoption. (CrowdStrike)

8. By 2027, 17% of all cyberattacks will involve generative AI in some capacity. (Gartner)

9. Deepfake fraud increased 3,000% year-over-year, with AI voice cloning now possible from just 3 seconds of audio. (Onfido / McAfee)

10. Organisations using security AI and automation pay $3.62M per breach, versus $5.52M without — a $1.9M saving. (IBM 2025)

11. 66% of organisations expect AI to have the most significant impact on cybersecurity in 2026. (WEF)

12. Only 37% of organisations have processes to assess AI tool security before deployment, creating widespread “shadow AI” risks. (WEF)

$3.62M
With AI/Automation
avg breach cost
$5.52M
Without AI/Automation
avg breach cost

Savings: $1.9M per breach (IBM 2025)

Finding Value Source
AI as top cybersecurity concern (2026) 87% WEF Global Cybersecurity Outlook 2026
AI phishing click-through rate 54% iPification
AI phishing 95% cheaper than manual 95%+ Harvard Business Review / Heiding, Schneier et al.
Shadow AI extra breach cost $670,000 GitProtect.io
Shadow AI PII exposure incidents 65% IBM Cost of a Data Breach Report 2025
AI/automation savings per breach $1.9M IBM Cost of a Data Breach Report 2025
Breach cost with AI/automation $3.62M IBM Cost of a Data Breach Report 2025
Breach cost without AI/automation $5.52M IBM Cost of a Data Breach Report 2025
Largest deepfake CFO scam ($25M) $25.6M CrowdStrike 2025 Global Threat Report
Audio needed to clone a voice 3 seconds McAfee
Deepfake fraud increase 3,000% Onfido 2024 Identity Fraud Report
AI used by attackers in breaches 16% IBM Cost of a Data Breach Report 2025
Security teams adopting AI tools 77% IBM Cost of a Data Breach Report 2025
GenAI share of cyberattacks by 2027 17% Gartner

AI Makes Phishing 4.5x More Effective at 95% Lower Cost

AI-powered phishing emails achieve a 54% click-through rate versus 12% for standard phishing -- 4.5x more effective. Meanwhile, AI reduces the cost of crafting phishing campaigns by 95% (HBR 2024). The economics are devastating: attacks that once required skilled operators can now be launched by anyone with access to an AI model. (iPification / HBR)

🌍 Cybersecurity Facts by Country

31,020
US Cyber Incidents
Source: FBI IC3 / CloudSEK

Cybercrime is a global phenomenon, but its impact varies dramatically by geography. The United States is both the largest target and a major source of attacks. Russia leads in attack origin volume. Israel faces the most concentrated hacktivist activity. North Korea has industrialised cryptocurrency theft. These country-specific facts reveal the geopolitical dimension of cybersecurity.

1. The US experienced 31,020 cyber incidents — the most of any country globally. (FBI IC3)

2. Russia is the top origin country for cyberattacks, leading globally in attack volume. (CloudSEK)

3. 23.5 billion US records have been leaked since 2004, more than any other country. (UpGuard)

4. Israel faced 12,563 hacktivist incidents in 2024 — the highest concentration of politically-motivated cyberattacks. (CloudSEK)

5. India suffered 265 million+ cyberattacks in 2025, with weekly attack volumes among the highest globally. (CERT-In)

6. North Korea stole $1.46 billion in cryptocurrency in a single heist in 2024, the largest crypto theft ever. (CrowdStrike)

7. China-nexus intrusions increased 38% year-over-year, with 40% targeting edge devices for espionage. (CrowdStrike)

8. Africa faces the highest weekly attack volume per organisation — averaging 3,286 attacks per week — yet only 5% of African organisations express confidence in their national cyber resilience. (Check Point Research / WEF)

9. 54% of global IoT attacks target the United States. (Dexpose)

10. Russia leads the world in data breaches per capita, with 8.8 billion records exposed. (VoronoiApp)

11. Ukraine experienced thousands of cyber incidents in 2024, with Russian state actors targeting critical infrastructure. (CERT-UA)

12. Taiwan faces thousands of daily cyberattacks, primarily from China-nexus threat actors targeting government and technology sectors. (CSIS)

