This statistic illustrates a distribution of the root causes of data breaches in the United Kingdom (UK) in 2015. In 2015, malicious or criminal attacks are the root cause of data breach 49 percent of the time.
Distribution of the root causes of data breach in the United Kingdom (UK) in 2015
Basic Account
Get to know the platform
You only have access to basic statistics.
This statistic is not included in your account.
Starter Account
The ideal entry-level account for individual users
- Instant access to 1m statistics
- Download in XLS, PDF & PNG format
- Detailed references
$59 USD $39 USD / Month *
in the first 12 months
Professional Account
Full access
Business Solutions including all features.
* Prices do not include sales tax.
Statistics on Cyber security and cyber crime in Australia
Global overview
6
- Premium Statistic Cybersecurity market revenues worldwide 2021-2027
- Premium Statistic Global cybersecurity technology growth rate forecast 2021, by technology
- Premium Statistic Critical cybersecurity areas worldwide 2022-2023
- Basic Statistic Share of cyber attacks in global industries worldwide 2022
- Basic Statistic Cyber security investment priorities for companies worldwide 2022
- Premium Statistic IT spending forecast on cyber security worldwide 2022
Cyber security in Australia
6
- Premium Statistic Market size of cybersecurity industry Australia 2019-2022
- Premium Statistic Share of planned cybersecurity spending by organizations Australia 2021 by initiative
- Premium Statistic Share of organizations with data trust practices in Australia 2021 by practice
- Premium Statistic Breakdown of government cyber security strategy funding in Australia 2020
- Premium Statistic Leading network protection challenges foreseen by organizations in Australia 2022
- Premium Statistic Organizational understanding of risks arising from third parties Australia 2021
Cyber crime in Australia
6
- Premium Statistic Number of cybercrimes reported to the ACSC in Australia FY 2020-2022
- Premium Statistic Share of cybercrime incidents reported to ACSC in Australia FY 2022, by type
- Premium Statistic Share of cyber security incidents reported to ACSC in Australia FY 2022, by sector
- Premium Statistic Share of cybercrime incidents reported to ACSC in Australia FY 2022, by state
- Premium Statistic Average loss of cyber incidents reported to ACSC in Australia FY 2022, by org size
- Premium Statistic Cyber attack types organizations were most likely to fall victim to Australia 2022
Ransomware and malware
4
- Premium Statistic Reported ransomware and malware attacks in Australia 2022, by month
- Premium Statistic Number of reported ransomware and malware attacks in Australia 2022, by age
- Premium Statistic Number of ransomware and malware attacks in Australia 2022, by location
- Premium Statistic Delivery of ransomware attacks in Australia 2022, by number and amount lost
Scams
6
- Premium Statistic Number of scam reports in Australia 2021, by category
- Premium Statistic Reported loss from scams in Australia 2021 by leading category
- Premium Statistic Reported loss from scams in Australia 2021, by payment method
- Premium Statistic Online shopping scam loss in Australia 2015-2022
- Premium Statistic Number of scam attempts to gain personal info in Australia 2022, by age
- Premium Statistic Delivery of attempts to gain personal info Australia 2022, by number and amount lost
Consumer sentiment
5
- Premium Statistic Online privacy awareness and concern in Australia 2018-2021
- Premium Statistic Share of adults who believe companies use their online personal data Australia 2021
- Premium Statistic Share of adults who always refuse app permissions Australia 2021 by age group
- Premium Statistic Industries considered to be the least cyber secure by Australian adults 2022
- Premium Statistic Share of adults who stop spending at a brand following a data breach Australia 2022
Spotlight: cyber security and the global remote workforce
5
- Premium Statistic Global challenges in keeping the remote workforce secure 2021
- Premium Statistic Products end services used to ensure online security on devices 2021, by license
- Premium Statistic Technologies used to enable secure work from home worldwide 2022
- Premium Statistic CISOs that say more cyberattacks have occurred with remote working 2022, by country
- Premium Statistic Corporate data accessed when working remotely worldwide 2021
Further related statistics
17
- Per capita cost for root causes of data breach in the UK in 2015
- Notification costs of data breaches in the UK 2010-2015
- Lost business costs of data breach in the UK 2010-2015
- Per capita cost of data breach in the UK 2015, by industry
- Detection and escalation costs of a data breach in the UK 2010-2015
- Share of UK companies that use data encryption to prevent data loss 2010-2015
- Per capita cost of data breach in the United Kingdom (UK) 2010-2015
- Organisational cost of data breach in the UK 2010-2015
- Ex-poste response costs of data breach in the UK from 2010-2015
- Share of UK companies that use identity and data access management 2010-2015
- Share of UK companies that use endpoint security solutions 2010-2015
- Costs arising from data loss in the UK in 2015, by category
- Records compromised during data breaches in Q2 2017
- Number of offences reported for stolen IT resources in India 2021, by leading state
- Fears related to web security and cybersecurity in Italy 2018
- Privacy at risk on social media in Italy 2018
- Awareness of fake security software among smartphone users Japan 2022
Further Content: You might find this interesting as well
Statistics
- Per capita cost for root causes of data breach in the UK in 2015
- Notification costs of data breaches in the UK 2010-2015
- Lost business costs of data breach in the UK 2010-2015
- Per capita cost of data breach in the UK 2015, by industry
- Detection and escalation costs of a data breach in the UK 2010-2015
- Share of UK companies that use data encryption to prevent data loss 2010-2015
- Per capita cost of data breach in the United Kingdom (UK) 2010-2015
- Organisational cost of data breach in the UK 2010-2015
- Ex-poste response costs of data breach in the UK from 2010-2015
- Share of UK companies that use identity and data access management 2010-2015
- Share of UK companies that use endpoint security solutions 2010-2015
- Costs arising from data loss in the UK in 2015, by category
- Records compromised during data breaches in Q2 2017
- Number of offences reported for stolen IT resources in India 2021, by leading state
- Fears related to web security and cybersecurity in Italy 2018
- Privacy at risk on social media in Italy 2018
- Awareness of fake security software among smartphone users Japan 2022
IBM. (May 4, 2015). Distribution of the root causes of data breach in the United Kingdom (UK) in 2015 [Graph]. In Statista. Retrieved March 31, 2023, from https://www.statista.com/statistics/483047/root-cause-of-data-breach-uk/
IBM. "Distribution of the root causes of data breach in the United Kingdom (UK) in 2015." Chart. May 4, 2015. Statista. Accessed March 31, 2023. https://www.statista.com/statistics/483047/root-cause-of-data-breach-uk/
IBM. (2015). Distribution of the root causes of data breach in the United Kingdom (UK) in 2015. Statista. Statista Inc.. Accessed: March 31, 2023. https://www.statista.com/statistics/483047/root-cause-of-data-breach-uk/
IBM. "Distribution of The Root Causes of Data Breach in The United Kingdom (Uk) in 2015." Statista, Statista Inc., 4 May 2015, https://www.statista.com/statistics/483047/root-cause-of-data-breach-uk/
IBM, Distribution of the root causes of data breach in the United Kingdom (UK) in 2015 Statista, https://www.statista.com/statistics/483047/root-cause-of-data-breach-uk/ (last visited March 31, 2023)
Distribution of the root causes of data breach in the United Kingdom (UK) in 2015 [Graph], IBM, May 4, 2015. [Online]. Available: https://www.statista.com/statistics/483047/root-cause-of-data-breach-uk/