{"id":9853,"date":"2017-08-30T02:08:00","date_gmt":"2017-08-30T08:08:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/cybersecurity-statistics-2017\/"},"modified":"2026-03-20T00:11:16","modified_gmt":"2026-03-20T06:11:16","slug":"estatisticas-de-ciberseguranca-de-2017","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/","title":{"rendered":"Estat\u00edsticas de ciberseguran\u00e7a de 2017: uma an\u00e1lise aprofundada dos fatos e do futuro."},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Close-up of bright \u20182017\u2019 LED numerals against shadowy decorations, giving a haunting, nostalgic mood\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2017-08-30T02:08:00-06:00\">Ago 30, 2017<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Cybersecurity statistics 2017: A hard look at the facts and future<\/h1>\n\n\n<div class=\"bs-div bs-div-44a15e4b99450b7aaf810333a0fbaa4ff5112133 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/pt\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Cybersecurity%20statistics%202017%3A%20A%20hard%20look%20at%20the%20facts%20and%20future').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fcybersecurity-statistics-2017%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Cybersecurity%20statistics%202017%3A%20A%20hard%20look%20at%20the%20facts%20and%20future&url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fcybersecurity-statistics-2017%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fcybersecurity-statistics-2017%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fcybersecurity-statistics-2017%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<h2>\u00a0<\/h2>\n<p>Cybersecurity statistics have become a bit more ominous as we review the first half of 2017\u2014and according to industry reports, things aren\u2019t looking up anytime soon.<\/p>\n<p>From an alarming increase in brute force ransomware attacks to more sophisticated social engineering techniques, SecOps teams are understandably looking for more reliable ways to prevent alert fatigue, make sense of the data, and implement effective solutions to avoid costly data breaches and downtime.<\/p>\n<h3>Today\u2019s cybersecurity isn\u2019t as secure as you think<\/h3>\n<p>To help your SecOps team better understand the latest cybersecurity statistics and cut through the noise, we\u2019ve compiled some cybersecurity statistics and facts from the first half of 2017 along with a few <a href=\"https:\/\/swimlane.com\/automating-incident-response-ebook\/\">potential solutions<\/a>:<\/p>\n<h4>1. The volume of threat alerts has become staggering.<\/h4>\n<p>Alert fatigue is a very real problem for embattled SOC professionals.<\/p>\n<p>With <a href=\"http:\/\/www.ponemon.org\/blog\/the-cost-of-malware-containment\" target=\"_blank\" rel=\"noreferrer noopener\">organizations receiving an average of 17,000 malware alerts per week<\/a>\u2014and of that, fewer than 20 percent worthy of examination\u2014only 4 percent of all <a href=\"https:\/\/swimlane.com\/blog\/security-alert-management\/\">valid threats are actually investigated<\/a> by those in the trenches.<\/p>\n<p>To make matters worse, Intel Security reports that <strong>93 percent of security personnel are overwhelmed by alert data and unable to triage all potential threats<\/strong><strong>.<\/strong><\/p>\n<h4>2. Incident response teams\u2019 mean time to resolution (MTTR) is generally unacceptable.<\/h4>\n<p>According to the SANS Institute\u2019s <a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/incident\/incident-response-capabilities-2016-2016-incident-response-survey-37047\" target=\"_blank\" rel=\"noreferrer noopener\">Incident Response Capabilities in 2016: The 2016 SANS Incident Response Survey<\/a>, just 29 percent of survey respondents reported a response time between two and seven days\u2014and 38 percent of SOC teams admitted they often couldn\u2019t respond in under one week.<\/p>\n<blockquote>\n<p>Ponemon\u2019s study on <a href=\"http:\/\/www.ponemon.org\/blog\/new-ponemon-study-on-malware-detection-prevention-released\" target=\"_blank\" rel=\"noreferrer noopener\">Malware Prevention and Detection<\/a> reports that the average company takes 170 days to detect an advanced threat, 39 days to mitigate, and 43 days to recover.<\/p>\n<\/blockquote>\n<p>It\u2019s clear that a more <a href=\"https:\/\/swimlane.com\/blog\/automated-incident-response-respond-every-alert\/\">automated and orchestrated response<\/a> to threats and incidents is critical.<\/p>\n<h4>3. Ransomware is rampant.<\/h4>\n<p>Ransomware is currently the hacker\u2019s preferred method of attack\u2014and it\u2019s often the most elusive, making even the most sophisticated SIEM systems ineffective.<\/p>\n<p>According to think-tank Cybersecurity Ventures, the number of global ransomware attacks on businesses is only expected to get worse. In just two years, attacks are up 15X\u2014and <a href=\"http:\/\/cybersecurityventures.com\/ransomware-damage-report-2017-5-billion\/\" target=\"_blank\" rel=\"noreferrer noopener\">damages are predicted to exceed $5 billion<\/a> this year alone, an uptick from $325 million in 2015.<\/p>\n<p>To put that into perspective, the <a href=\"https:\/\/www.fbi.gov\/file-repository\/ransomware-prevention-and-response-for-cisos.pdf\/view\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>FBI reports that more than 4,000 ransomware attacks occur per day<\/strong><\/a>, a 300 percent increase from 1,000 per day back in 2015.