{"id":1418,"date":"2023-04-24T02:34:27","date_gmt":"2023-04-24T06:34:27","guid":{"rendered":"https:\/\/verito.com\/blog\/?p=1418"},"modified":"2026-04-10T14:30:40","modified_gmt":"2026-04-10T18:30:40","slug":"cybersecurity-statistics-2023","status":"publish","type":"post","link":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/","title":{"rendered":"Cybersecurity Statistics 2023: Facts and Figures"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Irrespective of the type of business, most organizations now handle a big chunk of sensitive customer data. This is what makes them vulnerable to cyber-attacks and similar other threats. The lack of awareness about data protection and pandemic side effects have led to the sudden rise in data breaches and hacking attempts, making businesses lose millions of dollars. On one side, the average loss resulting from a cybersecurity breach is increasing. On the other side, organizations are investing more in data protection measures to be on the safer side.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To better understand the current cyber threats, we have compiled a list of cybersecurity statistics for 2023.\u00a0\u00a0<\/span><\/p>\n<h2 id=\"more-about-cybercrime-and-cybersecurity-statistics\"><b>More about Cybercrime and Cybersecurity Statistics<\/b><\/h2>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The collective data at the global level is expected to reach 175 zettabytes, where one zettabyte has one, followed by 21 zeroes or simply 1021 (<\/span><a href=\"https:\/\/www.networkworld.com\/article\/3325397\/idc-expect-175-zettabytes-of-data-worldwide-by-2026.html\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Source<\/span><\/a><span style=\"font-weight: 400;\">). It includes almost every type of data, from video streaming apps to healthcare\/BFSI databases.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">One of the main goals of cybercrimes is to acquire sensitive information that can be sold on the dark web. The vulnerabilities in protecting such data are increasing over time, reaching more than 65,000 in 2022 &#8211; a 21% rise compared to the previous year (<\/span><a href=\"https:\/\/www.hackerone.com\/6th-annual-hacker-powered-security-report\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Report<\/span><\/a><span style=\"font-weight: 400;\">).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The cost of cybercrimes is predicted to reach $8 trillion this year and then continue to rise toward $10.5 trillion by the end of 2026 (<\/span><a href=\"https:\/\/www.esentire.com\/resources\/library\/2022-official-cybercrime-report\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Source<\/span><\/a><span style=\"font-weight: 400;\">).\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Most businesses do their part in sensitive data files, including customer information, from being stolen. Still, identity fraud &#8211; using an individual\u2019s personal information to commit a crime without authorization- leads to losses worth $52 billion, affecting more than 42 million adults in the U.S. (<\/span><a href=\"https:\/\/www.globenewswire.com\/news-release\/2022\/03\/29\/2412099\/0\/en\/Identity-Fraud-Losses-Total-52-Billion-in-2021-Impacting-42-Million-U-S-Adults.html\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Source<\/span><\/a><span style=\"font-weight: 400;\">).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Another reliable <\/span><a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">report<\/span><\/a><span style=\"font-weight: 400;\"> found that breaches involving stolen or lost credentials are harder to identify and deal with. They also cost $1,50,000 more than the usual data breaches.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ol>\n<p><strong>Read More: <a href=\"https:\/\/verito.com\/blog\/cloud-computing-statistics\/\" target=\"_blank\" rel=\"dofollow\" >Cloud Computing Statistics for 2023 and Beyond<\/a><\/strong><\/p>\n<h2 id=\"statistics-around-the-causes-of-cybersecurity-threats\"><b>Statistics Around the Causes of Cybersecurity Threats<\/b><\/h2>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The human threat vector has been one of the root causes of more than 80% of data breaches. It is the underlying human element that plays a critical role in stealing credentials and the occurrence of phishing attacks, confirms an <\/span><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">investigation report<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Out of all cyber attacks, phishing attacks grew by more than 60% in the last year (2022). Besides this, 3 million phishing attacks were observed in 2022\u2019s third quarter, making it the worst period ever (<\/span><a href=\"https:\/\/www.slashnext.com\/the-state-of-phishing-2022\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Source<\/span><\/a><span style=\"font-weight: 400;\">).