{"id":9380,"date":"2022-08-25T06:20:00","date_gmt":"2022-08-25T12:20:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/10-hard-hitting-cyber-security-statistics\/"},"modified":"2026-03-31T03:58:12","modified_gmt":"2026-03-31T09:58:12","slug":"10-statistiques-percutantes-sur-la-cybersecurite","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/blog\/10-hard-hitting-cyber-security-statistics\/","title":{"rendered":"Dix statistiques percutantes sur la cybers\u00e9curit\u00e9 pour 2022"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/CYBERSTAT_MAST.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Abstract human silhouettes representing data-driven decision making and advanced analytics\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/CYBERSTAT_MAST.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/CYBERSTAT_MAST-300x182.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/CYBERSTAT_MAST-1024x621.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/CYBERSTAT_MAST-768x466.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2022-08-25T06:20:00-06:00\">Ao\u00fbt 25, 2022<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Ten Hard-hitting Cybersecurity Statistics for 2022<\/h1>\n\n\n<div class=\"bs-div bs-div-44a15e4b99450b7aaf810333a0fbaa4ff5112133 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/fr\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">2 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/fr\/blog\/10-hard-hitting-cyber-security-statistics\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/fr\/blog\/10-hard-hitting-cyber-security-statistics\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Ten%20Hard-hitting%20Cybersecurity%20Statistics%20for%202022').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2F10-hard-hitting-cyber-security-statistics%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Ten%20Hard-hitting%20Cybersecurity%20Statistics%20for%202022&url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2F10-hard-hitting-cyber-security-statistics%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2F10-hard-hitting-cyber-security-statistics%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2F10-hard-hitting-cyber-security-statistics%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<h2>\u00a0<\/h2>\n<p dir=\"ltr\">If one thing became clear in 2022, it was that no organization, regardless of its size or vertical, is safe from a data breach. A breach can happen to any organization, enterprise, or government at any time.<\/p>\n<p dir=\"ltr\">At the beginning of 2022, the Lapsus$ Group went on a hacking spree, successfully stealing source code from Microsoft Bing and Cortana. The Costa Rican government declared a national emergency in response to ransomware attacks targeting the healthcare and social security systems. Nation-state threats and DDoS attacks continue to skyrocket throughout the Russo-Ukrainian War.<\/p>\n<p dir=\"ltr\">Data below shows that the global skills shortage and rapidly growing threat landscape are putting pressure on security teams.\u00a0\u00a0Here are some of the most pressing cybersecurity statistics to take into consideration as you plan for 2023:<\/p>\n<h2>The Security Talent Shortage<\/h2>\n<p dir=\"ltr\">1. As of April 2022, <strong>there are over<\/strong> <strong>700,000 cybersecurity job openings in the United States.<\/strong> Cybersecurity analysts are currently the most in-demand job within the industry.<\/p>\n<p dir=\"ltr\"><em>\u2013 Cybersecurity Supply\/Demand Heat Map | <a href=\"https:\/\/www.cyberseek.org\/heatmap.html\" target=\"_blank\" rel=\"noopener\">Cyber Seek<\/a><\/em><\/p>\n<p dir=\"ltr\">2. It\u2019s estimated that <strong>there will be<\/strong> <strong>3.5 million unfilled cybersecurity positions globally by 2025.<\/strong> That\u2019s approximately the same as in 2021.<\/p>\n<p dir=\"ltr\"><em>\u2013 Cybersecurity Jobs Report: 3.5 Million Openings In 2025 | <a href=\"https:\/\/cybersecurityventures.com\/jobs\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Ventures<\/a><\/em><\/p>\n<h2>Ransomware Attacks Continue<\/h2>\n<p dir=\"ltr\">3. In 2020 alone, <strong>healthcare organizations lost almost $21 billion to ransomware attacks.<\/strong><\/p>\n<p dir=\"ltr\"><em>\u2013 Ransomware Attacks on US Healthcare Organizations | <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/ransomware-attacks-hospitals-data\/\" target=\"_blank\" rel=\"noopener\">Comparitech<\/a><\/em><\/p>\n<p dir=\"ltr\">4. <strong>Nearly a quarter of ransomware attacks target the manufacturing industry. <\/strong>17% of attacks target professional services. 13% of ransomware attacks specifically target government organizations.