<\/p>\n<h4>4. Despite an organization\u2019s best attempt at education, employees continue to be a weak link.<\/h4>\n<p>When it comes to your company\u2019s security architecture, your employees\u2019 \u201cbring your own\u201d mobile devices (BYOD) and networks (BYON), the popularity of wearables and IoT, and often poor password habits become one of your greatest vulnerabilities.<\/p>\n<p>Cisco reports that <a href=\"http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/vni-hyperconnectivity-wp.html\" target=\"_blank\" rel=\"noreferrer noopener\">Wi-Fi and mobile devices will make up two-thirds of internet traffic by 2020<\/a>, up from 48 percent in 2015\u2014and the number of IoT devices will increase from 16.3 billion to 26.3 billion during that time. More than <a href=\"http:\/\/www.csoonline.com\/article\/3195308\/security\/cybersecurity-market-research-top-15-statistics-for-2017.html\" target=\"_blank\" rel=\"noreferrer noopener\">300 billion passwords will be in use by 2021<\/a>, including 200 million IoT credentials alone.<\/p>\n<p>SIEM systems are designed to alert SOC teams of suspected threats\u2014but where employees\u2019 actions and private devices are concerned, <strong>relying on SIEM alone may not be enough to trigger the immediate action necessary for an effective response<\/strong>.<\/p>\n<h4>5. Email remains the vector of choice for malware.<\/h4>\n<p>With today\u2019s increasingly savvy and motivated cyberattack enterprise, employees aren\u2019t vulnerable just because they\u2019re connected; they\u2019re vulnerable because they are human.<\/p>\n<p>To make matters worse, a cleverly disguised email attachment that appears to come from an official source can often get past even the most powerful SIEM system. The Radicati Group reports that the <a href=\"http:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2017\/01\/Email-Statistics-Report-2017-2021-Executive-Summary.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">number of emails transmitted per day will reach 319.6 billion by 2021<\/a>\u2014and with 88 percent of pretexting attacks using email as the top method of communication according to <a href=\"http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/2017\/\" target=\"_blank\" rel=\"noreferrer noopener\">Verizon\u2019s 2017 Data Breach Investigations Report<\/a>, employees are an obvious vulnerability and a preferred business attack vector.<\/p>\n<p>Then add a persistent hacker\u2019s clever social engineering techniques, and <strong>even the most well-trained employee may fall victim to a phishing campaign or other malicious attack<\/strong>.<\/p>\n<h3>Optimize with security automation and orchestration (SAO)<\/h3>\n<p>In a cybersecurity threat landscape where no business is safe from attack, organizations must find a way to <a href=\"https:\/\/swimlane.com\/blog\/security-alert-management\/\">effectively triage, investigate, and escalate the threats that matter.<\/a><\/p>\n<p>A comprehensive, SAO-driven interface allows you to integrate all systems into one unified, central platform to arm SOC teams with a transparent, comprehensive view of your organization\u2019s security operations.<\/p>\n<h3>How Swimlane can help<\/h3>\n<p>While it&#8217;s impossible to <em>completely <\/em>secure to your organization, maximizing your existing investments in SIEM, IDS, and other security tools by investigating all of your security alerts is a good place to start. Swimlane, a security automation and <a href=\"https:\/\/swimlane.com\/security-orchestration-platform\/\">orchestration platform<\/a>, allows you to automate 80\u201390 percent of incoming alerts while providing additional context and analysis for alerts that require manual investigation.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/Swimlane-Screenshot-Computer.jpg\" alt=\"Swimlane-Screenshot-Computer.jpg#asset:357\" \/><\/p>\n<p>Swimlane delivers a comprehensive dashboard interface and metrics to enable SecOps teams to spend more time focusing on the critical threats that matter. Since 80 to 90 percent of all incident response tasks can be effectively automated, Swimlane helps reduce MTTR and improve operational performance with dramatically reduced downtime and, ultimately, a better bottom line.<\/p>\n<p>For more information on how Swimlane can help keep your organization safe from potentially devastating cyberattacks, <a href=\"https:\/\/swimlane.com\/get-a-demo\/\">schedule a demo<\/a> or <strong>check out our <\/strong><a href=\"https:\/\/swimlane.com\/automating-incident-response-ebook\/\"><strong>free eBook on how security automation and orchestration can help your organization<\/strong><\/a><strong>.<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/pt\/tag\/research\/'><span class='tag-content'>Research<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69deee5d6614d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/10-hard-hitting-cyber-security-statistics\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Ago 25, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Ten Hard-hitting Cybersecurity Statistics for 2022<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69deee5d6766c bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/10-facts-every-cyber-security-professional-should-know\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Abr 19, 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Ten facts every cybersecurity professional should know<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69deee5d6869a bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/two-2017-cyber-security-trends\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Nov 11, 2016<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Two 2017 cybersecurity trends every security operations professional should know<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9854,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[86],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[],"class_list":["post-9853","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-research","resource-type-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity statistics 2017: A hard look at the facts &amp; near future<\/title>\n<meta name=\"description\" content=\"Let\u2019s take a look back at the most shocking cybersecurity statistics from the first half of 2017 and anticipating the second half.