Download PDF version Contact company

While cyber attackers chase down system vulnerabilities and valuable data each passing day, the business world has taken the measures against them. The latest trends and cyber security statistics reveal that data from various sources, especially mobile and IoT devices, is targeted and attacked. Organisations face the risk of data loss due to unprotected data and weak cyber security practices.

In the first half of last year, $ 4.1 billion of data records were exposed, while the average time needed to detect a leak was 206 days. While the average loss caused by a data leak is estimated at $ 3.92 million for businesses, cyber attacks will create $ 6 trillion in losses globally in the next year.

Fraudulent engineering techniques

Accordingly, 90% of successful cyber attacks occur through email-based attacks

Keepnet Labs, a UK-based cyber security awareness and anti phishing company has revealed the most vulnerable departments and sectors against phishing attacks. The Keepnet Labs 2020 Phishing Trends Report was generated by a data set of 410 thousand phishing emails, covering a period of one year. Accordingly, 90% of successful cyber attacks occur through email-based attacks.

These cyber attacks use deceptive, deceptive and fraudulent social engineering techniques, especially to bypass various security mechanisms / controls. 1 out of 8 people share the information requested by attackers.

Silent installation of malware

According to the report, which identifies the sectors and departments that are most vulnerable to phishing attacks:

  • 1 out of 2 employees opens and reads phishing emails.
  • 1 out of 3 employees clicks links or opens file attachments in phishing emails (which may cause silent installation of malware / ransomware).
  • 1 out of every 8 employees shares the information requested in phishing emails.

Moreover, the sectors and departments most vulnerable to cyber attacks are identified in the report.

Most vulnerable sectors

Top 5 sectors with the highest click rates on malicious links in phishing emails:

  • Consulting (63%)
  • Clothing and Accessories (48%)
  • Education (47%)
  • Technology (40%)
  • Holdings / Conglomerates (32.37%)

Sectors with the highest rates of data sharing:

  • Clothing and Accessories (43%)
  • Consulting (30%)
  • Securities and Stock Exchange (23%)
  • Education (22%)
  • Corporate departments most affected by cyber attacks

The top three departments with the highest rates of clicking fake links in phishing emails:

  • Law / Audit / Internal Control (59%)
  • Procurement / Administrative Affairs (58%)
  • Quality Management / Health (56%)

Threat to organisations

Employees with privileged access to prized information are the key people in those organisations

While the findings reveal that these departments have not changed according to last year's statistics, the report concludes that most of the sensitive information needed by cyber criminals is accessible via users working in these vulnerable units. This in turn poses a serious threat to their respective organisations, because employees with such privileged access to this prized information are the key people in those organisations who motivate the hackers to infiltrate organisations and execute their intended, malicious campaigns.

The top three departments with the highest rates of sharing data:

  • Quality Management / Health (27%)
  • Procurement / Administrative Affairs (26%)
  • Legal / Audit / Internal Control (25%)

Share sensitive information

These statistics reveal that certain departments are more inclined to share sensitive information compared to others, and considering their position, they should be much more careful against cyber attacks. The Keepnet Labs 2020 Phishing Trends Report guides organisations in their cyber security and awareness efforts by identifying the most vulnerable departments and sectors.

Download PDF version Download PDF version

In case you missed it

What is the expanding role of audio in today's physical security systems?
What is the expanding role of audio in today's physical security systems?

Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in...

Marin Hospital enhances security with eCLIQ access control
Marin Hospital enhances security with eCLIQ access control

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

Climax releases an advanced smart telecare solution with voice control
Climax releases an advanced smart telecare solution with voice control

GX-MAX-DT35B Smart Care Medical Alarm comes with a brand-new case design. The battery level and the cellular signal strength will be indicated through the white bar on the top cove...

Quick poll
Which feature is most important in a video surveillance system?