{"id":1547,"date":"2024-10-19T17:06:25","date_gmt":"2024-10-19T17:06:25","guid":{"rendered":"https:\/\/www.newevol.io\/resources\/?p=1547"},"modified":"2024-10-19T18:26:43","modified_gmt":"2024-10-19T18:26:43","slug":"phishing-statistics-in-united-states","status":"publish","type":"post","link":"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/","title":{"rendered":"60+ Phishing Statistics in United States &#8211; 2024"},"content":{"rendered":"\n<p><strong><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.newevol.io\/\">Cybersecurity products<\/a><\/span><\/strong> are becoming increasingly essential as <a href=\"https:\/\/www.sattrix.com\/blog\/what-is-phishing-attack-in-cyber-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span style=\"text-decoration: underline;\">phishing attacks<\/span><\/strong><\/a> continue to be one of the most prevalent and dangerous cyber threats in the United States. According to<strong> <a href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/\"><em>phishing statistics<\/em><\/a> in the United States<\/strong>, each year sees a rise in both the volume and sophistication of these attacks. In 2024, cybercriminals are employing more advanced tactics, targeting both individuals and businesses with precision. From fake emails designed to steal credentials to cleverly crafted text messages meant to exploit personal data, phishing has evolved beyond simple scams into a widespread security concern.<\/p>\n\n\n\n<p>This collection of over 60 key statistics sheds light on the state of phishing in the U.S., its impact across industries, and what trends to watch for as we move further into the digital age. Whether you\u2019re in IT, cybersecurity, or simply a concerned citizen, these insights will help you stay informed and better equipped to fend off phishing attacks in 2024.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_66_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title ez-toc-toggle\" style=\"cursor: pointer\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #0a0a0a;color:#0a0a0a\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #0a0a0a;color:#0a0a0a\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#Phishing_Statistics_Highlights\" title=\"Phishing Statistics Highlights\">Phishing Statistics Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#Top_Phishing_Attack_Statistics_2024\" title=\"Top Phishing Attack Statistics 2024\">Top Phishing Attack Statistics 2024<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#Phishing_Attacks_Projections_for_2024\" title=\"Phishing Attacks Projections for 2024\">Phishing Attacks Projections for 2024<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#Phishing_Attack_Trends\" title=\"Phishing Attack Trends\">Phishing Attack Trends<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#Notable_Phishing_Incidents\" title=\"Notable Phishing Incidents\">Notable Phishing Incidents<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#Common_Phishing_Attack_Methods\" title=\"Common Phishing Attack Methods\">Common Phishing Attack Methods<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#General_Statistics\" title=\"General Statistics\">General Statistics<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#Miscellaneous_Phishing_Attack_Data\" title=\"Miscellaneous Phishing Attack Data\">Miscellaneous Phishing Attack Data<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#How_to_Prevent_Phishing_Attacks\" title=\"How to Prevent Phishing Attacks\">How to Prevent Phishing Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#Phishing_Attack_Methods_Vectors\" title=\"Phishing Attack Methods &amp; Vectors\">Phishing Attack Methods &amp; Vectors<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#Prevention_and_Awareness_Statistics\" title=\"Prevention and Awareness Statistics\">Prevention and Awareness Statistics<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#1_Employee_Awareness_Training\" title=\"1. Employee Awareness Training\">1. Employee Awareness Training<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#2_Adoption_of_Multi-Factor_Authentication_MFA\" title=\"2. Adoption of Multi-Factor Authentication (MFA)\">2. Adoption of Multi-Factor Authentication (MFA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#3_Phishing_Simulation_Programs\" title=\"3. Phishing Simulation Programs\">3. Phishing Simulation Programs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#4_Use_of_Anti-Phishing_Tools\" title=\"4. Use of Anti-Phishing Tools\">4. Use of Anti-Phishing Tools<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#5_Phishing_Reporting_and_Response_Rates\" title=\"5. Phishing Reporting and Response Rates\">5. Phishing Reporting and Response Rates<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#6_Financial_Investments_in_Cybersecurity_Training\" title=\"6. Financial Investments in Cybersecurity Training\">6. Financial Investments in Cybersecurity Training<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#7_Mobile_Phishing_Awareness\" title=\"7. Mobile