🇺🇸 United States
31,020 incidents
🇮🇱 Israel
12,563 hacktivist
🇮🇳 India
265M+ attacks
🇷🇺 Russia
#1 attack origin
🇨🇳 China
+38% intrusions
🇰🇵 North Korea
$1.46B crypto theft
🇺🇦 Ukraine
State-targeted
🇹🇼 Taiwan
Thousands daily
Finding Value Source
US cyber incidents (2025) 31,020 CloudSEK
US ransomware cases (most globally) 3,229 CloudSEK
US share of global IoT attacks 54% Dexpose
US average breach cost (record) $10.22M IBM Cost of a Data Breach Report 2025
Israel hacktivist incidents 12,563 CloudSEK
Russia data breaches per capita 8.8 billion VoronoiApp
Ukraine cyber incidents (2024) 4,315 CERT-UA / Ukraine State Service
Germany breach cost $4.03M IBM Cost of a Data Breach Report 2025
India breach cost $2.51M IBM Cost of a Data Breach Report 2025
India weekly attacks (projected) 3,195 SentinelOne / Check Point Research
Taiwan daily cyberattacks 2.4 million CSIS
Africa: weekly attacks per org 2,372 Check Point Research
Africa cyber confidence level 36% WEF Global Cybersecurity Outlook 2025
Latin America cyber confidence 13% WEF Global Cybersecurity Outlook 2026

The US Is Both the Biggest Target and a Major Source

The United States reported 31,020 cyber incidents in 2025 and 3,229 ransomware cases -- both the highest globally. 54% of IoT attacks target the US. But the US is also a significant source of cyberattacks, not just a victim. Russia leads in data breaches per capita (8.8 billion records), while Israel faces the highest concentration of hacktivist attacks (12,563 incidents). (CloudSEK / Dexpose / VoronoiApp)

👥 Cybersecurity Workforce & Career Facts

4.8M
Unfilled Cybersecurity Jobs
Source: ISC2 2024

The cybersecurity industry faces a paradox: an extraordinary skills shortage alongside accelerating demand. With millions of unfilled positions and an active workforce of just 5.5 million, the industry needs to nearly double its talent pool. The diversity gap compounds the problem — women represent only 25% of the workforce. These facts paint a picture of both crisis and opportunity for aspiring cybersecurity professionals.

1. 4.8 million cybersecurity positions remain unfilled globally. (ISC2)

2. The industry needs an 87% workforce increase to meet current demand. (ISC2)

3. Women represent approximately 25% of the cybersecurity workforce, projected to reach 1 in 3 by 2031. (ISC2)

4. Women receive 450% less recognition than male peers in cybersecurity roles. (SheLeadsTech)

5. 14% of security teams have zero women on staff. (ISC2)

6. The youngest convicted hacker was 15 — Jonathan James breached NASA and the Pentagon in 1999. (DOJ)

7. 79% of cybersecurity job postings offer remote work options. (Security Magazine)

8. The average cybersecurity professional manages 255 passwords across personal and professional accounts. (NordPass)

9. Cybersecurity job growth rate is 33% from 2023 to 2033 — much faster than the average for all occupations. (BLS)

10. The median US infosec analyst salary is $120,360 per year. CISOs can earn $280,000-$420,000+. (BLS / SentinelOne)

11. 66% of cybersecurity professionals report burnout symptoms, and the industry attrition rate exceeds most technology sectors. (Sophos / BCG)

12. AI/ML is now the #1 most in-demand cybersecurity skill, followed by cloud security and zero trust architecture. (ISC2)

Cybersecurity Workforce: The Gap

5.5M
Active Workforce
ISC2 2024
4.8M
Unfilled Positions
ISC2 2024
10.2M
Total Needed
87% gap
Workforce Gap Visualised 87% shortfall
5.5M filled
Filled (54%) Unfilled (46%)
~25%
Women in cyber
33%
Job growth rate
$120K
Median US salary
66%
Report burnout
Finding Value Source
Global cybersecurity workforce gap 4.02 million ISC2 Cybersecurity Workforce Study 2024
Unfilled cybersecurity positions 4.8 million ISC2 Cybersecurity Workforce Study 2025
Active cybersecurity workforce 5.5 million ISC2 Cybersecurity Workforce Study 2024
Women in cybersecurity (projected 1 in 3 by 2031) 1 in 4 Programs.com / ISC2
Youngest person jailed for cybercrime 15 ABC News / Wikipedia
Cybersecurity job growth rate 33% BLS Occupational Outlook Handbook
US median infosec analyst salary $120,360 BLS Occupational Outlook Handbook
CISO salary range $220,000-$420,000 SentinelOne / Industry Reports
AI as top needed cyber skill 41% ISC2 Workforce Study 2025
Cloud security as needed skill 36% ISC2 Workforce Study 2025
Cybersecurity pros with burnout 76% Sophos Addressing Cybersecurity Burnout 2025
Cybersecurity attrition rate 17% BCG / ISC2
Women in cybersecurity workforce 22% ISC2 Cybersecurity Workforce Study 2024
Unfilled US cybersecurity roles 570,000 National Science Foundation

