{"id":7906,"date":"2023-09-29T15:48:48","date_gmt":"2023-09-29T15:48:48","guid":{"rendered":"https:\/\/www.cyberdegrees.org\/?p=7906"},"modified":"2023-10-02T18:25:47","modified_gmt":"2023-10-02T18:25:47","slug":"cybersecurity-facts-statistics","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-facts-statistics\/","title":{"rendered":"Cybersecurity Statistics, Facts, and Trends"},"content":{"rendered":"<p>Talk about cyberattacks is trending, but how worrisome is it, really? According to the latest crime report released by the FBI, cybercrime has been steadily increasing, with a sharp uptick in the past three years.<sup><a href=\"#fn-1\" id=\"fn-ref-1\" aria-describedby=\"footnotes\" role=\"doc-noteref\">[1]<\/a><\/sup> It may come as a surprise that some of the <a href=\"https:\/\/cyberdegrees.org\/resources\/most-common-cyber-attacks\">most common cyberattacks<\/a> are also the most preventable.<\/p>\r\n\r\n<p>While there is no surefire technique to prevent becoming a victim of one of these crimes, there are some <a href=\"https:\/\/www.cyberdegrees.org\/resources\/internet-safety-tips-wfh\/\">tips and strategies<\/a> that you can practice to protect yourself and others. But first, it\u2019s worth knowing more about what\u2019s out there.<\/p>\r\n\r\n<p>Below is a list of the most common types of cyber attacks in 2022 and the approximate number of people they impacted:<sup><span class=\"sr-only\">Note Reference <\/span>[1]<\/sup><\/p>\r\n\r\n<ol>\r\n<li><strong>Phishing:<\/strong> 300,000<\/li>\r\n<li><strong>Personal Data Breach:<\/strong> 59,000<\/li>\r\n<li><strong>Non-Payment\/Non-Delivery:<\/strong> 52,000<\/li>\r\n<li><strong>Extortion:<\/strong> 39,000<\/li>\r\n<li><strong>Tech Support Scams:<\/strong> 33,000<\/li>\r\n<\/ol>\r\n\r\n<p>Knowing the data about cyberattacks and other cyber scams can help spread awareness about the most common types of cybercrime.<\/p>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"cyberattack-statistics\" id=\"cyberattack-statistics\"><\/a>\n\n\r\n<h2>Cyberattack Statistics<\/h2>\r\n\r\n<p>A cyberattack is an intentional attempt to gain unauthorized access to a computer system to steal, disable, expose, alter, or destroy data. Cyberattacks can impact companies and individuals, and target any system, network, or device connected to the internet, including servers, computers, and mobile devices.<\/p>\r\n\r\n<ul>\r\n<li>According to a 2023 World Economic Forum report, widespread cybercrime and cyber insecurity rank among the top 10 risks to be concerned about in the next decade.<sup><a href=\"#fn-2\" id=\"fn-ref-2\" aria-describedby=\"footnotes\" role=\"doc-noteref\">[2]<\/a><\/sup><\/li>\r\n<li>In 2021, the FBI estimated $6.9 billion in potential losses due to cybercrime.<sup><span class=\"sr-only\">Note Reference <\/span>[1]<\/sup><\/li>\r\n<li>In 2022, the FBI received over 800,000 internet crime complaints, totaling over $10.2 billion in potential losses.<sup><span class=\"sr-only\">Note Reference <\/span>[1]<\/sup><\/li>\r\n<li>A 2022 Statista report estimated that cybercrime losses globally will grow from $8.44 trillion in 2022 to $23.84 trillion by 2027.<sup><a href=\"#fn-3\" id=\"fn-ref-3\" aria-describedby=\"footnotes\" role=\"doc-noteref\">[3]<\/a><\/sup><\/li>\r\n<\/ul>\r\n\r\n<p>Phishing is the most common type of cybercrime. However, losses from investment fraud and business email compromise (BEC) far surpass losses from other cybercrime types, although fewer people are impacted.