Phishing Awareness\">7. Mobile Phishing Awareness<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#8_Effectiveness_of_Phishing_Awareness_Campaigns\" title=\"8. Effectiveness of Phishing Awareness Campaigns\">8. Effectiveness of Phishing Awareness Campaigns<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#9_Government-Led_Awareness_Initiatives\" title=\"9. Government-Led Awareness Initiatives\">9. Government-Led Awareness Initiatives<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#Final_Thoughts\" title=\"Final Thoughts\">Final Thoughts<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#FAQs\" title=\"FAQs\">FAQs<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Phishing_Statistics_Highlights\"><\/span>Phishing Statistics Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>In 2022, phishing attacks in the US led to the compromise of <a href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\/springfield\/news\/internet-crime-complaint-center-releases-2022-statistics\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>300,497 accounts<\/strong><\/a> with a loss of <strong>$52,089,159<\/strong>.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.cisa.gov\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">36%<\/a><\/strong> of all data breaches in the US are caused by phishing attacks.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">83%<\/a><\/strong> of organizations experience a phishing attack each year.<\/li>\n\n\n\n<li>There was a <strong><a href=\"http:\/\/symantec.com\/security-center\/threat-report\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">345% increase<\/a><\/strong> in unique phishing sites between 2020 and 2021.<\/li>\n\n\n\n<li>The average cost of a phishing attack for corporations is <strong><a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">$4.91 million<\/a><\/strong>.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Top_Phishing_Attack_Statistics_2024\"><\/span>Top Phishing Attack Statistics 2024<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol start=\"6\" class=\"wp-block-list\">\n<li><strong>44%<\/strong> of people believe an email is safe when it contains familiar branding.<\/li>\n\n\n\n<li>In 2022, Microsoft products or branding were exploited in over <strong>30 million malicious messages<\/strong>.<\/li>\n\n\n\n<li>Telephone-oriented attack delivery attempts peaked at <strong><a href=\"https:\/\/www.bankinfosecurity.com\/whitepapers\/2023-state-phish-w-12008\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">600K per day<\/a><\/strong> in August 2022.<\/li>\n\n\n\n<li>Direct financial losses due to phishing increased by <strong>76%<\/strong> in 2022.<\/li>\n\n\n\n<li><strong>75 million threats<\/strong> were blocked by user reporting, approximately 1 in 10 threats.<\/li>\n\n\n\n<li><strong>55%<\/strong> of phishing websites use targeted brand names to capture sensitive information.<\/li>\n\n\n\n<li><strong>84%<\/strong> of US organizations report that security awareness training has reduced phishing susceptibility.<\/li>\n\n\n\n<li><strong>92%<\/strong> of Australian companies were breached by phishing attacks, up <strong>53%<\/strong> from 2021.<\/li>\n\n\n\n<li>The most impersonated brands in phishing include Google (<strong>13%<\/strong>), Amazon (<strong>13%<\/strong>), WhatsApp (<strong>9%<\/strong>), Facebook (<strong>9%<\/strong>), and Apple\/Netflix (<strong>2%<\/strong> each).<\/li>\n\n\n\n<li>Phishing-based breaches take an average of <strong>295 days<\/strong> to identify and rectify.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Phishing_Attacks_Projections_for_2024\"><\/span>Phishing Attacks Projections for 2024<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol start=\"16\" class=\"wp-block-list\">\n<li><strong>AI-powered phishing<\/strong> is expected to increase in sophistication.<\/li>\n\n\n\n<li>Tools like <strong>ChatGPT<\/strong> will enable the creation of polymorphic malware and fake login pages.<\/li>\n\n\n\n<li>Cybercriminals will shift towards targeting major corporations for large ransomware payments.<\/li>\n\n\n\n<li><strong>TrickBot<\/strong> activity will likely increase, with campaigns using CHM and LNK downloaders.<\/li>\n\n\n\n<li>New commodity downloaders are expected to emerge, leading to more severe phishing incidents.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Phishing_Attack_Trends\"><\/span>Phishing Attack Trends<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol start=\"21\" class=\"wp-block-list\">\n<li>Scammers are exploiting the <strong>war in Ukraine<\/strong> to run phishing campaigns, particularly using donation scams.<\/li>\n\n\n\n<li>A <strong>7-fold increase<\/strong> in phishing emails in the Slavic language has been observed since the war began.<\/li>\n\n\n\n<li>Malware disguised as free data decryption tools targeted Ukrainian systems.<\/li>\n\n\n\n<li><strong>COVID-19<\/strong> sparked a wave of phishing attacks, exploiting remote work vulnerabilities.