The importance—and urgency—of cybersecurity measures have become increasingly visible in recent years. Yearly industry reports from the likes of Verizon, Trustwave, and PwC all express the importance of cybersecurity measures and the costly consequences of cyberattacks. No company wants to become another data breach statistic—but some decision-makers still may not understand the urgency of cybersecurity protection.
That’s why we’ve put together this list of data breach statistics. If you’re struggling to get more budget and funding for your cybersecurity initiatives, you have to be able to convey statistics appropriately. The following eye-opening stats can be used as powerful tools to help you convey the importance of security to your senior executives and board members.
Source: Global Security Performance: How Do Top Nations Stack Up? from BitSight
Source: Global Security Performance: How Do Top Nations Stack Up? from BitSight
Source: BitSight Security Ratings Correlated To Breaches
Source: Symantec 2016 Internet Security Threat Report
Source: 2016 Internet Security Threat Report from Symantec
Source: Heimdal Security
Source: Heimdal Security
Source: 2015 Advanced Persistent Threat Awareness Study, as quoted in Trustwave Security Stats
Source: 2014 State of Risk Report, as quoted in Trustwave Security Stats
Source: 2016 Identity Theft Resource Center Data Breach Category Summary
Source: California Data Breach Report 2012-2015
Source: 2016 Data Breach Investigations Report from Verizon
Source: 2016 Data Breach Investigations Report from Verizon
Source: 2016 Data Breach Investigations Report from Verizon
Source: 2016 Data Breach Investigations Report from Verizon
Source: 2016 Data Breach Investigations Report from Verizon
Source: Forrester: Planning For Failure, 2015, as quoted in Trustwave Security Stats
Source: 2015 Global Cybersecurity Status Report from ISACA
Source: 2014 US State of Cybercrime Survey from PWC
Source: 2015 Data Breach Investigations Report from Verizon
Source: BitSight Security Ratings Correlate to Breaches from BitSight Technologies
Source: 2016 Data Breach Investigations Report from Verizon
Source: Heimdal Security
Source: Global State of Information Security Survey 2015 from PwC
Source: The Business of Cybersecurity: 2015 Market Size, Cyber Crime, Employment, and Industry Statistics from Forbes
Source: The Business of Cybersecurity: 2015 Market Size, Cyber Crime, Employment, and Industry Statistics from Forbes
See Also: Security Ratings For Cyber Insurance
Source: 2015 Data Breach Investigations Report from Verizon
Acknowledging that cybersecurity is a major problem (and finding these statistics shocking) is one thing—but understanding what you can do in response is another. So if you’re wondering what you’re supposed to do with this information, you’re in the right place.
Your best bet is to make sure you understand how these metrics relate to your own security performance, and whether you are on the right side of these statistics. For instance, the 2015 Global Cybersecurity Status Report from ISACA states that only “38% of global organizations feel prepared for a sophisticated cyberattack.” Unless you want to be categorized in the 62% that don’t feel prepared for cyberattacks (or aren’t sure if they’re prepared), the best thing you can do is to start monitoring your performance (and your entire business ecosystem’s) and create a benchmark to track changes in your security posture. Creating a performance metric around cyber risk that is specific to your organization will help you protect yourself from being just another number.
Data breaches that originate through third parties are more commonplace than organizations are used to. The SolarWinds hack and Kaseya ransomware attack are two recent examples of threat actors exploiting the security practices of...
Organizations rely on third-parties to keep competitive in the marketplace. The EY global third-party risk management survey highlights that in 2019–20, over 33% of the 246 global companies surveyed were managing and monitoring third-party...
Third parties are essential to helping your business grow and stay competitive. But if you’re not careful, your trusted partnerships can introduce unwanted cyber risk and overhead into your organization.
© 2026 BitSight Technologies. All Rights Reserved. | Privacy Policy | Security | For Suppliers
Contact Us | BitSight Technologies | 111 Huntington Ave, Suite 2010, Boston, MA 02199 | +1-617-245-0469