The Likelihood of a Cyber Attack Compared

The chances of experiencing a cyber attack are higher than you'd think. Take a look as we compare the odds.
Rob Sobers
1 min read
Last updated February 22, 2022

While the cost of a cyber attack is often discussed, we seldom hear about just how common these attacks actually are. Numerous security experts believe that a cyber attack or breach of catastrophic proportions is no longer a matter of if, but a matter of when.

According to the World Economic Forum’s 2018 Global Risks Report, the top three risks to global stability over the next five years are natural disasters, extreme weather and cyber attacks. When it comes to preparing for the physical risks, we are quick to board up our windows and evacuate to safer locations.

Why is it that we don’t take the same precautions when it comes to protecting ourselves from cyber attacks — despite the fact that it’s one of the top three safety risks we face?

One likely reason that people don’t take the precaution of protecting their IT systems is that many believe an attack is one of those things that just won’t happen to them. So, we decided to take a look at the likelihood of other “won’t happen to me” events, to paint a clear picture of just how common a cyber breach really is.

the likelihood of a cyber attack infographinc

If the chances of a breach at 1 in 4 weren’t enough to make you think twice about your cyber security, here’s a few more stats to help put things in perspective:

  • There is an estimated cyber attack every 39 seconds
  • Since 2013, there have been 3.8 million records stolen every single day
  • The average cost of a data breach is estimated to exceed $150 million by 2020

While it can be easy to write off a cyber attack as one of those things that will never happen to you, they are one of the top three risks we face in modern day society. With 230,000 new malware samples appearing every day, being proactive with your cybersecurity is more critical now than ever.

Uncover where your biggest security risks lie with a data risk assessment — Varonis is here to help protect you from becoming another cyber attack statistic.

Sources:
Insider | Tech Republic | Fix | Security Intelligence | Weather | Nationsearch | CNBC | National Park Service | The Balance | Forbes

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

covid-19-threat-update-#3
COVID-19 Threat Update #3
If you’re reading this, there’s a good chance you’ve become one of the millions of employees forced to work from home during the coronavirus crises. Accessing your emails and files...
watch:-reconnect---version-8.5-and-combating-insider-risks-in-microsoft-365
Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365
Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.
covid-19-threat-update-#5
COVID-19 Threat Update #5
The race to enable remote work sent IT and security teams into high gear — and often resulted in shortcuts that exposed organizations to incredible risk in the process. Hackers...
sidestepping-sharepoint-security:-two-new-techniques-to-evade-exfiltration-detection
Sidestepping SharePoint Security: Two New Techniques to Evade Exfiltration Detection
Varonis Threat Labs discovered two techniques in SharePoint that allow users to circumvent audit logs and avoid triggering download events while exfiltrating files.