One $Million Stolen Every Minute

Every 60 seconds, 1,861 people are impacted by cyber crimes such as malware and phishing attacks, research carried out by ISP sales agency CenturyLinkQuote  reveals just how many people are falling victim, US state by US state.  
 
Every minute, attackers collectively deploy 1,274 unique pieces of malware, 22.9 phishing emails, more than nine malicious advertisements, and 0.21 new phishing domains.  
 
US Alaska is the Cyber-Crime State
Now for a second consecutive year, Alaska in 2018 ranked as the US state where you're most likely to get scammed, with almost 22 cyber-crime victims for every 1,000 residents, according to new data from CenturyLinkQuote. The authorised CenturyLink reseller examined the FBI's 2018 IC3 (Internet Crime Complaint Center) Report to identify the most at-risk states for internet scams. In 2018 alone, IC3 received 351,936 complaints with losses exceeding $2.7 billion. 
 
South Dakota had the fewest cyber-crime victims per capita, with just 5.3 per 10,000 residents, or 465 total. In terms of financial impact, cyber-crime victims in Alaska lost the least amount of money, $2,256.30, on average. On the other end of the spectrum, victims in North Carolina lost the most, $18,241.52 on average.
 
Fast Phishing Facts
  • For the second year in a row, Alaska had the most victims per 10,000 residents at 21.67. Also for the second straight year, South Dakota had the least amounts of victims per 10,000 residents at 5.35, which is an increase over last year. It’s neighbor to the north was close behind with 6.08 victims per 10,000 residents.
  • Nearly 41,000 victims were scammed on social media, losing over $101 million. Another $182 million was lost through virtual currency, affecting over 36,000 people. So keep your friends close, and your virtual currency closer.
  • People aged 60 and over are the most targeted age group for scammers. They lost nearly $650 million in Internet scams, including confidence/relationship fraud. These scammers convince people to send money to someone who sounds trustworthy (an extended family member, a trusted brand name, or a possible romantic partner).
  • BECs and EACs account for over $1 billion in losses. Confidence/relationship fraud accounts for over $360 million in losses, and investment scams rounded out the top three with over $252 million in losses.
 
PCMag             CenturyLink:              UK PCMag
 
You Might Also Read: 
 
We Can Reduce Cybercrime, But Why Are We Failing?:
 
« Five Features Of The Changing Threat Landscape
Seven Cybersecurity Issues That Easily Go Unnoticed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Logsign

Logsign

Logsign is a Security Orchestration, Automation and Response (SOAR) platform with next-gen Security Information and Event Management (SIEM) solution.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Miradore

Miradore

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

Apura Cybersecurity Intelligence

Apura Cybersecurity Intelligence

Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense.

Cyclops

Cyclops

Cyclops is the first Contextual Search Platform for cybersecurity.

ACDS (Advanced Cyber Defence Systems)

ACDS (Advanced Cyber Defence Systems)

ACDS was founded in the belief that cyber security can be done better. We’re combining emerging technologies and proven methods to bring a new approach to tackling the growing threat landscape.