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ransomware attacks, which involve asking for a ransom to return sensitive information captured by a breach, have constantly threatened various business sectors. The percentage of users affected by ransomware doubled during Jan-Oct 2022 (<\/span><a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2022_targeted-ransomware-doubled-in-2022-new-techniques-and-groups-emerge\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Kaspersky Lab<\/span><\/a><span style=\"font-weight: 400;\">).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The occurrence of advance fee scams, one of the most prevalent types of email attacks, rose by more than 1000% in Jul-Sep 2022. These scams involve promising a windfall to the user\/target if they can pay a certain fee upfront.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The attack bandwidth of DDoS (Distributed Denial of Service) attacks had grown to 957 Gbps in the first six months of 2022 &#8211; a 57% growth compared to the previous six months. This took the global count of these attacks to 6 million (<\/span><a href=\"https:\/\/www.netscout.com\/threatreport\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Source<\/span><\/a><span style=\"font-weight: 400;\">).<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ol>\n<h2 id=\"cybersecurity-statistics-around-the-cost-involved\"><b>Cybersecurity Statistics Around the Cost Involved<\/b><\/h2>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A business may suffer from the impact of a cybercrime years after its initial occurrence. The total cost of such an attack includes criminal investigations, lawsuits, bad press, and more. An <\/span><a href=\"https:\/\/www.accenture.com\/content\/dam\/accenture\/final\/a-com-migration\/custom\/us-en\/invest-cyber-resilience\/pdf\/Accenture-State-Of-Cybersecurity-2021.pdf#zoom=40\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Accenture report<\/span><\/a><span style=\"font-weight: 400;\"> clarified that the price of a data breach may rise to $5 trillion or more in 2024. This makes investments in organizational security strategy an essential part of the overall security program.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">One attack &#8211; malware, data breach, or DDoS, costed U.S. companies an average of around $18,000 in 2022 &#8211; an 80% rise from $10,000 in 2021 (<\/span><a href=\"https:\/\/www.hiscox.com\/cybersecurity\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Source<\/span><\/a><span style=\"font-weight: 400;\">).\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">One of the costliest data breaches occurred in the healthcare industry at an average of $10.1 million.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Global investments in cybersecurity training are expected to reach $10 billion by 2027. This involves investing in both insider and outsider cybersecurity measures. With the rise in Internet penetration, insider and external threats are equally significant.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Another side of the cybersecurity statistics sheds some light on security employment. A <\/span><a href=\"https:\/\/www.isc2.org\/-\/media\/ISC2\/Research\/2022-WorkForce-Study\/ISC2-Cybersecurity-Workforce-Study.ashx\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">study<\/span><\/a><span style=\"font-weight: 400;\"> has shown that there was a workforce gap of more than 4,00,000 jobs in the field of security in the U.S. by the end of 2022. The number stood at 3.4 million on the global level.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ol>\n<p><b>Invest in Managed Security Services to Prevent Cyber Attacks<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The continued rise in cybercriminal activities has pushed organizations to invest strategically in data security and vulnerability management. For better protection against unexpected threats, switch to Verito\u2019s <\/span><a href=\"https:\/\/verito.com\/managed-security-services\" target=\"_blank\" rel=\"dofollow noopener\"><span style=\"font-weight: 400;\">managed security services<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"Irrespective of the type of business, most organizations now handle a big chunk of sensitive customer data. This&hellip;\n","protected":false},"author":12,"featured_media":1419,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-1418","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-knowledge-base"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Statistics 2023: Facts and Figures<\/title>\n<meta name=\"description\" content=\"To better understand the current cyber threats, we have compiled a list of cybersecurity statistics for 2023.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Statistics 2023: Facts and Figures\" \/>\n<meta property=\"og:description\" content=\"Irrespective of the type of business, most organizations now handle a big chunk of sensitive customer data. This is what makes them vulnerable to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Verito Technologies | Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-24T06:34:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T18:30:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2023\/04\/Cybersecurity-statistics-2023.