Most of the time we do our research and posts accordingly, however, cyber-observers in their “29 Must-Know Cybersecurity Statistics for 2020” post did such a good job that the best thing we can do for our readers is to refer to the same for information regarding 2020 Cybersecurity trends.

For example, the top five cybersecurity trends identified were:

  1. Worldwide spending on cybersecurity is going to reach $133.7 billion in 2022. (Gartner)
  2. 68% of business leaders feel their cybersecurity risks are increasing.
  3. Data breaches exposed 4.1 billion records in the first half of 2019. (RiskBased)
  4. 71% of breaches were financially motivated and 25% were motivated by espionage. (Verizon)
  5. 52% of breaches featured hacking, 28% involved malware and 32–33% included phishing or social engineering, respectively. (Verizon)


Another key piece of information presented included the most common causes of a data breach:

  • Weak and Stolen Credentials, a.k.a. Passwords
  • Back Doors, Application Vulnerabilities
  • Malware
  • Social Engineering
  • Too Many Permissions
  • Insider Threats
  • Improper Configuration and User Error


As it relates to the depth and seriousness of the cybercrime threat, cyber observer quoted:

  • Security breaches have increased by 11% since 2018 and 67% since 2014. (Ponemon Institute)
  • Hackers attack every 39 seconds, on average 2,244 times a day. (University of Maryland)
  • The average time to identify a breach in 2019 was 7 months. (IBM)
  • The average lifecycle of a breach lasted almost 11 months (from the breach to containment). (IBM)
  • The average cost of a data breach is $3.92 million as of 2019. (Security Intelligence)
  • In 2016, Uber reported that hackers stole the information of over 57 million riders and drivers and forced to pay them $100,000. (Bloomberg)


As we look at the information presented above there are a number of preventive measures we recommend:

  • Update systems (implement patches and updates on a timely basis)
  • Train Users on Security
  • Monitor activity and perform on-going risk assessments
  • Stay up to date with current threats and potential solutions.