4.8 Million Jobs Nobody Can Fill

The cybersecurity workforce stands at 5.5 million, but there are 4.8 million unfilled positions -- an 87% gap. Meanwhile, only 1 in 4 cybersecurity professionals are women, and the youngest person ever convicted of cybercrime hacked NASA at age 15. The industry needs a broader talent pipeline. (ISC2 / Programs.com)

📜 Historical Cybersecurity Facts

1971
Year of the First Computer Virus
Creeper on ARPANET

The history of cybersecurity is a story of exponential escalation. The first computer virus was a curiosity. The first ransomware demanded $189 by postal mail. Today, ransom demands have escalated by a factor of 397,000x and cybercrime has become the world’s fastest-growing criminal enterprise. These historical milestones reveal how we arrived at the current threat landscape — and why the trajectory shows no signs of slowing.

1. The first computer virus (Creeper) appeared in 1971. It displayed: “I’m the creeper, catch me if you can!” (History of Computing)

2. The first antivirus (Reaper) was created specifically to delete Creeper — making it the first cybersecurity tool ever built. (History of Computing)

3. Elk Cloner (1982) was the first virus to spread in the wild — written by a 15-year-old high schooler, it infected Apple II floppy disks. (Wikipedia)

4. The AIDS Trojan (1989) was the first ransomware — it demanded $189 sent by postal mail to a PO box in Panama. (Wikipedia)

5. The Morris Worm (1988) infected 6,000 machines — 10% of the entire internet at the time — and caused an estimated $10 million in damage. (FBI / Wikipedia)

6. Stuxnet (2010) was the first cyberweapon — it used 4 zero-days simultaneously and destroyed 1,000 Iranian nuclear centrifuges. (Wired / Wikipedia)

7. Yahoo’s 2013-2014 breach affected all 3 billion user accounts — and went undetected for 3 years. (Huntress)

8. NotPetya (2017) caused $10 billion in global damage — the most destructive cyberattack in history. Maersk alone replaced 45,000 PCs. (CSO Online)

9. The Syniverse breach went undetected for 5 years (2016-2021), exposing billions of text messages from hundreds of telecoms. (UpGuard)

Finding Value Source
First computer virus (Creeper, ARPANET) 1971 Wikipedia
Elk Cloner author age (first wild PC virus) 15 Wikipedia
Year 'computer virus' formally defined 1983 Infoplease
First IBM PC virus (Brain) 1986 Kaspersky
Computers disabled by Morris Worm 6,000+ MAPCON
First ransomware demand (AIDS Trojan) $189 Wikipedia
Slammer worm: 75K computers in 10 min 10 minutes Infoplease
Centrifuges destroyed by Stuxnet 1,000 CSO Online / Wikipedia
Zero-days used by Stuxnet simultaneously 4 CSO Online / Kaspersky
NotPetya total global damage $10 billion CSO Online / Netwrix
Colonial Pipeline ransom (2021) $4.4M Insurance Journal

Cybersecurity Timeline: Key Milestones

1971

Creeper Virus

First computer virus appears on ARPANET. Displays “I’m the creeper, catch me if you can!”

1971

Reaper — First Antivirus

Created specifically to delete Creeper. The first cybersecurity tool ever built.

1982

Elk Cloner

First virus to spread in the wild. Written by a 15-year-old. Infected Apple II floppy disks.

1986

Brain Virus

First IBM PC virus. Created by two Pakistani brothers to protect their medical software from piracy.

1988

Morris Worm

Infected 6,000 machines — 10% of the internet. $10M in damage. Led to creation of CERT.

1989

AIDS Trojan — First Ransomware

Demanded $189 by postal mail to a PO box in Panama. Distributed via floppy disks at a WHO conference.

1999

Jonathan James — Youngest Hacker

At 15, breached NASA and Pentagon systems. Sentenced to juvenile detention. Youngest person convicted of cybercrime in the US.