<\/p>\n<p dir=\"ltr\"><em>\u2013 Ransomware 2020: Attack Trends Affecting Organizations Worldwide | <a href=\"https:\/\/securityintelligence.com\/posts\/ransomware-2020-attack-trends-new-techniques-affecting-organizations-worldwide\/\" target=\"_blank\" rel=\"noopener\">Security Intelligence<\/a><\/em><\/p>\n<p dir=\"ltr\">5. It&#8217;s reported that\u00a0<strong>75% of companies were hurt\u00a0by a ransomware attack<\/strong>, up from 61% in one year. 64% of affected companies paid the ransom, but nearly 40% weren\u2019t able to recover their data.<\/p>\n<p dir=\"ltr\"><em>\u2013 The State of Email Security 2022 | <a href=\"https:\/\/www.mimecast.com\/state-of-email-security\/?utm_medium=social&amp;utm_source=linkedin&amp;utm_campaign=soes_2022&amp;utm_content=un\" target=\"_blank\" rel=\"noopener\">Mimecast<\/a><\/em><\/p>\n<h2>Supply\u00a0Chain, DDoS and Nation-State Attacks<\/h2>\n<p dir=\"ltr\">6. In 2021, <strong>supply chain attacks increased by more than <\/strong><strong>100% year-over-year.<\/strong><\/p>\n<p dir=\"ltr\"><em>\u2013 The Threat Landscape in 2021 | <a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/threat-landscape-2021\" target=\"_blank\" rel=\"noopener\">Symantec<\/a><\/em><\/p>\n<p dir=\"ltr\">7.<strong> The total number of<\/strong> <strong>DDoS attacks will be 15.4 million<\/strong> by 2023.<\/p>\n<p dir=\"ltr\"><em>\u2013 Cisco Annual Internet Report | <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/executive-perspectives\/annual-internet-report\/white-paper-c11-741490.html\" target=\"_blank\" rel=\"noopener\">Cisco<\/a><\/em><\/p>\n<p dir=\"ltr\">8. Nearly<strong> 80% of nation-state attacks<\/strong><strong> specifically target government agencies<\/strong>, non-government organizations (NGOs), and think tanks.<\/p>\n<p dir=\"ltr\"><em>\u2013 Microsoft Digital Defense Report | <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/10\/25\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a><\/em><\/p>\n<h2><span id=\"data\">Data<\/span> Breaches<\/h2>\n<p dir=\"ltr\">9.<strong> The United States sees the most expensive data breaches in the world, with an average of $4.24 million per attack<\/strong>. That\u2019s a 10% jump in one year, and the biggest single-year increase in the past seven years.<\/p>\n<p dir=\"ltr\"><em>\u2013 Cost of a Data Breach Report | IBM<\/em><\/p>\n<p dir=\"ltr\">10. <strong>30% of data breaches in the United States involve internal actors<\/strong>, compared to 17% in Asia-Pacific (APAC) regions and 13% in Europe, Middle East and Africa (EMEA). However, APAC and EMEA organizations experienced a higher-than-average rate of Cyber-Espionage-related breaches.<\/p>\n<p dir=\"ltr\"><em>\u2013 2020 Data Breach Investigations Report | <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/2020-data-breach-investigations-report.pdf\" target=\"_blank\" rel=\"noopener\">Verizon<\/a><\/em><\/p>\n<p>The past two years have shown us to always expect the unexpected. But there&#8217;s one thing we can all expect from 2023: even more devastating attacks across the world. See how AI-enhanced security automation can help prevent breaches.<\/p>\n\n\n\n<div class=\"bs-div bs-div-ef9f6602177d5bf15cb5aee6fce9e6b8d964ba0c bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-ef9f6602177d5bf15cb5aee6fce9e6b8d964ba0c {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Turbine_playbook_Add-panel-filter_search-3-1.gif' class='img-fluid'   alt='Animated GIF showing Swimlane Turbine playbook interface with advanced panel filtering and automated logic search.' title='' data-gif= \"https:\/\/swimlane.com\/wp-content\/uploads\/Turbine_playbook_Add-panel-filter_search-3-1.gif\" \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-see-swimlane-turbine-in-action\">See Swimlane Turbine in Action <\/h2>\n\n\n\n<p>Schedule a Swimlane Turbine live demonstration with our experts! Learn how our AI-enabled security automation platform can help you solve the most challenging problems across your entire security organization.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-b9a65ac977059f2e5b91a2d45ad8f7b70e20d12b\"><style>.bs-pro-button-p-btn-b9a65ac977059f2e5b91a2d45ad8f7b70e20d12b .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/demo\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Request a Demo<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/fr\/tag\/research\/'><span class='tag-content'>Research<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ded54b1e949 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/cybersecurity-statistics-2017\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Ao\u00fbt 30, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cybersecurity statistics 2017: A hard look at the facts and future<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ded54b1fd02 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/10-facts-every-cyber-security-professional-should-know\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Avr 19, 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Ten facts