While cyber attackers chase down system vulnerabilities and valuable data each passing day, the business world has taken the measures against them. The latest trends and cyber security statistics reveal that data from various sources, especially mobile and IoT devices, is targeted and attacked. Organisations face the risk of data loss due to unprotected data and weak cyber security practices.

In the first half of last year, $ 4.1 billion of data records were exposed, while the average time needed to detect a leak was 206 days. While the average loss caused by a data leak is estimated at $ 3.92 million for businesses, cyber attacks will create $ 6 trillion in losses globally in the next year.

Fraudulent engineering techniques

Accordingly, 90% of successful cyber attacks occur through email-based attacks

Keepnet Labs, a UK-based cyber security awareness and anti phishing company has revealed the most vulnerable departments and sectors against phishing attacks. The Keepnet Labs 2020 Phishing Trends Report was generated by a data set of 410 thousand phishing emails, covering a period of one year. Accordingly, 90% of successful cyber attacks occur through email-based attacks.

These cyber attacks use deceptive, deceptive and fraudulent social engineering techniques, especially to bypass various security mechanisms / controls. 1 out of 8 people share the information requested by attackers.

Silent installation of malware

According to the report, which identifies the sectors and departments that are most vulnerable to phishing attacks:

  • 1 out of 2 employees opens and reads phishing emails.
  • 1 out of 3 employees clicks links or opens file attachments in phishing emails (which may cause silent installation of malware / ransomware).
  • 1 out of every 8 employees shares the information requested in phishing emails.

Moreover, the sectors and departments most vulnerable to cyber attacks are identified in the report.

Most vulnerable sectors

Top 5 sectors with the highest click rates on malicious links in phishing emails:

  • Consulting (63%)
  • Clothing and Accessories (48%)
  • Education (47%)
  • Technology (40%)
  • Holdings / Conglomerates (32.37%)

Sectors with the highest rates of data sharing:

  • Clothing and Accessories (43%)
  • Consulting (30%)
  • Securities and Stock Exchange (23%)
  • Education (22%)
  • Corporate departments most affected by cyber attacks

The top three departments with the highest rates of clicking fake links in phishing emails:

  • Law / Audit / Internal Control (59%)
  • Procurement / Administrative Affairs (58%)
  • Quality Management / Health (56%)

Threat to organisations

Employees with privileged access to prized information are the key people in those organisations

While the findings reveal that these departments have not changed according to last year's statistics, the report concludes that most of the sensitive information needed by cyber criminals is accessible via users working in these vulnerable units. This in turn poses a serious threat to their respective organisations, because employees with such privileged access to this prized information are the key people in those organisations who motivate the hackers to infiltrate organisations and execute their intended, malicious campaigns.

The top three departments with the highest rates of sharing data:

  • Quality Management / Health (27%)
  • Procurement / Administrative Affairs (26%)
  • Legal / Audit / Internal Control (25%)

Share sensitive information

These statistics reveal that certain departments are more inclined to share sensitive information compared to others, and considering their position, they should be much more careful against cyber attacks. The Keepnet Labs 2020 Phishing Trends Report guides organisations in their cyber security and awareness efforts by identifying the most vulnerable departments and sectors.

Stay ahead of the trends on securing physical access control systems through layered cybersecurity practices.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...