<\/li>\n\n\n\n<li><strong>28%<\/strong> of remote employees admitted to using personal devices for work, increasing attack surfaces.<\/li>\n\n\n\n<li>The pandemic caused <strong>2%<\/strong> of all malware spam.<\/li>\n\n\n\n<li>Online communication platforms like <strong>Zoom<\/strong> and <strong>Microsoft Teams<\/strong> are frequent phishing targets.<\/li>\n\n\n\n<li><strong>50,000 Zoom accounts<\/strong> were auctioned off on the dark web for as little as $0.0020 per account.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Notable_Phishing_Incidents\"><\/span>Notable Phishing Incidents<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol start=\"29\" class=\"wp-block-list\">\n<li>The <strong>Russia-Ukraine war<\/strong> has seen extensive phishing attacks targeting military personnel.<\/li>\n\n\n\n<li>The <strong>Lapsus$ extortion group<\/strong> used phishing to hack companies like Microsoft, Samsung, and Nvidia.<\/li>\n\n\n\n<li>Costa Rica&#8217;s <strong>Ministry of Finance<\/strong> was paralyzed by a phishing-driven attack by the Conti gang.<\/li>\n\n\n\n<li>The <strong>2021 Colonial Pipeline attack<\/strong> disrupted gasoline distribution on the US East Coast, with a $4.4 million ransom paid.<\/li>\n\n\n\n<li>In <strong>2015<\/strong>, aerospace company FACC lost <strong>$47 million<\/strong> to a phishing-based whaling attack.<\/li>\n\n\n\n<li>The <strong>2014 Sony Pictures<\/strong> cyberattack, initiated by phishing, resulted in the theft of <strong>100 terabytes of data<\/strong>.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Common_Phishing_Attack_Methods\"><\/span>Common Phishing Attack Methods<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol start=\"35\" class=\"wp-block-list\">\n<li>Webmail and SaaS users are the top phishing targets, accounting for <strong>34.7%<\/strong> of attacks.<\/li>\n\n\n\n<li>Phishing attacks on social media represented <strong>12.5%<\/strong> of attempts in Q1 2022.<\/li>\n\n\n\n<li><strong>Spear phishing emails<\/strong> are used in <strong>65%<\/strong> of cyberattacks.<\/li>\n\n\n\n<li>Email is used to deliver <strong>94%<\/strong> of malware.<\/li>\n\n\n\n<li><strong>1 in 4,200 emails<\/strong> sent globally is a phishing scam email.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"General_Statistics\"><\/span>General Statistics<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol start=\"40\" class=\"wp-block-list\">\n<li>In 2022, the FBI\u2019s Internet Crime Complaint Center (IC3) received <strong>800,944 phishing reports<\/strong>, with losses exceeding <strong>$10.3 billion<\/strong>.<\/li>\n\n\n\n<li>Phishing caused <strong>36%<\/strong> of all data breaches, according to Verizon&#8217;s 2022 report.<\/li>\n\n\n\n<li>In <strong>2021<\/strong>, phishing accounted for <strong>40%<\/strong> of cyber breaches, with <a href=\"https:\/\/www.sattrix.com\/blog\/ransomware-new-challenges-and-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span style=\"text-decoration: underline;\">ransomware<\/span><\/strong><\/a> and hacking contributing <strong>22%<\/strong> and <strong>11%<\/strong>, respectively.<\/li>\n\n\n\n<li><strong>1.2%<\/strong> of all emails sent are reported as malicious.<\/li>\n\n\n\n<li><strong>88%<\/strong> of organizations have been victims of spear phishing attacks.<\/li>\n\n\n\n<li>Gmail blocks nearly <strong>100 million phishing emails<\/strong> daily.<\/li>\n\n\n\n<li>Nearly <strong>67%<\/strong> of phishing emails have a blank subject line.<\/li>\n\n\n\n<li>The top phishing email subject lines include &#8220;business proposal request&#8221; (<strong>6%<\/strong>) and &#8220;Fax delivery report&#8221; (<strong>9%<\/strong>).<\/li>\n\n\n\n<li><strong>93%<\/strong> of breaches in Q3 2021 involved phishing attacks.<\/li>\n\n\n\n<li>Opening phishing emails increases the risk of malware by <strong>30%<\/strong>.<\/li>\n\n\n\n<li>The most common words in phishing emails include &#8220;important updates&#8221; (<strong>8%<\/strong>), &#8220;important&#8221; (<strong>5.4%<\/strong>), and &#8220;urgent&#8221; (<strong>8%<\/strong>).<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Miscellaneous_Phishing_Attack_Data\"><\/span>Miscellaneous Phishing Attack Data<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol start=\"51\" class=\"wp-block-list\">\n<li><strong>22%<\/strong> of all data breaches are caused by phishing scams, making it the most prevalent cybercrime in the FBI\u2019s 2021 IC3 Report.<\/li>\n\n\n\n<li>In 2020, <strong>83%<\/strong> of companies experienced a phishing attack.<\/li>\n\n\n\n<li>In Q1 2022, the <strong>APWG<\/strong> recorded <strong>1,025,968<\/strong> phishing attacks.<\/li>\n\n\n\n<li>The <strong>Symantec 2019 Threat Report<\/strong> found that spear phishing is responsible for <strong>65%<\/strong> of all cyberattacks.<\/li>\n\n\n\n<li><strong>19%<\/strong> of breaches in 2022 were caused by compromised credentials.<\/li>\n\n\n\n<li>Phishing emails often contain malware\u2014Gmail filters blocked <strong>68%<\/strong> of new phishing scams.