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n\r\n<div id=\"everviz-bwryMfefS\" class=\"everviz-bwryMfefS\"><script src=\"https:\/\/app.everviz.com\/inject\/bwryMfefS\/?v=11\" defer=\"defer\"><\/script><\/div>\r\n\r\n<div id=\"everviz-IuTzyIBjq\" class=\"everviz-IuTzyIBjq\"><script src=\"https:\/\/app.everviz.com\/inject\/IuTzyIBjq\/?v=5\" defer=\"defer\"><\/script><\/div>\r\n\r\n\n<\/div>\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings limit=\"3\"><h2>Popular Online Programs<\/h2><p>Learn about start dates, transferring credits, availability of financial aid, and more by contacting the universities below.<\/p><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h3>Cyberattacks by Industry<\/h3>\r\n\r\n<p>In the chart below, find the targets of cybercrime broken down by industry, according to IBM.<\/p>\r\n\r\n<div id=\"everviz-fsf7s5gNO\" class=\"everviz-fsf7s5gNO\"><script src=\"https:\/\/app.everviz.com\/inject\/fsf7s5gNO\/?v=5\" defer=\"defer\"><\/script><\/div>\r\n\r\n<p>Over the past five years, industry targets for cyberattacks have shifted. Manufacturing has risen to the top, now representing the most targeted industry, taking the longstanding place of finance. By contrast, cybercrime targeting retail has become significantly less frequent.<\/p>\r\n\r\n<div id=\"everviz-wrajCfN0n\" class=\"everviz-wrajCfN0n\"><script src=\"https:\/\/app.everviz.com\/inject\/wrajCfN0n\/?v=5\" defer=\"defer\"><\/script><\/div>\r\n\r\n<p>During the first quarter of 2023, more than 6 million data records were subject to a data breach. Globally, this cost companies upward of $4.45 million each on average.<sup><a href=\"#fn-5\" id=\"fn-ref-5\" aria-describedby=\"footnotes\" role=\"doc-noteref\">[5]<\/a><\/sup><\/p>\r\n\r\n<p>The lifecycles of these attacks vary, but in 2022 on average, it took companies 243 days to identify a credentials-related breach and an additional 84 days to contain it.<sup><span class=\"sr-only\">Note Reference <\/span>[5]<\/sup> This means that, in total, it took almost an entire year (327 days) to fully recover from a breach. This trend has not improved much in recent years.<\/p>\r\n\r\n<div id=\"everviz-pu5u7Hrrf\" class=\"everviz-pu5u7Hrrf\"><script src=\"https:\/\/app.everviz.com\/inject\/pu5u7Hrrf\/?v=3\" defer=\"defer\"><\/script><\/div>\r\n\r\n<p>Because data breaches are so expensive and time consuming, many industries are beginning to look for preventative solutions by <a href=\"https:\/\/www.cyberdegrees.org\/resources\/best-industries-cybersecurity\/\">investing in cybersecurity<\/a>.<\/p>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"phishing-statistics\" id=\"phishing-statistics\"><\/a>\n\n\r\n<h2>Phishing Statistics<\/h2>\r\n\r\n<p>Disguised as trustworthy attachments, links, or services, phishing tricks people into revealing sensitive information or downloading malicious software. Phishing targets both lone individuals and businesses.<\/p>\r\n\r\n<p>A successful phishing attack can often lead to data breaches, identity fraud, credit card fraud, ransomware attacks, BEC, and extortion.<\/p>\r\n\r\n<ul>\r\n<li>According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), more than 90% of all cyberattacks begin with a phishing email.<sup><a href=\"#fn-6\" id=\"fn-ref-6\" aria-describedby=\"footnotes\" role=\"doc-noteref\">[6]<\/a><\/sup><\/li>\r\n<li>This helps explain the fact that phishing schemes are the number one cybercrime today.<sup><span class=\"sr-only\">Note Reference <\/span>[1]<\/sup><\/li>\r\n<li>Despite cybersecurity measures that block many of these attacks, over 300,000 internet users fell victim to a phishing scheme last year.<sup><span class=\"sr-only\">Note Reference <\/span>[1]<\/sup><\/li>\r\n<\/ul>\r\n\r\n<p>Phishing attacks have been on the rise over the past five years.