Key findings
Based on a survey of 1,917 IT security practitioners, this report analyzes the security challenges organizations face worldwide and the financial consequences following security compromises like ransomware and phishing.
$5.34 million
average annual cost to respond to compromises.
62%
of respondents say cyberattacks are becoming more sophisticated.
$1.38 million
largest ransomware payment on average.
39%
believe their security infrastructure is adequately equipped to protect against GenAI-powered security attacks.
Understand the modern attack landscape.
Denial of service, phishing/social engineering, and credential theft ranked as the three most common attack types organizations experienced.
The most common attack types
The financial impact of attacks can be severe.
In this report, we looked at the average cost associated with the damage or theft of IT assets and infrastructure and subsequent technical support, including forensic investigations, incident response activities, help desk and customer service operations, as well as the average cost of disruption to normal operations, including revenue losses because of system downtime and other availability problems.
The table below is to store data for other columns of the "The financial impact can be severe" chart. This text and the table will only be visible in AEM edit mode.
AUTHOR: If you ened to change the text or number for the chart, do your data entry here.
Note: Each text item below got an id. The id is needed to feed data to the table. Make sure to not delete the id.
The cost of damage or theft of IT assets and infrastructure over the past 12 months
The cost of disruption to normal operations over the past 12 months
The cost of damage or theft of IT assets and infrastructure over the past 12 months
+
All countries
$2,983,090
$2,357,795
$5,340,885
US
$4,449,150
$4,514,875
$8,964,025
UK
$2,649,975
$2,101,900
$4,751,875
FR
$2,211,800
$1,820,775
$4,032,575
DE
$3,857,450
$2,360,650
$6,218,100
AU
$1,747,075
$990,775
$2,737,850
A proficient hacker can launch 9 successful attacks in a day.
Our survey respondents who identify as ethical hackers use the same tactics, techniques, and strategies cybercriminals use to locate potential weaknesses.
Where do hackers make the most money?
In the report, you’ll find out more about what these ethical hackers identified as the most vulnerable attack vectors, how long it takes to launch an attack on average, and more.
What you get in the report
![](/https://www.barracuda.com/adobe/dynamicmedia/deliver/dm-aid--865a1277-d312-4f3c-a6ac-d56916b95bed/report-image.jpg?preferwebp=true&quality=95)
See all of the revealing details in the full report including:
- How cyberattacks are becoming more sophisticated and severe
- The impact generative AI is having on cyberattacks and how it’s helping hackers
- The technical and organizational challenges organizations are facing and why most feel unprepared to defend against cyberattacks
- What high performers are doing right