<\/li>\n\n\n\n<li>Business Email Compromise (BEC) attacks are rising, with wire transfer requests increasing in value from <strong>$71,000<\/strong> to <strong>$92,000<\/strong>.<\/li>\n\n\n\n<li><strong>Mobile applications<\/strong> were responsible for <strong>70%<\/strong> of online fraud.<\/li>\n\n\n\n<li><strong>LinkedIn<\/strong> phishing messages accounted for <strong>47%<\/strong> of all social media phishing attempts.<\/li>\n\n\n\n<li>Facebook breaches were the top cause of data leaks in 2019.<\/li>\n\n\n\n<li>Phishing is responsible for <strong>8%<\/strong> of all social media cyberattacks.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Prevent_Phishing_Attacks\"><\/span>How to Prevent Phishing Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Phishing attacks can cause significant damage, but fortunately, there are several effective ways to protect yourself and your organization. By combining technology, awareness, and best practices, you can reduce the risk of falling victim to these scams. Here are some key steps to prevent phishing attacks:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Enable Multi-Factor Authentication (MFA)<\/strong>: Adds an extra security layer by requiring a second form of identification beyond just a password.<\/li>\n\n\n\n<li><strong>Use Anti-Phishing Software<\/strong>: Deploy robust software to filter out phishing emails and malicious links before they reach users.<\/li>\n\n\n\n<li><strong>Train Employees Regularly<\/strong>: Conduct regular training on phishing tactics to help employees spot suspicious communications.<\/li>\n\n\n\n<li><strong>Verify Before You Click<\/strong>: Always confirm the source of unexpected emails, inspect links, and contact senders through verified methods if needed.<\/li>\n\n\n\n<li><strong>Keep Software Updated<\/strong>: Regularly update browsers, email clients, and security tools to address vulnerabilities that attackers exploit.<\/li>\n\n\n\n<li><strong>Use Email Filters<\/strong>: Implement advanced filtering systems to detect and block phishing emails based on red flags.<\/li>\n\n\n\n<li><strong>Monitor for Signs of Phishing<\/strong>: Proactively watch for unusual login activity and unauthorized changes to user profiles.<\/li>\n\n\n\n<li><strong>Secure Your Network<\/strong>: Use firewalls and secure email gateways to protect systems from phishing-related attacks.<\/li>\n\n\n\n<li><strong>Report Phishing Attempts<\/strong>: Encourage immediate reporting of phishing attempts to a dedicated team or tool within the organization.<\/li>\n\n\n\n<li><strong>Educate on Common Phishing Tactics<\/strong>: Ensure everyone understands different types of phishing attacks like email phishing, spear phishing, and whaling.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Phishing_Attack_Methods_Vectors\"><\/span>Phishing Attack Methods &amp; Vectors<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Phishing attacks continue to evolve, leveraging various methods and attack vectors to exploit victims. While the primary goal remains the same\u2014stealing sensitive information\u2014attackers use increasingly sophisticated techniques. Here are some common phishing methods:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Email Phishing<\/strong>: Fraudulent emails that look legitimate, containing harmful links or attachments to steal credentials.<\/li>\n\n\n\n<li><strong>Spear Phishing<\/strong>: Targeted phishing aimed at specific individuals or organizations, often personalized to evade detection.<\/li>\n\n\n\n<li><strong>Whaling<\/strong>: A form of spear phishing targeting high-level executives by impersonating trusted figures to obtain sensitive data.<\/li>\n\n\n\n<li><strong>Smishing (SMS Phishing)<\/strong>: Phishing through SMS or messaging apps, leading to malicious websites or requests for personal info.<\/li>\n\n\n\n<li><strong>Vishing (Voice Phishing)<\/strong>: Phone scams impersonating legitimate organizations to extract sensitive information over calls.<\/li>\n\n\n\n<li><strong>Clone Phishing<\/strong>: Duplicating a legitimate email and replacing its links or attachments with malicious content.<\/li>\n\n\n\n<li><strong>Pharming<\/strong>: Redirecting users from genuine websites to fake ones using DNS exploits for credential theft.<\/li>\n\n\n\n<li><strong>Malvertising<\/strong>: Embedding malicious code in online ads, leading users to phishing sites or installing malware.<\/li>\n\n\n\n<li><strong>Social Media Phishing<\/strong>: Exploiting platforms like Facebook and LinkedIn to impersonate accounts or send malicious links.