<\/p>\r\n\r\n<div id=\"everviz-gzuuMX4xY\" class=\"everviz-gzuuMX4xY\"><script src=\"https:\/\/app.everviz.com\/inject\/gzuuMX4xY\/?v=5\" defer=\"defer\"><\/script><\/div>\r\n\r\n<p>Phishing attacks cost the U.S. roughly $52 million in 2022.<sup><span class=\"sr-only\">Note Reference <\/span>[1]<\/sup> While the dollar loss from phishing is less than from other cybercrimes, it is still significant.<\/p>\r\n\r\n<p>A 2021 Ponemon Institute study states that phishing schemes can cost large organizations nearly $15 million annually. Loss of employee productivity is one of the major costs associated with phishing.<sup><a href=\"#fn-7\" id=\"fn-ref-7\" aria-describedby=\"footnotes\" role=\"doc-noteref\">[7]<\/a><\/sup><\/p>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"cyber-scams\" id=\"cyber-scams\"><\/a>\n\n\r\n<h2>Cyber Scams Targeting Individuals<\/h2>\r\n\r\n<p>Cyber scams targeting individuals \u2014 as opposed to those targeting corporations \u2014 present a threat in today\u2019s wired world. Ranging from investment scams and tech support fraud, to personal data breaches and romance scams, data on different crime types highlights just how vulnerable individuals are to cybercrime.<\/p>\r\n\r\n<p>According to the most recent FBI Internet Crime Report, monetary loss is proportional to age, with older groups suffering bigger losses:<sup><span class=\"sr-only\">Note Reference <\/span>[1]<\/sup><\/p>\r\n\r\n<ul>\r\n<li>Individuals ages 60 and over were subject to the biggest losses of all age groups totaling $3.1 billion.<\/li>\r\n<li>People 20 and under lost the least, at $210.5 million.<\/li>\r\n<li>These trends, however, did not follow suit for complaints. People 30-39 filed the most complaints out of any age group.<\/li>\r\n<\/ul>\r\n\r\n<table class=\"sonic-table\">\r\n<caption>Cyber Scams Targeting Individuals (2022)<\/caption>\r\n<thead>\r\n<tr>\r\n<th scope=\"col\">Age Group<\/th>\r\n<th scope=\"col\">Monetary Losses<\/th>\r\n<th scope=\"col\">Number of Complaints<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<th scope=\"row\">Under 20<\/td>\r\n<td>$201.5 million<\/td>\r\n<td>16,000<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">20-29<\/td>\r\n<td>$383.1 million<\/td>\r\n<td>58,000<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">30-39<\/td>\r\n<td>$1.3 billion<\/td>\r\n<td>95,000<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">40-49<\/td>\r\n<td>$1.6 billion<\/td>\r\n<td>88,000<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">50-59<\/td>\r\n<td>$1.8 billion<\/td>\r\n<td>65,000<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">60+<\/td>\r\n<td>$3.1 billion<\/td>\r\n<td>88,000<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n\r\n<figcaption class=\"text-sm -mt-6 mb-8\" style=\"text-align: left;\">Source: FBI IC3<sup><span class=\"sr-only\">Note Reference <\/span>[1]<\/sup><\/figcaption>\r\n\r\n<h3>Romance Scams<\/h3>\r\n\r\n<p>In a romance scam, perpetrators trick individuals into believing they are in a relationship and sending money to their romantic partner. These scammers might convince victims to make wire transfers or send gift cards or other forms of payment.<\/p>\r\n\r\n<p>In 2022, online romance scams cost the U.S. $1.3 billion, according to the Federal Trade Commission.<sup><a href=\"#fn-8\" id=\"fn-ref-8\" aria-describedby=\"footnotes\" role=\"doc-noteref\">[8]<\/a><\/sup> With a victim count nearing 70,000 and a median reported loss of $4,400, romance scams pose a significant threat.<\/p>\r\n\r\n<p>Payments using cryptocurrency and bank wires collected the highest dollar amounts, together accounting for more than 60% of total losses. However, gift cards remain the most frequently used payment method.<sup><span class=\"sr-only\">Note Reference <\/span>[8]<\/sup><\/p>\r\n\r\n<div class=\"rounded-lg py-2 px-6 my-6\" style=\"background-color: #F1F6FD;\">\r\n<h4 class=\"text-center text-2xl md:text-3xl\">By the Numbers: Romance Scams, 2022<\/h4>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-3 gap-5 my-8\"> \n  \r\n<p class=\"text-center\"><span class=\"text-lg\"><strong>Number of Victims<\/strong><\/span><br>\r\n<span class=\"font-heading font-semibold text-secondary-600 text-4xl md:text-5xl\">~70,000<\/span><\/p>\r\n\r\n<p class=\"text-center\"><span class=\"text-lg\"><strong>Median Losses<\/strong><\/span><br>\r\n<span class=\"font-heading font-semibold text-secondary-600 text-4xl md:text-5xl\">$4,400<\/span><\/p>\r\n\r\n<p class=\"text-center\"><span class=\"text-lg\"><strong>Total Loss<\/strong><\/span><br>\r\n<span class=\"font-heading font-semibold text-secondary-600 text-4xl md:text-5xl\">$1.3 billion<\/span><\/p>\r\n\n<\/div>\n\r\n\r\n<figcaption class=\"text-sm text-center -mt-16 mb-8\">Source: Federal Trade Commission<sup><span class=\"sr-only\">Note Reference <\/span>[8]<\/sup><\/figcaption>\r\n<\/div>\r\n\r\n<p>While dating apps provide an easy platform for scammers to target people looking for love, they are surprisingly not the most common medium used. Instead, 40% of romance scams involving a loss of money last year started with an unexpected private message on Facebook or Instagram.<sup><span class=\"sr-only\">Note Reference <\/span>[8]<\/sup><\/p>\r\n\r\n<h3>Cryptocurrency Scams<\/h3>\r\n\r\n<p>According to Cybercrime Magazine, cryptocurrency scams are also on the rise.<\/p>\r\n\r\n<ul>\r\n<li>Among investment scams, cryptocurrency fraud rose from $907 million in 2021 to $2.57 billion in 2022, an increase of 183%.<sup><span class=\"sr-only\">Note Reference <\/span>[1]<\/sup><\/li>\r\n<li>Leading cybersecurity data suggests that cryptocrime will cost the world $30 billion annually by 2025.<sup><a href=\"#fn-9\" id=\"fn-ref-9\" aria-describedby=\"footnotes\" role=\"doc-noteref\">[9]<\/a><\/sup><\/li>\r\n<li>These trends are expected to continue to rise 15% annually, making cryptoscams among the costliest types of crime in the near future.<sup><span class=\"sr-only\">Note Reference <\/span>[9]<\/sup><\/li>\r\n<\/ul>\r\n\r\n<p>The FBI received the most cryptocurrency fraud complaints from individuals aged 30-49.<sup><span class=\"sr-only\">Note Reference <\/span>[1]<\/sup> Some examples of crypto-investment scams reported in 2022 are linked to:<\/p>\r\n\r\n<ul>\r\n<li>Liquidity mining<\/li>\r\n<li>Hacked social media<\/li>\r\n<li>Celebrity impersonation<\/li>\r\n<li>Fake real estate professionals<\/li>\r\n<li>Fake employment offers<\/li>\r\n<\/ul>\r\n\r\n<h3>Tech Support Fraud<\/h3>\r\n\r\n<p>Tech support fraud remains among the top five cybercrime types over the last five years, more than doubling its victim count from 14,000 to 33,000 from 2018-2022.<sup><span class=\"sr-only\">Note Reference <\/span>[1]<\/sup> Despite the relatively low attack rate when compared to phishing, for example, dollar loss in tech support fraud has increased exponentially.<\/p>\r\n\r\n<div id=\"everviz-KRnaUAIe8\" class=\"everviz-KRnaUAIe8\"><script src=\"https:\/\/app.everviz.com\/inject\/KRnaUAIe8\/?v=5\" defer=\"defer\"><\/script><\/div>\r\n\r\n<p>While people in any age group can be potential targets, tech support scams tend to target people ages 60 and older.<sup><a href=\"#fn-10\" id=\"fn-ref-10\" aria-describedby=\"footnotes\" role=\"doc-noteref\">[10]<\/a><\/sup><\/p>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"cybersecurity-statistics\" id=\"cybersecurity-statistics\"><\/a>\n\n\r\n<h2>Cybersecurity Statistics<\/h2>\r\n\r\n<p>In their most recent report on the attitudes and behaviors toward cybersecurity, the National Cybersecurity Alliance demonstrates that certain needs are unmet. For people to change their online behaviors and act in ways that promote online safety, they need more accessible cybersecurity measures and more awareness of what is at stake.<\/p>\r\n\r\n<p>For one, there is the issue of access to training. Many retirees (84%) and those not actively employed (86%) report having no access to training.<sup><a href=\"#fn-11\" id=\"fn-ref-11\" aria-describedby=\"footnotes\" role=\"doc-noteref\">[11]<\/a><\/sup> This is important when considering how training affects people\u2019s online behavior. More than half of participants (58%) who received training reported they were better at recognizing phishing messages.<sup><span class=\"sr-only\">Note Reference <\/span>[11]<\/sup><\/p>\r\n\r\n<table class=\"sonic-table\">\r\n<caption>Reported Influence of Cybersecurity Training on Behaviors<\/caption>\r\n<thead>\r\n<tr>\r\n<th scope=\"col\">Influence of Training on Behavior<\/th>\r\n<th scope=\"col\">Participants Who Responded Yes<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<th scope=\"row\">I am better at recognizing phishing messages<\/th>\r\n<td>58%<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">I started using strong and unique passwords<\/th>\r\n<td>45%<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">I started using multi-factor authentication<\/th>\r\n<td>40%<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">I started regularly installing updates<\/th>\r\n<td>40%<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">I started saving passwords using a password manager<\/th>\r\n<td>35%<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">I back up my data<\/th>\r\n<td>34%<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">I started saving passwords to a web browser<\/th>\r\n<td>31%<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">I did not change any of my online security behaviors<\/th>\r\n<td>8%<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n\r\n<figcaption class=\"text-sm -mt-6 mb-8\" style=\"text-align: left;\">Source: National Cybersecurity Alliance<sup><span class=\"sr-only\">Note Reference <\/span>[11]<\/sup><\/figcaption>\r\n\r\n<p>Creating strong and unique passwords, rotating them out regularly, and using multi-factor authentication (MFA) are proven methods to increase online security. However, rather than using a password manager (7%) or storing passwords in a browser (6%), many opt for less secure methods to remember passwords, such as storing them in a notebook (37%) or in a note on a phone (13%). On top of that, 43% of participants had never heard of MFA.<sup><span class=\"sr-only\">Note Reference <\/span>[11]<\/sup><\/p>\r\n\r\n<div id=\"everviz-aPWLhznrs\" class=\"everviz-aPWLhznrs\"><script src=\"https:\/\/app.everviz.com\/inject\/aPWLhznrs\/?v=5\" defer=\"defer\"><\/script><\/div>\r\n\r\n<p>The greatest barrier to improving online security behavior is a lack of motivation to do so, with 40% reporting low versus only 25% reporting high motivation to change.<sup><span class=\"sr-only\">Note Reference <\/span>[11]<\/sup><\/p>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"demand-for-cybersecurity-pros\" id=\"demand-for-cybersecurity-pros\"><\/a>\n\n\r\n<h2>Growing Demand for Cybersecurity Professionals<\/h2>\r\n\r\n<p>The good news is that by tracking the uptick in cybercrime, companies are becoming incentivized to acknowledge the increasing importance of awareness about cybersecurity. The increasing investment in information security and risk management products and services translates to a bright outlook for <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/\">jobs in the cybersecurity industry<\/a>.<\/p>\r\n\r\n<p>The Bureau of Labor Statistics (BLS) projects employment for <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-specialist\/\">security analysts<\/a> will grow 32% from 2022-2032. These professionals earned a median yearly wage of $112,000 in May 2022. A bachelor\u2019s degree in computer science could be enough to help you land one of the projected 16,800 yearly job openings in information security.<sup><a href=\"#fn-12\" id=\"fn-ref-12\" aria-describedby=\"footnotes\" role=\"doc-noteref\">[12]<\/a><\/sup><\/p>\r\n\r\n<p>In response to current and projected demands for cybersecurity professionals, the White House released its highly anticipated <a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2023\/07\/NCWES-2023.07.31.pdf\" target=\"_blank\" rel=\"noopener\">cybersecurity workforce and education strategy<\/a> this July. Looking to improve digital literacy and promote jobs in cybersecurity while also strengthening national security, this initiative promises wide-scale financial incentives and investments across the federal government and nonprofit sector.<\/p>\r\n\r\n<br>\r\n\r\n<hr>\r\n\r\n<aside>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"references\" id=\"references\"><\/a>\n\n\r\n<h2>References<\/h2>\r\n\r\n<ol>\r\n<li id=\"fn-1\"><a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2022_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">FBI Internet Crime Report 2022 (PDF)<\/a>. Internet Crime Complaint Center. March 2023. (<a href=\"#fn-ref-1\" aria-label=\"Back to footnote 1 in content\">back to content  &#10550;<\/a>)<\/li>\r\n<li id=\"fn-2\"><a href=\"https:\/\/www.weforum.org\/reports\/global-risks-report-2023\/digest\/\" target=\"_blank\" rel=\"noopener\">Global Risks Report 2023<\/a>. World Economic Forum. January 2023. (<a href=\"#fn-ref-2\" aria-label=\"Back to footnote 2 in content\">back to content  &#10550;<\/a>)<\/li>\r\n<li id=\"fn-3\"><a href=\"https:\/\/www.statista.com\/chart\/28878\/expected-cost-of-cybercrime-until-2027\/\" target=\"_blank\" rel=\"noopener\">Cybercrime Expected to Skyrocket in Coming Years<\/a>. Statista. December 2022. (<a href=\"#fn-ref-3\" aria-label=\"Back to footnote 3 in content\">back to content  &#10550;<\/a>)<\/li>\r\n<li id=\"fn-4\"><a href=\"https:\/\/www.ibm.com\/downloads\/cas\/DB4GL8YM\" target=\"_blank\" rel=\"noopener\">X-Force Threat Intelligence Index 2023<\/a>. IBM Security. February 2023. (<a href=\"#fn-ref-4\" aria-label=\"Back to footnote 4 in content\">back to content  &#10550;<\/a>)<\/li>\r\n<li id=\"fn-5\"><a href=\"https:\/\/www.ibm.com\/reports\/data-breach?utm_content=SRCWW&amp;p1=Search&amp;p4=43700077724063988&amp;p5=e&amp;gclid=Cj0KCQjwmICoBhDxARIsABXkXlJRzyfkDyw3_enyFJlyrMxVv6o8Rh_TpgTpLh1qVzLeBwhlUsPlLXgaArfXEALw_wcB&amp;gclsrc=aw.ds\" target=\"_blank\" rel=\"noopener\">Cost of a Data Breach Report<\/a>. IBM Security. Accessed September 2023. (<a href=\"#fn-ref-5\" aria-label=\"Back to footnote 5 in content\">back to content  &#10550;<\/a>)<\/li>\r\n<li id=\"fn-6\"><a href=\"https:\/\/www.cisa.gov\/stopransomware\/general-information\" target=\"_blank\" rel=\"noopener\">Stop Ransomware: General Information<\/a>. U.S. Cybersecurity and Infrastructure Security Agency. Accessed September 2023. (<a href=\"#fn-ref-6\" aria-label=\"Back to