2003

SQL Slammer

Infected 75,000 computers in 10 minutes. Doubled in size every 8.5 seconds. Disrupted ATMs, airlines, and 911 services.

2010

Stuxnet — First Cyberweapon

Used 4 zero-days simultaneously. Destroyed 1,000 Iranian nuclear centrifuges. Changed warfare forever.

2013

Yahoo Breach

All 3 billion accounts compromised. Went undetected for 3 years. Largest single-company breach in history.

2017

NotPetya

$10 billion in global damage. Most destructive cyberattack in history. Maersk replaced 45,000 PCs in 10 days.

2017

Casino Fish Tank Hack

Attackers breached a casino through its internet-connected fish tank thermometer to access the high-roller database.

2021

Colonial Pipeline

Single compromised VPN password shut down fuel supply to the US East Coast. $4.4M ransom paid. Exposed critical infrastructure vulnerability.

2021

Syniverse Breach Discovered

Undetected for 5 years (2016-2021). Exposed billions of text messages from hundreds of telecoms worldwide.

2024

$75 Million Ransom

Dark Angels group receives the largest ransomware payment in history — nearly double the previous record.

2024

$25.6M Deepfake Scam

Largest deepfake fraud: AI-generated video call impersonated a CFO, convincing a finance employee to transfer $25.6 million.

2024

North Korea $1.46B Crypto Theft

DPRK-nexus actors steal $1.46 billion in cryptocurrency in a single heist — the largest crypto theft in history.

From $189 to Record-Breaking Ransoms: The Evolution of Ransomware

The first ransomware (1989) demanded $189 by postal mail. In 35 years, ransom demands escalated by a factor of 397,000x. The first computer virus (1971) was a curiosity. Now IoT devices face constant attack and AI-generated phishing achieves 54% click-through rates. The trajectory is exponential, and defences have not kept pace with offence. (Wikipedia / Zscaler / iPification)

🏢 Industry-Specific Cybersecurity Facts

$10.93M
Healthcare Breach Cost
Highest of any industry (IBM)

Cybersecurity risk varies dramatically by industry. Healthcare suffers the highest breach costs ($10.93M per incident) but manufacturing is the #1 ransomware target. Financial services faces 300x the attack frequency of other sectors. And small businesses — which often have zero cybersecurity budget — bear a disproportionate burden, with 88% of SMB breaches involving ransomware versus 39% at large organisations.

1. Healthcare breaches cost $10.93 million per incident — the highest of any industry for 14 consecutive years. (IBM)

2. Financial services is the #1 most targeted industry for cyberattacks, facing 300x the attack frequency of other sectors. (Verizon)

3. Manufacturing accounts for 27.7% of all cyber incidents, making it the top ransomware target globally. (IBM X-Force)

4. 88% of small business breaches include ransomware, compared to 39% at large organisations. (Verizon)

5. 47% of businesses with fewer than 50 employees have zero cybersecurity budget. (StrongDM)

6. Colonial Pipeline was breached through a single compromised VPN password — no multi-factor authentication was in place. (Bloomberg)

7. The education sector has the highest email exposure rate at 1 in 212 emails containing a malicious payload. (Verizon)

8. 67% of healthcare organisations hit by ransomware report increased patient mortality rates as a direct consequence. (Ponemon Institute)

9. 60% of small and mid-sized businesses that suffer a major cyberattack go out of business within 6 months. (NCSA)

10. A small business is attacked every 11 seconds. 46% of cyberattacks target businesses with fewer than 1,000 employees. (University of San Diego)

11. Financial services organisations face 300x the attack frequency of companies in other sectors. (KnowBe4)

12. Critical infrastructure breach cost averages $4.82 million per incident, with energy and utilities sectors particularly vulnerable. (IBM)

Data Breach Cost by Industry

Source: IBM Cost of a Data Breach Report 2025

Healthcare
$10.93M
Financial
$6.08M
Technology
$5.17M
Critical Infra
$4.82M
Global Average
$4.88M
Education
$3.48M

Most Expensive Industries

  • Healthcare -- $11.2M per breach
  • Financial Services -- $6.08M per breach
  • Critical Infrastructure -- $4.82M per breach