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/pt\/blogue\/estatisticas-de-ciberseguranca-de-2017\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity statistics 2017: A hard look at the facts and future\" \/>\n<meta property=\"og:description\" content=\"Let\u2019s take a look back at the most shocking cybersecurity statistics from the first half of 2017 and anticipating the second half.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/pt\/blogue\/estatisticas-de-ciberseguranca-de-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-20T06:11:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics-1024x636.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/\",\"url\":\"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/\",\"name\":\"Cybersecurity statistics 2017: A hard look at the facts & near future\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics.png\",\"datePublished\":\"2017-08-30T08:08:00+00:00\",\"dateModified\":\"2026-03-20T06:11:16+00:00\",\"description\":\"Let\u2019s take a look back at the most shocking cybersecurity statistics from the first half of 2017 and anticipating the second half.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics.png\",\"width\":1120,\"height\":696,\"caption\":\"Close-up of bright \u20182017\u2019 LED numerals against shadowy decorations, giving a haunting, nostalgic mood\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity statistics 2017: A hard look at the facts and future\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/pt\/#website\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Estat\u00edsticas de ciberseguran\u00e7a de 2017: uma an\u00e1lise aprofundada dos fatos e do futuro pr\u00f3ximo.","description":"Vamos relembrar as estat\u00edsticas mais alarmantes sobre seguran\u00e7a cibern\u00e9tica do primeiro semestre de 2017 e fazer uma previs\u00e3o para o segundo semestre.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/pt\/blogue\/estatisticas-de-ciberseguranca-de-2017\/","og_locale":"pt_PT","og_type":"article","og_title":"Cybersecurity statistics 2017: A hard look at the facts and future","og_description":"Let\u2019s take a look back at the most shocking cybersecurity statistics from the first half of 2017 and anticipating the second half.","og_url":"https:\/\/swimlane.com\/pt\/blogue\/estatisticas-de-ciberseguranca-de-2017\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-20T06:11:16+00:00","og_image":[{"width":1024,"height":636,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics-1024x636.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tempo estimado de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/","url":"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/","name":"Estat\u00edsticas de ciberseguran\u00e7a de 2017: uma an\u00e1lise aprofundada dos fatos e do futuro pr\u00f3ximo.","isPartOf":{"@id":"https:\/\/swimlane.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics.png","datePublished":"2017-08-30T08:08:00+00:00","dateModified":"2026-03-20T06:11:16+00:00","description":"Vamos relembrar as estat\u00edsticas mais alarmantes sobre seguran\u00e7a cibern\u00e9tica do primeiro semestre de 2017 e fazer uma previs\u00e3o para o segundo semestre.","breadcrumb":{"@id":"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/08.30.17-2017-Cybersecurity-Statistics.png","width":1120,"height":696,"caption":"Close-up of bright \u20182017\u2019 LED numerals against shadowy decorations, giving a haunting, nostalgic mood"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity statistics 2017: A hard look at the facts and future"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/pt\/#website","url":"https:\/\/swimlane.com\/pt\/","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","description":"Automa\u00e7\u00e3o de IA ag\u00eantica para todas as fun\u00e7\u00f5es de seguran\u00e7a","publisher":{"@id":"https:\/\/swimlane.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/pt\/#organization","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9853\/revisions"}],"predecessor-version":[{"id":55051,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9853\/revisions\/55051"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media\/9854"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media?parent=9853"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/tags?post=9853"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-type?post=9853"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-topic?post=9853"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-industry?post=9853"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/blog-category?post=9853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}