{"id":350,"date":"2012-10-09T11:33:35","date_gmt":"2012-10-09T11:33:35","guid":{"rendered":"http:\/\/isensorlab.com\/forum\/?p=350"},"modified":"2015-03-26T14:08:01","modified_gmt":"2015-03-26T14:08:01","slug":"number-of-cyber-attacks-against-the-u-s-has-doubled-in-the-last-three-years","status":"publish","type":"post","link":"https:\/\/isensoranalytics.com\/forum\/?p=350","title":{"rendered":"Number of cyber attacks against the U.S. has doubled in the last three years"},"content":{"rendered":"<p>The number of cyberattacks targeting US organizations has doubled over the past three years, leading to hefty losses, a study released Monday showed.<\/p>\n<p>The study conducted by the Ponemon Institute and sponsored by Hewlett-Packard said most of the attacks involve malicious code, denial of service, stolen or hijacked devices, or \u201cmalevolent insiders.\u201d<\/p>\n<p>\u201cThe occurrence of cyberattacks has more than doubled over a three-year period, while the financial impact has increased by nearly 40 percent,\u201d the report said.<\/p>\n<p>The 2012 study showed organizations experiencing an average of 102 successful attacks per week, compared to 72 attacks per week in 2011 and 50 attacks per week in 2010.<\/p>\n<p>Among the organizations surveyed which were hit by successful cyberattacks, the average losses was $8.9 million, up six percent from 2011 and 38 percent increase over 2010.<\/p>\n<p>\u201cOrganizations are spending increasing amounts of time, money and energy responding to cyberattacks at levels that will soon become unsustainable,\u201d said HP\u2019s Michael Callahan.<\/p>\n<p>More from RawStory.com: http:\/\/www.rawstory.com\/rs\/2012\/10\/08\/study-number-of-cyber-attacks-against-u-s-doubled-in-three-years\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The number of cyberattacks targeting US organizations has doubled over the past three years, leading to hefty losses, a study released Monday showed. The study conducted by the Ponemon Institute and sponsored by Hewlett-Packard said most of the attacks involve &hellip; <a href=\"https:\/\/isensoranalytics.com\/forum\/?p=350\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-350","post","type-post","status-publish","format-standard","hentry","category-featured"],"_links":{"self":[{"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=\/wp\/v2\/posts\/350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=350"}],"version-history":[{"count":2,"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=\/wp\/v2\/posts\/350\/revisions"}],"predecessor-version":[{"id":589,"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=\/wp\/v2\/posts\/350\/revisions\/589"}],"wp:attachment":[{"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}