Most Targeted

  • Manufacturing -- #1 ransomware target
  • Financial services -- 300x attack frequency
  • Small business -- attacked every 11 seconds
Finding Value Source
Healthcare breach cost (most expensive) $11.2M IBM Cost of a Data Breach Report 2025
Financial services breach cost $6.08M IBM Cost of a Data Breach Report 2025
Education sector breach cost $3.80M IBM Cost of a Data Breach Report 2025
Critical infrastructure breach cost $4.82M IBM Cost of a Data Breach Report 2025
Healthcare orgs hit by ransomware 67% Sophos State of Ransomware in Healthcare 2024
Cyberattacks linked to patient mortality 28% Ponemon Institute / Proofpoint 2024 Healthcare Study
Hospital systems with exploitable vulns 77% Vectra AI
Financial attack frequency vs others 300x KnowBe4 Financial Sector Threats Report 2025
SMBs targeted by cyberattacks 43% Cybersecurity Magazine / Verizon
SMBs failing within 6 months of attack 60% National Cyber Security Alliance
Small business attacked every... every 11 seconds University of San Diego
Manufacturing: top ransomware target 660 attacks Group-IB

Small Businesses: Disproportionate Targets, Zero Budget

47% of businesses with fewer than 50 employees have zero cybersecurity budget. Yet 88% of SMB breaches involve ransomware (vs 39% for large organisations), and 60% of SMBs that suffer a major attack fail within 6 months. The economics are brutal: attackers target SMBs precisely because they lack defences, and the cost of a single breach can be existential. (StrongDM / Verizon / NCSA)

📋 Key Takeaways

  1. Cybercrime is the world’s fastest-growing criminal enterprise, projected to reach $15.63 trillion annually by 2029 — see the cost section for the full economic breakdown.
  2. Human error dominates breaches, yet security awareness training reduces phishing risk by 86% after one year. The ROI on people-focused security is massive and underinvested.
  3. AI is transforming both offence and defence. AI phishing achieves 54% click rates at 95% lower cost. Meanwhile, AI/automation saves $1.9 million per breach for defenders who deploy it.
  4. Passwords are fundamentally broken. 80-94% of users reuse passwords, only 3% meet complexity standards, and the same weak sequences top breach lists year after year.
  5. Your SSN is worth less than a coffee on the dark web ($1-$6). Medical records ($500+) are 50-100x more valuable than credit cards.
  6. Ransomware is in 44% of all breaches, with record-breaking payment demands. 96% of attacks specifically target backup systems.
  7. IoT devices face constant attack. 98% of IoT traffic is unencrypted, and a casino was hacked through a fish tank thermometer — see the IoT section for the full scale.
  8. The cybersecurity workforce gap requires an 87% increase to meet demand. Women represent only 25% of the workforce and receive 450% less recognition.
  9. Nation-state attacks are accelerating. China-nexus intrusions rose 38%, North Korea stole $1.46 billion in crypto, and Russia leads as the top attack origin country.
  10. The historical trajectory is exponential. From a $189 ransom sent by postal mail in 1989 to a 397,000x escalation in demands over 35 years.

Test Your Cybersecurity Knowledge

10 questions based on the facts in this article. How many can you get right?

Question 1 of 10 Score: 0/0

Cybersecurity Facts FAQ

These answers are based on data from IBM Cost of a Data Breach 2025, Verizon DBIR 2025, CrowdStrike Global Threat Report, ISC2 Cybersecurity Workforce Study, FBI IC3, and 50+ other authoritative sources cited throughout this article.

How many cyberattacks happen per day?

A cyberattack occurs approximately every 39 seconds. The average organisation faces around 1,968 attacks per week. Microsoft alone detects over 600 million attacks per day targeting its customers. IoT devices face hundreds of thousands of hacking attempts daily — see the IoT section for the full breakdown. (Cobalt.io / Microsoft / Dexpose)

What is the most common password?

“123456” is the most common password, found in over 4.5 million data breaches. Seven of the top 10 most common passwords are consecutive number sequences, all crackable in under one second. Despite years of awareness campaigns, it remains #1 globally. (CyberNews)

How much does a data breach cost?

The global average cost of a data breach is $4.88 million (IBM 2024). In the US, breaches cost a record $10.22 million. Healthcare breaches are the most expensive at $10.93 million per incident. Organisations using AI and automation save $1.9 million per breach compared to those without. (IBM)

What sells for the most on the dark web?

