Predicted 2019 Security Spend
Billion records stolen in 2018 - this number has increased since last year.
The median number of days that attackers reside within a victim’s network before detection.
The average cost per record stolen.
New malware samples are created and spread every day.
of individuals have accidentally sent sensitive information to the wrong person
of corporate breaches involve weak or stolen passwords
of confirmed data breaches involved a weak, default, or stolen password
of senior managers admit to regularly uploading work files to a personal email or cloud account
Hover over each stat to learn more.
Develop and implement the appropriate safeguards to ensure delivery of services.
Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.
Develop and implement the appropriate activities to take action regarding a detected cybersecurity event.
Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.
Watch to find out what you can do.
to learn more!
Develop organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.