Frequency of insider-related incidents per company

There are a lot of interesting statistics in the 2022 Cost of Insider Threats Global Report by Ponemon Instutute; but let’s pay attention to the next section: frequency of insider-related incidents per company.
The image below shows the average consolidated frequency of employee/contractor negligence, criminal/malicious insider and credential theft incidents per company. According to the 2022 research, 67 percent of companies experience between 21 and more than 40 incidents per year. And the cost of a single incident can be more than $500,000.
The image source: "Cost of Insider Threats Global Report 2022"
That should make it crystal-clear that companies’ existing protection systems cannot cope: new and innovative approaches are needed. One of them is introducing preventive protection by invisible marking of documents using the LeaksID method. If everyone knows that all confidential documents in the company are marked, then the desire to compromise such a document will decrease, since the inevitability of punishment will loom large.

Try out LeaksID, our cloud solution to store documents, collaborate on them, and securely share them.

You may also find this interesting

LeaksID Awarded High Performer in G2’s Spring 2023 Report

G-71’s LeaksID is a patented ITM solution recognized by G2 as a High Performer in Cloud File Security. The G2 recognition confirms LeaksID’s credibility, reliability, and efficiency, making it an indispensable tool for businesses dealing with sensitive information.

How to Protect Healthcare Data from Breaches and Leaks

The article discusses the importance of safeguarding sensitive patient information in the healthcare industry. It highlights the potential risks, and offers practical tips and strategies for securing healthcare data.

Data and Document Leak Investigation

If you suspect that your company has suffered a data leak, it’s important to investigate the situation immediately so that you can take action and mitigate any potential damage.

How Classified Information Walks Out the Door

The article examines various scenarios that can lead to this situation, including unintentional or deliberate actions by employees, as well as cyber threats and vulnerabilities.


What is an Insider Threat?

How can companies counter insider threat? What types of insider leaks exist? How to reduce insider risk with invisible labeling?

Confidential Data Leaks: Who Steals and Why?

The motives for hacking, especially virtual hacking through penetration into the secret infrastructure of a company, are very diverse, as are the methods used for such purposes. Here are some examples of the most common reasons for theft.