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Prevention_and_Awareness_Statistics\"><\/span>Prevention and Awareness Statistics<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Phishing prevention relies heavily on awareness, education, and the use of modern cybersecurity tools. Several studies and reports in 2024 provide insightful statistics on how organizations and individuals are adopting phishing prevention strategies:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Employee_Awareness_Training\"><\/span><strong>1. Employee Awareness Training<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>According to recent reports, over <strong>85% of organizations<\/strong> in the U.S. have implemented phishing awareness training for their employees, recognizing the importance of human error as a leading cause of successful attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Adoption_of_Multi-Factor_Authentication_MFA\"><\/span><strong>2. Adoption of Multi-Factor Authentication (MFA)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Multi-factor authentication has proven to be one of the most effective tools for preventing phishing attacks. In 2024, <strong>73% of businesses<\/strong> in the U.S. report using MFA across all or most of their critical systems, significantly reducing the risk of credential theft.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Phishing_Simulation_Programs\"><\/span><strong>3. Phishing Simulation Programs<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Phishing simulation programs, which test employee responses to phishing attacks, have been widely adopted. Over <strong>65% of companies<\/strong> regularly conduct phishing simulations to reinforce their employees&#8217; ability to identify suspicious emails.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Use_of_Anti-Phishing_Tools\"><\/span><strong>4. Use of Anti-Phishing Tools<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The use of anti-phishing tools and technologies, such as email filters and web security platforms, has risen significantly. In 2024, <strong>80% of organizations<\/strong> have deployed advanced anti-phishing solutions, helping to block malicious emails and links before they reach employees.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Phishing_Reporting_and_Response_Rates\"><\/span><strong>5. Phishing Reporting and Response Rates<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Statistics reveal that <strong>60% of organizations<\/strong> have established formal channels for reporting phishing attempts. Of those, <strong>40%<\/strong> have reported an increase in employee engagement with reporting mechanisms, highlighting the importance of internal communication in fighting phishing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Financial_Investments_in_Cybersecurity_Training\"><\/span><strong>6. Financial Investments in Cybersecurity Training<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In 2024, U.S. companies are expected to spend an average of <strong>$3.9 billion<\/strong> on cybersecurity awareness programs, with a large portion dedicated to phishing prevention. This represents a <strong>27% increase<\/strong> from 2023, as businesses recognize the growing threat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Mobile_Phishing_Awareness\"><\/span><strong>7. Mobile Phishing Awareness<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>With mobile phishing on the rise, <strong>58% of users<\/strong> report being more cautious about clicking on links or downloading attachments on mobile devices in 2024 compared to previous years. This heightened awareness is helping to combat the increasing threat of smishing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"8_Effectiveness_of_Phishing_Awareness_Campaigns\"><\/span><strong>8. Effectiveness of Phishing Awareness Campaigns<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Phishing awareness campaigns have proven effective, with studies showing that organizations that invest in regular training experience a <strong>30% reduction<\/strong> in successful phishing attempts. Regular training and education are key to mitigating risks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"9_Government-Led_Awareness_Initiatives\"><\/span><strong>9. Government-Led Awareness Initiatives<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In 2024, U.S. government initiatives, such as National Cybersecurity Awareness Month, continue to emphasize phishing prevention. Over <strong>1,200 businesses<\/strong> participated in federal awareness programs this year, leading to increased collaboration between the public and private sectors.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Final_Thoughts\"><\/span>Final Thoughts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Phishing attacks are a significant threat in the digital world, and understanding them is crucial for everyone. With the rise of various phishing methods, it\u2019s more important than ever to stay informed and aware. By recognizing the signs of phishing attempts and knowing how to protect ourselves, we can reduce the risk of falling victim to these scams.<\/p>\n\n\n\n<p>Companies are stepping up their efforts by investing in employee training, using advanced security tools, and creating a culture of awareness. Together, these actions help create a safer online environment. Remember, staying vigilant and educated is our best defense against phishing attacks. Let\u2019s keep ourselves and our information secure!<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span class=\"ez-toc-section\" id=\"FAQs\"><\/span><strong><span style=\"text-decoration: underline;\">FAQs<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>1. What are the statistics of phishing?<\/strong><strong><br><\/strong>Phishing attacks are on the rise, with 2024 showing significant increases in both frequency and sophistication, impacting individuals and businesses alike.<\/p>\n\n\n\n<p><strong>2. Are 90% of attacks phishing?<\/strong><strong><br><\/strong>Not all attacks are phishing, but a large portion of cyber attacks, especially those targeting organizations, involve phishing tactics.<\/p>\n\n\n\n<p><strong>3. Do 90% of cyber attacks start with phishing?<\/strong><strong><br><\/strong>Yes, approximately 90% of successful cyber attacks begin with phishing attempts.<\/p>\n\n\n\n<p><strong>4. What country has the most phishing attacks?<\/strong><strong><br><\/strong>The United States reports the highest number of phishing attacks, but this is a global issue affecting many countries.<\/p>\n\n\n\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"FAQPage\",\n  \"mainEntity\": [{\n    \"@type\": \"Question\",\n    \"name\": \"1. What are the statistics of phishing?\",\n    \"acceptedAnswer\": {\n      \"@type\": \"Answer\",\n      \"text\": \"Phishing attacks are on the rise, with 2024 showing significant increases in both frequency and sophistication, impacting individuals and businesses alike.\"\n    }\n  },{\n    \"@type\": \"Question\",\n    \"name\": \"2. Are 90% of attacks phishing?\",\n    \"acceptedAnswer\": {\n      \"@type\": \"Answer\",\n      \"text\": \"Not all attacks are phishing, but a large portion of cyber attacks, especially those targeting organizations, involve phishing tactics.\"\n    }\n  },{\n    \"@type\": \"Question\",\n    \"name\": \"3. Do 90% of cyber attacks start with phishing?\",\n    \"acceptedAnswer\": {\n      \"@type\": \"Answer\",\n      \"text\": \"Yes, approximately 90% of successful cyber attacks begin with phishing attempts.\"\n    }\n  },{\n    \"@type\": \"Question\",\n    \"name\": \"4. What country has the most phishing attacks?\",\n    \"acceptedAnswer\": {\n      \"@type\": \"Answer\",\n      \"text\": \"The United States reports the highest number of phishing attacks, but this is a global issue affecting many countries.\"\n    }\n  }]\n}\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity products are becoming increasingly essential as phishing attacks continue to be one of the most prevalent and dangerous cyber threats in the United States. According to phishing statistics in the United States, each year sees a rise in both the volume and sophistication of these attacks. In 2024, cybercriminals are employing more advanced tactics,&hellip; <a class=\"more-link\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/\">Continue reading <span class=\"screen-reader-text\">60+ Phishing Statistics in United States &#8211; 2024<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1551,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[87],"tags":[],"class_list":["post-1547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>60+ Phishing Statistics in United States for 2024: Trends &amp; Insights<\/title>\n<meta name=\"description\" content=\"Explore 2024 phishing statistics in the U.S. &amp; learn how evolving tactics impact individuals and businesses. Enhance your cybersecurity measures today!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"60+ Phishing Statistics in United States for 2024: Trends &amp; Insights\" \/>\n<meta property=\"og:description\" content=\"Explore 2024 phishing statistics in the U.S. &amp; learn how evolving tactics impact individuals and businesses. Enhance your cybersecurity measures today!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/\" \/>\n<meta property=\"og:site_name\" content=\"NewEvol\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NewEvolPlatform\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-19T17:06:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-19T18:26:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/10\/phishing-statistics.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@NewEvolPlatform\" \/>\n<meta name=\"twitter:site\" content=\"@NewEvolPlatform\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/\",\"url\":\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/\",\"name\":\"60+ Phishing Statistics in United States for 2024: Trends & Insights\",\"isPartOf\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/10\/phishing-statistics.webp\",\"datePublished\":\"2024-10-19T17:06:25+00:00\",\"dateModified\":\"2024-10-19T18:26:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/b27e9d06ed0a693ae429672c280f5134\"},\"description\":\"Explore 2024 phishing statistics in the U.S. & learn how evolving tactics impact individuals and businesses. Enhance your cybersecurity measures today!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#primaryimage\",\"url\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/10\/phishing-statistics.webp\",\"contentUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/10\/phishing-statistics.webp\",\"width\":1920,\"height\":900,\"caption\":\"Phishing Statistics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.newevol.io\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"60+ Phishing Statistics in United States &#8211; 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#website\",\"url\":\"https:\/\/www.newevol.io\/resources\/\",\"name\":\"NewEvol\",\"description\":\"Innovation in Motion\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.newevol.io\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/b27e9d06ed0a693ae429672c280f5134\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/01\/NewEvol-96x96.png\",\"contentUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/01\/NewEvol-96x96.png\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/www.newevol.io\"],\"url\":\"https:\/\/www.newevol.io\/resources\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"60+ Phishing Statistics in United States for 2024: Trends & Insights","description":"Explore 2024 phishing statistics in the U.S. & learn how evolving tactics impact individuals and businesses. Enhance your cybersecurity measures today!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/","og_locale":"en_US","og_type":"article","og_title":"60+ Phishing Statistics in United States for 2024: Trends & Insights","og_description":"Explore 2024 phishing statistics in the U.S. & learn how evolving tactics impact individuals and businesses. Enhance your cybersecurity measures today!","og_url":"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/","og_site_name":"NewEvol","article_publisher":"https:\/\/www.facebook.com\/NewEvolPlatform\/","article_published_time":"2024-10-19T17:06:25+00:00","article_modified_time":"2024-10-19T18:26:43+00:00","og_image":[{"width":1920,"height":900,"url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/10\/phishing-statistics.webp","type":"image\/webp"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@NewEvolPlatform","twitter_site":"@NewEvolPlatform","twitter_misc":{"Written by":"admin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/","url":"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/","name":"60+ Phishing Statistics in United States for 2024: Trends & Insights","isPartOf":{"@id":"https:\/\/www.newevol.io\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#primaryimage"},"image":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#primaryimage"},"thumbnailUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/10\/phishing-statistics.webp","datePublished":"2024-10-19T17:06:25+00:00","dateModified":"2024-10-19T18:26:43+00:00","author":{"@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/b27e9d06ed0a693ae429672c280f5134"},"description":"Explore 2024 phishing statistics in the U.S. & learn how evolving tactics impact individuals and businesses. Enhance your cybersecurity measures today!","breadcrumb":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#primaryimage","url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/10\/phishing-statistics.webp","contentUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/10\/phishing-statistics.webp","width":1920,"height":900,"caption":"Phishing Statistics"},{"@type":"BreadcrumbList","@id":"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/phishing-statistics-in-united-states\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.newevol.io\/resources\/"},{"@type":"ListItem","position":2,"name":"60+ Phishing Statistics in United States &#8211; 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.newevol.io\/resources\/#website","url":"https:\/\/www.newevol.io\/resources\/","name":"NewEvol","description":"Innovation in Motion","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.newevol.io\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/b27e9d06ed0a693ae429672c280f5134","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/image\/","url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/01\/NewEvol-96x96.png","contentUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/01\/NewEvol-96x96.png","caption":"admin"},"sameAs":["https:\/\/www.newevol.io"],"url":"https:\/\/www.newevol.io\/resources\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/1547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/comments?post=1547"}],"version-history":[{"count":13,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/1547\/revisions"}],"predecessor-version":[{"id":1567,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/1547\/revisions\/1567"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/media\/1551"}],"wp:attachment":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/media?parent=1547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/categories?post=1547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/tags?post=1547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}