Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Recent Data Shows Surprising Trends in Cybercrime Victimization

Recent Data Shows Surprising Trends in Cybercrime Victimization

When it comes to who is victimized in cybercriminal efforts, there may be a few stereotypes and presumptions that a lot of people may hold. A recent report, Oh, Behave!, released by the National Cybersecurity Alliance and Cybsafe, shows that the real victims of many forms of cybercrime aren’t who many would expect.

Let’s break down what Oh, Behave! indicates.

Cybercrime Victimization is a Complicated Subject

First off, surveyed participants overwhelmingly agreed that their online security was a priority—78% reporting in the affirmative, an excellent sign.

That being said, only half of respondents felt that remaining secure online was possible or under their control, with just under half claiming that doing so was either frustrating or intimidating. This is not the attitude you want present in your business, protecting the data that could potentially end your business if it were to be breached.

This Research Also Revealed Who Was Most Prone to Different Scams

Across effectively all forms of cybercriminal attack the survey covered—phishing, identity theft, romance scams, and cyberbullying—it was the younger generations, Gen Z and Millennials, who were most often victimized, or at least reported it most often.

Fortunately, many people are willing to report when they have been victimized, at least when it comes to phishing (69% reporting, as compared to 31% who did not report) and identity theft (74% reporting, as compared to 26% who did not report). Less promising were the reporting/not reporting rates for romance scams with 55% reporting, 45% not reporting, and cyberbullying with 52% reporting, and 48% not reporting, respectively.

It Is So Important to Train Your Team Members to Do Better

We can help. Reach out to us to learn more about how we can help teach your team to be more secure. Give us a call at 800.618.9844 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Communication Cybersecurity Saving Money Smartphone Data Backup Managed Service Android AI Upgrade Disaster Recovery Data Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Facebook Miscellaneous Information Automation Artificial Intelligence Gadgets Cloud Computing Holiday Covid-19 Training Server Remote Work Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Data Management Business Continuity Government Bandwidth Virtualization Blockchain Wi-Fi Business Technology Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Gmail Budget Managed Services Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Conferencing WiFi How To BDR Computing Hacker Information Technology HIPAA Avoiding Downtime Applications Marketing Access Control Office 365 Retail Storage Password Bring Your Own Device Managed IT Services Big Data Healthcare Operating System Computers Virtual Private Network Risk Management Router Website Health Office Tips Analytics 2FA Augmented Reality Help Desk Excel The Internet of Things Scam Data loss Remote Workers Telephone Social Going Green Patch Management Cooperation Free Resource Save Money Project Management Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management Customer Service Microsoft 365 Cybercrime Physical Security Solutions Display Printer Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Video Conferencing Managed Services Provider Professional Services Saving Time Safety Virtual Machines Maintenance Antivirus Sports Mouse Managed IT Service Administration Downloads iPhone Licensing Vulnerabilities Entertainment Data Privacy Robot Customer Relationship Management Settings Images 101 Printing Wireless Mobility Content Filtering Telephone System Multi-Factor Authentication Cost Management Hacking IT Management Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology Computer Repair Employees Integration Virtual Desktop User Tip Data storage Modem LiFi Mobile Security Processor Word Outlook Holidays Machine Learning Data Storage Money Smart Technology Supply Chain Humor Addiction Hacks Server Management Language Employer/Employee Relationships Outsourcing Entrepreneur Scary Stories Private Cloud Management PCI DSS Superfish Chatbots Identity Theft Navigation Fun Distributed Denial of Service Workplace Twitter Gig Economy Screen Reader Deep Learning Service Level Agreement Internet Service Provider Undo Computing Infrastructure Teamwork Hiring/Firing Error Regulations Compliance Identity Education Evernote Paperless Social Engineering Co-managed IT Remote Computing Bookmark Smart Tech Memes Download Net Neutrality Mobile Computing Alerts SQL Server Technology Care Search Financial Data History Tablet Business Communications Application Best Practice Break Fix Scams Alert Browsers Smartwatch Connectivity IT Upload Procurement Managed IT Azure Hybrid Work Buisness File Sharing Dark Data How To Social Network Telework IBM Legal Cyber security IT solutions Multi-Factor Security Tech Human Resources IoT Communitications Business Growth Dark Web Cables Notifications CES Trends Supply Chain Management Travel Google Calendar Term Google Apps Cortana Customer Resource management FinTech Techology Regulations Google Maps Star Wars IT Assessment Alt Codes Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Competition Staff Value Business Intelligence Downtime Unified Threat Management Legislation Shortcuts Organization Unified Threat Management Social Networking Hosted Solution Smart Devices Typing Ransmoware Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Network Congestion Comparison Google Play Be Proactive Knowledge Health IT Google Drive User Error Motherboard Data Breach User Assessment Electronic Health Records Permissions Workforce Directions Videos Wasting Time Threats Point of Sale 5G Specifications Security Cameras Workplace Strategies Experience IP Address Google Docs Trend Micro Unified Communications Internet Exlporer Software as a Service Bitcoin Network Management Fraud Meta Running Cable Tech Support Microchip Username Google Wallet Managing Costs Amazon Monitors Black Friday SSID eCommerce Recovery Database Surveillance Hard Drives Windows 8 Virtual Assistant Outsource IT Laptop Websites Domains Drones IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Electronic Medical Records Proxy Server Reviews SharePoint Cookies Tactics Development Refrigeration Hotspot Transportation Small Businesses Halloween Public Speaking Lenovo Mirgation Hypervisor Displays Writing PowerPoint Virtual Reality Shopping Lithium-ion battery Nanotechnology Optimization

Blog Archive