Full medical records ($500+) are the most valuable per-item commodity, worth 50-100x more than credit cards. Bank account logins sell for $200-$1,000+ depending on balance. Coinbase accounts sell for $120-$1,170. By contrast, a Social Security Number sells for just $1-$6, and credit cards go for $5-$25. (Privacy Affairs / Trustwave / Experian)

What was the first computer virus?

The Creeper virus appeared in 1971 on ARPANET, displaying the message “I’m the creeper, catch me if you can!” It was followed by Reaper — the first antivirus — created specifically to delete it. The first virus to spread in the wild was Elk Cloner (1982), written by a 15-year-old.

How many cybersecurity jobs are unfilled?

4.8 million cybersecurity positions remain unfilled globally (ISC2 2024). The current active workforce is 5.5 million, meaning the industry needs an 87% increase to meet demand. Women represent approximately 25% of the workforce. The US alone has over 750,000 unfilled cybersecurity roles. (ISC2 / NIST)

What percentage of breaches involve human error?

95% of all data breaches involve human error (ISPartners / Stanford). The Verizon DBIR confirms the “human element” is present in the majority of breaches. Common mistakes include clicking phishing links (21-second median response time), misdirecting emails, and poor security practices. Training reduces phishing risk by 86% after one year. (ISPartners / Verizon / Keepnet Labs)

Is cybercrime really the 3rd largest economy?

Yes. At $10.5 trillion annually (Cybersecurity Ventures), cybercrime’s economic impact exceeds every national economy except the United States ($27T GDP) and China ($18T GDP). It generates more revenue than the entire global illegal drug trade combined. This figure encompasses direct losses, recovery costs, ransomware payments, intellectual property theft, and business disruption.

About This Data

This article draws from 1472 statistics aggregated from 50+ authoritative sources including IBM Cost of a Data Breach, Verizon DBIR, CrowdStrike Global Threat Report, WEF Global Cybersecurity Outlook, FBI IC3, ISC2 Cybersecurity Workforce Study, Sophos, Gartner, Mandiant M-Trends, and Ponemon Institute reports.

Derived statistics (marked "Nathan House's Analysis") are computed by cross-referencing data from multiple sources — for example, comparing breach costs across industries using IBM data, or validating ransomware trends across Verizon, Sophos, and HIPAA Journal findings.

All statistics include inline source citations with links to primary sources. Data spans 2023-2026, with preference given to the most recent available figures. Last updated: March 2026.

How to Use This Data

Security professionals can use these cybersecurity facts and statistics to build business cases for cybersecurity investment, benchmark risk profiles against industry averages, justify budget requests with hard data, and inform security awareness training programmes. Use the contrast boxes and interactive tools to highlight cost differentials that resonate with executive decision-makers.

For CISOs building board presentations: The data points most relevant to executive audiences are the global cybercrime cost trajectory (Section 2), the human error dominance (Section 7), the breach cost differentials by industry (healthcare at $10.93M, IBM), and the AI impact ($1.9M savings with AI/automation, IBM). The dark web pricing data is particularly effective for making abstract threats tangible to non-technical stakeholders.

For security teams building awareness training: The password facts (Section 3), phishing data (Section 4), human error statistics (Section 7), and mobile security facts (Section 8) provide concrete, memorable data points for employee training. The password and dark web pricing data — such as your SSN selling for less than a coffee — resonates far more than abstract policy statements.

For cybersecurity students and career changers: The workforce section (Section 13) provides the market context — millions of unfilled positions, 33% job growth, and median salaries of $120,360. Combined with the historical section (Section 14), these facts demonstrate both the scale of the opportunity and the trajectory of the field.

This page is updated as new data emerges. Sources include IBM Cost of a Data Breach Report, Verizon DBIR, CrowdStrike Global Threat Report, ISC2 Cybersecurity Workforce Study, FBI IC3 Annual Report, and 50+ other authoritative publishers. All source citations are provided inline. If you spot an outdated statistic or want to suggest a source, contact us.

About the Author

Nathan House

Nathan House, StationX

Nathan House is a cybersecurity expert with 30 years of hands-on experience. He holds OSCP, CISSP, and CEH certifications, has secured £71 billion in UK mobile banking transactions, and has worked with clients including Microsoft, Cisco, BP, Vodafone, and VISA. Named Cyber Security Educator of the Year 2020 and a UK Top 25 Security Influencer 2025, Nathan is a featured expert on CNN, Fox News, and NBC. He founded StationX, which has trained over 500,000 students in cybersecurity.