dcsimg
Main » Quick Reference »

Top Facts to Know About Computer Crime

WEBINAR:
On-Demand

You Can't Detect What You Can't See: Illuminating the Entire Kill Chain


The following facts and statistics capture the changing landscape of cyber security and how professionals are keeping up with these new challenges.

Computer crime (also called cybercrime), is used to generally describe any criminal act dealing with computers and networks. Usually we would use the phrase to describe malicious hacking, identity theft, e-commerce fraud or phishing – but may also be used to describe illegal acts committed with the use of a computer or device and internet connection, such as stalking or cyber bullying.

Cyber definition

10 Facts to Know About Cyber Crime in 2018

The following facts and statistics capture the changing landscape of cyber security and how business owners and security professionals are keeping up with these top security challenges.

icon-list

 According to the results of a survey conducted by the Ponemon Institute & Keeper Security, 50 percent of small and medium-sized companies (SMBs) with less than 1,000 employees were breached in 2016. The breached companies spent an average of $879,582 due to damage or theft of IT assets, and disruption to normal operations cost an average of $955,429. – eSecurityPlanet

icon-list

 The U.S. Department of Justice (DOJ) describes ransomware as a new business model for cybercrime, and a global phenomenon. Every 40 seconds a business is victim to a ransomware attack. Cybersecurity Ventures predicts that will rise to every 14 seconds by 2019. The FBI estimates that the total amount of ransom payments approaches $1 billion annually. - 2017 Cybercrime Report

icon-list

 Americans worry more about becoming the victims of cybercrime than the victims of conventional crimes. According to a Gallup poll, 67 percent of Americans worry about hackers stealing their personal information while 66 percent worry about identity theft. - Gallup

icon-list

 One of the most prevalent forms of cyberextortion is Ransomware. According to Panda Security, the majority of attacks that use this type of extortion have different origins: 39 percent come from insecure or fraudulent websites, 23 percent from programs downloaded from the Internet, and 19 percent come from infected emails or attached documents. - Panda Security Practical Guide

icon-list

 According to Gartner, by 2018, 90 percent of organizations will implement at least one form of integrated DLP, up from 50 percent today. Organizations have been deploying DLP to address regulatory compliance, intellectual property (IP) protection and data visibility and monitoring. Newer solutions that include user entity and behavior analytics, image analysis, machine learning, and data-matching techniques are being used to augment existing solutions. - Gartner

icon-list

 Malwarebytes released a report on the new age of organized cybercrime. According to the cybercrime guide, ransomware detections increased more than three-fold from 90,351 in January to 333,871 in October. In addition, there was an almost 2,000 percent increase in ransomware detections since 2015. - Malwarebytes

icon-list

 One in four Americans report that they or a member of their household has had personal information stolen by hackers in the last 12 months. Sixteen percent of U.S. adults report that they or a member of their household has been a victim of identity theft during that same time period.  - Gallup

icon-list

 Cybersecurity Ventures predicted that cybercrime will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015. This represents the greatest transfer of economic wealth in history, risks the incentives for innovation and investment, and will be more profitable than the global trade of all major illegal drugs combined.  - 2017 Cybercrime Report

icon-list

 Cybersecurity Ventures and privileged account management solution provider Thycotic predicts that the number of passwords used among humans and machines worldwide will grow to 300 billion by 2020 – all of which will require cyber protection. About two-thirds of the estimated 300 billion passwords will be used by machines. - SC Media

icon-list

  The latest forecast from Gartner Inc. says worldwide information security spending will grow 7 percent to reach $86.4 billion (USD) in 2017 and will climb to $93 billion in 2018. That forecast doesn’t cover various cybersecurity categories including IoT (Internet of Things), ICS (Industrial Control Systems) and IIoT (Industrial Internet of Things) security, automotive cybersecurity, and others. - 2017 Cybercrime Report










LATEST ARTICLES
Facts about IT & Coding Boot Camps

The following coding and IT boot camp facts and statistics provide an introduction to the changing trends in education and training programs. Read More »

Top Cloud Computing Facts

The following facts and statistics capture the changing landscape of cloud computing and how service providers and customers are keeping up with... Read More »

Texting & Chat Abbreviations

From A3 to ZZZ this guide lists 1,500 text message and online chat abbreviations to help you translate and understand today's texting lingo. Read More »

STUDY GUIDES
Java Basics, Part 1

Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »

Java Basics, Part 2

This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »

Network Fundamentals Study Guide

Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »