2020 is a year of opportunity and challenge. COVID-19 has forced companies to start remote working based ON cloud platforms, and the introduction of 5G has also brought closer connections between devices that are connected to everything. In addition, the implementation of technologies such as artificial intelligence, Internet of Things, blockchain, cloud computing, etc. In the continuous acceleration of the development and integration of the industry. Cyber security has always been the strategy of a strong country. No matter in the past or in the future, cyber security plays a pivotal role.
According to relevant surveys, the predictions of the cybersecurity industry in 2021 are as follows:
Remote workers will remain a target of cybercriminals;
Extending from telecommuting to hazards – cloud security risks will increase;
Gaps in cybersecurity skills will remain an issue;
As 5G increases the bandwidth of connected devices, IoT devices will be more vulnerable to cyberattacks.
In addition, 11 cybersecurity industry statistics are included
95% of cybersecurity breaches are caused by human error. (Cybint)
The global information security market is expected to reach $170.4 billion by 2022. (Gartner)
88% of organizations worldwide experienced a spear phishing attempt in 2019. (Proofpoint)
68% of business leaders believe their cybersecurity risks are increasing. (Accenture)
On average, only 5% of company folders are properly protected. (Varonis)
In the first half of 2020, data breaches exposed 36 billion records. (RiskBased)
86% of breaches were financially motivated, while 10% were espionage. (Verizon)
45% of breaches involved hacking, 17% involved malware and 22% involved phishing. (Verizon)
Between January 1, 2005 and May 31, 2020, 11,762 breaches were recorded. (ID Theft Resource Center)
The top malicious email attachment types are . doc and . dot, with 37%, followed by. exe, accounting for 19.5%. (Symantec)
An estimated 300 billion passwords are used by humans and machines worldwide. (Cyber Security Media)
Multiple large-scale data breach statistics
Data leakage exposes sensitive user information, which exposes users to the risk of identity theft, causing varying degrees of loss to users and companies, and to the risk of data non-compliance penalties.
As of 2020, the average cost of a data breach was $3.86 million. (IBM)
In 2020, the average time to discover a data breach was 207 days. (IBM)
The average time period for a data breach from discovery to action is 280 days. (IBM)
In 2020, personal information was involved in 58% of data breaches. (Verizon)
Security breaches have increased 11% since 2018 and 67% since 2014. (Accenture)
64% of Americans have never checked if they were affected by a data breach. (Varonis)
56% of Americans don’t know what to do in the event of a data breach. (Varonis)
In 2020, a Twitter data breach affected 130 accounts, including those of the former president and Elon Musk, where attackers defrauded $121,000 in bitcoin through nearly 300 transactions. (CNBC)
In 2020, Marriott disclosed a data breach affecting more than 5.2 million hotel guests. (Marriott)
The 2019 MGM data breach resulted in the exposure of information records of 142 million hotel guests online. (CPO Magazine)
In the Marriott-Starwood data breach, the information of 500 million consumers was made public in 2018, and the data theft dates back to 2014. (CSO Online)
Under Armour reported in 2018 that its “My Fitness Pal” was hacked, affecting 150 million users. (Under Armour)
In 2017, 147.9 million consumers were affected by the Equifax data breach. (Equifax)
The company’s losses from the Equifax data breach totaled more than $4 billion. (Time Magazine)
In 2017, 412 million user accounts were compromised on the Friendfinder website. (Wall Street Journal)
In 2017, 100,000 organizations and more than 400,000 devices in at least 150 countries were infected with the Wannacry virus, at a total cost of about $4 billion. (Technical consultant)
In 2016, Uber reported that hackers had stolen the information of more than 57 million riders and drivers. (Uber)
Uber is trying to pay a ransom to delete the stolen data of 57 million users in an attempt to keep the incident private. (Bloomberg)
In one of the largest data breaches ever, 3 billion Yahoo accounts were hacked in 2013. (New York Times)
To sum up the data, network security issues have always been the top priority, such as loopholes, hacker attacks, information leakage, etc., resulting in countless losses, and network security risks are increasing. “Network security is for the people, network security depends on the people”, Ai Encrypt adheres to the strategic concept of network power, is committed to the construction of a mobile application security ecosystem, and is dedicated, dedicated and responsible to the cause of network security. Today, Ai Encryption has seven major product systems, extending from mobile security to IoT and industrial Internet security, extending from detection and reinforcement to seven major product systems, extending from the full life cycle to the Internet of Everything and continuous dual ecological security protection system, product system More abundant, more complete security services, and stronger competitiveness.
As a comprehensive service provider of mobile information security, iEncrypt has solid technical advantages, business qualification advantages, product solution advantages, market brand advantages and customer resource advantages. Therefore, since its establishment, Ai Crypto has strictly improved its technology and services, and continuously expanded its product ecosystem. In the future, Ai Encryption will continue to forge ahead, pioneer and innovate, and contribute to the cause of network security.