every cybersecurity professional should know<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ded54b20d01 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/verizon-dbir-2019-highlights\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mai 10, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Data Breach Statistics from the Verizon DBIR 2019<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9381,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[86],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[],"class_list":["post-9380","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-research","resource-type-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ten Hard-hitting Cybersecurity Statistics in 2022<\/title>\n<meta name=\"description\" content=\"If one thing became clear in 2015, it was that no organization, regardless of its size or vertical, is safe from a data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/blog\/10-statistiques-percutantes-sur-la-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ten Hard-hitting Cybersecurity Statistics for 2022\" \/>\n<meta property=\"og:description\" content=\"If one thing became clear in 2015, it was that no organization, regardless of its size or vertical, is safe from a data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/blog\/10-statistiques-percutantes-sur-la-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T09:58:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/CYBERSTAT_MAST.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"679\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Dix statistiques percutantes sur la cybers\u00e9curit\u00e9 en 2022","description":"S\u2019il y a une chose qui est devenue claire en 2015, c\u2019est bien que nulle organisation, quelle que soit sa taille ou son secteur d\u2019activit\u00e9, n\u2019est \u00e0 l\u2019abri d\u2019une violation de donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/blog\/10-statistiques-percutantes-sur-la-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Ten Hard-hitting Cybersecurity Statistics for 2022","og_description":"If one thing became clear in 2015, it was that no organization, regardless of its size or vertical, is safe from a data breaches.","og_url":"https:\/\/swimlane.com\/fr\/blog\/10-statistiques-percutantes-sur-la-cybersecurite\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-31T09:58:12+00:00","og_image":[{"width":1120,"height":679,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/CYBERSTAT_MAST.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/blog\/10-hard-hitting-cyber-security-statistics\/","url":"https:\/\/swimlane.com\/fr\/blog\/10-hard-hitting-cyber-security-statistics\/","name":"Dix statistiques percutantes sur la cybers\u00e9curit\u00e9 en 2022","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/blog\/10-hard-hitting-cyber-security-statistics\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/blog\/10-hard-hitting-cyber-security-statistics\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/CYBERSTAT_MAST.png","datePublished":"2022-08-25T12:20:00+00:00","dateModified":"2026-03-31T09:58:12+00:00","description":"S\u2019il y a une chose qui est devenue claire en 2015, c\u2019est bien que nulle organisation, quelle que soit sa taille ou son secteur d\u2019activit\u00e9, n\u2019est \u00e0 l\u2019abri d\u2019une violation de donn\u00e9es.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/blog\/10-hard-hitting-cyber-security-statistics\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/blog\/10-hard-hitting-cyber-security-statistics\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/blog\/10-hard-hitting-cyber-security-statistics\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/CYBERSTAT_MAST.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/CYBERSTAT_MAST.png","width":1120,"height":679,"caption":"Abstract human silhouettes representing data-driven decision making and advanced analytics"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/blog\/10-hard-hitting-cyber-security-statistics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Ten Hard-hitting Cybersecurity Statistics for 2022"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":2,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9380\/revisions"}],"predecessor-version":[{"id":55408,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9380\/revisions\/55408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/9381"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=9380"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=9380"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=9380"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=9380"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=9380"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=9380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}