footnote 6 in content\">back to content  &#10550;<\/a>)<\/li>\r\n<li id=\"fn-7\"><a href=\"https:\/\/www.proofpoint.com\/sites\/default\/files\/analyst-reports\/pfpt-us-ar-ponemon-2021-cost-of-phishing-study.pdf\" target=\"_blank\" rel=\"noopener\">The 2021 Cost of Phishing Study (PDF)<\/a>. Ponemon Institute. June 2021. (<a href=\"#fn-ref-7\" aria-label=\"Back to footnote 7 in content\">back to content  &#10550;<\/a>)<\/li>\r\n<li id=\"fn-8\">Fletcher, E. <a href=\"https:\/\/www.ftc.gov\/news-events\/data-visualizations\/data-spotlight\/2023\/02\/romance-scammers-favorite-lies-exposed\" target=\"_blank\" rel=\"noopener\">Consumer Protection Data Spotlight: Romance Scammers' Favorite Lies Exposed<\/a>. U.S. Federal Trade Commission. February 2023. (<a href=\"#fn-ref-8\" aria-label=\"Back to footnote 8 in content\">back to content  &#10550;<\/a>)<\/li>\r\n<li id=\"fn-9\">Morgan, S. <a href=\"https:\/\/cybersecurityventures.com\/cybersecurity-almanac-2023\/\" target=\"_blank\" rel=\"noopener\">2023 Cybersecurity Almanac: 100 Facts, Figures, Predictions, and Statistics<\/a>. Cybercrime Magazine. May 2023. (<a href=\"#fn-ref-9\" aria-label=\"Back to footnote 9 in content\">back to content  &#10550;<\/a>)<\/li>\r\n<li id=\"fn-10\">Kiger, P. <a href=\"https:\/\/www.aarp.org\/money\/scams-fraud\/info-2023\/fake-online-tech-support.html\" target=\"_blank\" rel=\"noopener\">Tech Support Scams Are Rampant in 2023<\/a>. AARP. June 2023. (<a href=\"#fn-ref-10\" aria-label=\"Back to footnote 10 in content\">back to content  &#10550;<\/a>)<\/li>\r\n<li id=\"fn-11\"><a href=\"https:\/\/20740408.fs1.hubspotusercontent-na1.net\/hubfs\/20740408\/CYBSAFE-Oh%20behave%20report%202022-220927%20MS%20-%20V1.pdf\" target=\"_blank\" rel=\"noopener\">The Annual Cybersecurity Attitudes and Behaviors Report 2022 (PDF)<\/a>. National Cybersecurity Alliance. September 2022. (<a href=\"#fn-ref-11\" aria-label=\"Back to footnote 11 in content\">back to content  &#10550;<\/a>)<\/li>\r\n<li id=\"fn-12\"><a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\">Information Security Analysts. Bureau of Labor Statistics Occupational Outlook Handbook<\/a>. September 2023. (<a href=\"#fn-ref-12\" aria-label=\"Back to footnote 12 in content\">back to content  &#10550;<\/a>)<\/li>\r\n<\/ol>\r\n\r\n<\/aside>","protected":false},"excerpt":{"rendered":"Discover the latest cybercrime statistics and the newest incentives for promoting cybersecurity awareness, including exciting career opportunities.","protected":false},"author":7,"featured_media":7947,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[3],"states":[],"resources-overview":[33],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-7906","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guide","resources-overview-all"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/7906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=7906"}],"version-history":[{"count":3,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/7906\/revisions"}],"predecessor-version":[{"id":7957,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/7906\/revisions\/7957"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/7947"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=7906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=7906"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=7906"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=7906"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=7906"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=7906"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=7906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}