Cyberattacks and their Vulnerabilities in Business

Cyberattacks and their Vulnerabilities in Business

Cyberattacks and their vulnerabilities for various businesses is a widely discussed topic in 2022

A successful cyberattack can cause significant damage to your business. It can affect your bottom line, your business' standing, and consumer trust. Cyberattacks always happen when you least expect them. And when they happen, they happen quickly. Responding appropriately is not just the responsibility of your cybersecurity team; everyone in the organization has a role to play. Cyberattacks hit businesses every day. Cybercrime has increased yearly as people try to benefit from vulnerable business systems. Often, attackers are looking for ransom: 53% of cyberattacks resulted in damages of US$500,000 or more. Cyber threats can also be launched with ulterior motives. Some attackers look to obliterate systems and data as a form of "hacktivism."

Amongst the 268 respondents, the majority of people, i.e., 61.8% responded that their company has never been under cyberattack. On the other hand, 38.2% of respondents have faced cyberattacks.

Out of 268 respondents, 24% of people faced cyberattacks through spam mail. 20% of people responded to ransomware attacks, while 12% responded to Fileless malware. 8% of respondents reacted to Spyware as the primary tool for cyberattacks while 4% reacted to Rootkits through which they faced cyberattacks. 2% (each) responded to Adwares, Trojans, Mobile malware, and Bots. The rest of the 24% responded to none of the above.

Close to 19.60% people responded to computers as the gadget that majorly gets infected by cyberattacks. Around 15.70% of respondents reacted to Laptops as the prime gadget to get infected. 11.80% reacted to mobile and while 7.80% reacted to tab as the primary gadgets being affected by cyberattacks. The remaining 19.60% reacted to none of the above.

Out of 268 respondents, 26.10% believe that inefficient antivirus software is vulnerable to cyberattacks. 21.70% reacted to "downloading corrupted files" as the reason for cyberattacks. For 15.20% of respondents, weak passwords are more vulnerable to cyberattacks, while for the other 15.20% downloading fake apps is more vulnerable to cyberattacks. 13% of people responded to adware infection while the rest 6.50% and 2.20% reacted to "downloading compromised software" and "peer-to-peer sharing and torrents" respectively.

Related Stories

No stories found.
logo
Analytics Insight
www.analyticsinsight.net