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Camren Majors\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camren Majors\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Statistics 2023: Facts and Figures","description":"To better understand the current cyber threats, we have compiled a list of cybersecurity statistics for 2023.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Statistics 2023: Facts and Figures","og_description":"Irrespective of the type of business, most organizations now handle a big chunk of sensitive customer data. This is what makes them vulnerable to","og_url":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/","og_site_name":"Verito Technologies | Blog","article_published_time":"2023-04-24T06:34:27+00:00","article_modified_time":"2026-04-10T18:30:40+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2023\/04\/Cybersecurity-statistics-2023.png","type":"image\/png"}],"author":"Camren Majors","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Camren Majors","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/#article","isPartOf":{"@id":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/"},"author":{"name":"Camren Majors","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/865ad0905f2ef35c7587605a88ab6c1e"},"headline":"Cybersecurity Statistics 2023: Facts and Figures","datePublished":"2023-04-24T06:34:27+00:00","dateModified":"2026-04-10T18:30:40+00:00","mainEntityOfPage":{"@id":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/"},"wordCount":725,"publisher":{"@id":"https:\/\/verito.com\/blog\/#organization"},"image":{"@id":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2023\/04\/Cybersecurity-statistics-2023.png","articleSection":["Knowledge Base"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/","url":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/","name":"Cybersecurity Statistics 2023: Facts and Figures","isPartOf":{"@id":"https:\/\/verito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/#primaryimage"},"image":{"@id":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2023\/04\/Cybersecurity-statistics-2023.png","datePublished":"2023-04-24T06:34:27+00:00","dateModified":"2026-04-10T18:30:40+00:00","description":"To better understand the current cyber threats, we have compiled a list of cybersecurity statistics for 2023.","breadcrumb":{"@id":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/#primaryimage","url":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2023\/04\/Cybersecurity-statistics-2023.png","contentUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2023\/04\/Cybersecurity-statistics-2023.png","width":1000,"height":500,"caption":"Cybersecurity statistics 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/verito.com\/blog\/cybersecurity-statistics-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/verito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Knowledge Base","item":"https:\/\/verito.com\/blog\/category\/knowledge-base\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Statistics 2023: Facts and Figures"}]},{"@type":"WebSite","@id":"https:\/\/verito.com\/blog\/#website","url":"https:\/\/verito.com\/blog\/","name":"Verito Technologies | Blog","description":"Verito Technologies Blog","publisher":{"@id":"https:\/\/verito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/verito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/verito.com\/blog\/#organization","name":"Verito Technologies","url":"https:\/\/verito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2020\/01\/logo_blue.png","contentUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2020\/01\/logo_blue.png","width":625,"height":208,"caption":"Verito Technologies"},"image":{"@id":"https:\/\/verito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/865ad0905f2ef35c7587605a88ab6c1e","name":"Camren Majors","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/77bfceda618286bd3464259eedc244dda94e71f2d7782a878cb75fd25c966426?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/77bfceda618286bd3464259eedc244dda94e71f2d7782a878cb75fd25c966426?s=96&d=mm&r=g","caption":"Camren Majors"},"description":"Camren Majors is co-founder and Chief Revenue Officer of Verito Technologies, a cloud hosting and managed IT company built exclusively for tax and accounting firms. He is the co-author of Beyond Best Practices: Modernizing the Successful Accounting Firm (2026). His work has been featured in NATP TAXPRO Magazine and he has presented for NATP, NAEA, and NSA."}]}},"_links":{"self":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/1418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/comments?post=1418"}],"version-history":[{"count":3,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/1418\/revisions"}],"predecessor-version":[{"id":2408,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/1418\/revisions\/2408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/media\/1419"}],"wp:attachment":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/media?parent=1418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/categories?post=1418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/tags?post=1418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}