-
The UK was targeted 605 times since 2014, which equates to 6.09% of all attacks.
-
The UK was also a hub for threat actors to operate from - 51 threat actors operated from the country since 2014. This equates to 2.7% of all attacks.
The countries targeted the most by cyber attacks over the past eight year
Rank |
Target Countries |
Number of Attacks |
Percentage of Overall Attacks |
YoY Increase/ Decrease in # of Cyber Attacks - 2021 to 2022 (%) |
1 |
United States of America |
4,870 |
49.01% |
-11% |
2 |
United Kingdom |
605 |
6.09% |
-32% |
3 |
Canada |
273 |
2.75% |
0% |
4 |
India |
266 |
2.68% |
-49% |
5 |
Italy |
212 |
2.13% |
122% |
6 |
Russian Federation |
209 |
2.10% |
950% |
7 |
France |
200 |
2.01% |
-71% |
8 |
Australia |
190 |
1.91% |
-57% |
9 |
Germany |
181 |
1.82% |
86% |
10 |
Ukraine |
153 |
1.54% |
400% |
Green = highest increase YOY
Red = biggest decrease YOY
François Amigorena, CEO at IS Decisions comments on the research: “Our research has shown that the prevalence of specific motives and the type of attack methods can change year on year. Most notably over the past year, we can see the largest increases in the number of attacks on Russia and Ukraine, which are up by 950% and 400% respectively. The analysis also highlights spikes in attacks with a financial motive during years of economic uncertainty, such as the Covid-19 pandemic.
“Financial gain is a major motive for criminals and data breaches can be devastating for organizations, especially for SMBs who may have smaller financial safety nets. Another consideration is that for many organizations cyber attacks can create a loss of trust in their customer or client base which can lead to further financial losses.
“There are a number of factors that come into play behind the attacks in this report, but awareness of the trends, methods and targets, should help to inform decisions on which preventative measures can be implemented to reduce risk.
“IT leaders can protect their organizations by protecting the logon. Implementing access management and two-factor authentication solutions, such as UserLock, require users to enter two factors of identification to verify they are who they say they are before they can access valuable data.”