Prevention, Detection, and Recovery from Cyberattacks- Part I
During the team discussion about next-gen tools and techniques for prevention, detection, and recovery from cyberattacks, we started looking at some of the common mistakes that could have prevented cyberattacks.
Careful investigation shows that cyberattacks can be very damaging, and human error is a major factor. According to Verizon's 2020 Data Breach Investigations Report (DBIR), 22% of breaches are caused by human error. Since 2010, breaches due to human error have increased, breaches due to malware have decreased, and insider abuse has dropped drastically.
An IBM study published in July 2019 found that inadvertent breaches from human error and system glitches were still the cause for nearly half (49%) of the data breaches in the report, costing companies $3.50 million and $3.24 million, respectively. Human error caused 90% of cyber data breaches in 2019, according to a CybSafe analysis of data from the UK Information Commissioner's Office (ICO).
In the near past, network security focused on big corporations and institutions. Nowadays, every person might be a potential victim of cyberattacks. So we decided to list some myths and realities about cyberattacks.
What are common myths and realities about cyberattacks?
| Myth | Reality |
|---|---|
| Only certain industries are vulnerable to cyber attacks | Any organization with sensitive information is vulnerable to attack |
| An infected computer displays a message intended to scare the user or operates very slowly | Hackers want to control the system or steal information, and they are not interested in displaying a skull on the screen |
| The company has a firewall hence the company is in good shape | A well-configured firewall can protect the company, but most of the time insider attack is often the biggest vulnerability |
| The corporate systems are disconnected from the internet, so the company will not have any risks | Internal threats pose a large threat. USB drives, laptops, etc. that are brought into the isolated network can introduce huge risks |
| Small and medium-sized organizations are not targeted by hackers | Almost third or 28% of data breaches in 2020 involved small businesses as per Verizon Business 2020 Data Breach Investigations Report (2020 DBIR) |
| Anti-virus and anti-malware software keep the organization completely safe | <a href='/blog/cybersecurity/malware-ransomware-how-do-i-get-infected-by-malware' style='color:#4b7b2c; text-decoration:underline'>The malware</a> or virus protection software cannot protect against all cyber risks especially there could be zero-day attacks |
| The company virus detection software is up to date, so it is safe | Virus detection software detects known virus signatures. New and mutating viruses can evade signatures |
| The user will know right away if your computer is infected | Modern malware is stealthy and remains undetected for a longer time |
| Cybersecurity threats come from the outside | Insider threats are just as likely, and harder to detect |
| A VPN makes the organization completely anonymous | Even though VPN data tunnel is encrypted, attacks come in many forms and organizations are not immune to other types of security compromises |
| If Wi-Fi has a password, then it is secure | All public Wi-Fi can be compromised, even with a password |
| Complete cybersecurity can be achieved | Cyber preparedness is ongoing, with a new threat emerging every day |
| A strong password is enough to keep the business safe | Two-factor authentication and data monitoring are required to protect the organization from emerging threats |
| Attackers rush to get in and leave quickly | Attackers deploy 'low and slow' techniques |
| Governments’ new stricter cybersecurity laws and policies are discouraging cybercriminals | According to Interpol, cybercriminals are developing and boosting their attacks at an alarming pace, exploiting fear and uncertainty |
| Effective response equals fast response hence low impact | Attackers perform several decoy operations to distract response teams |
| Cybersecurity specialists can effectively manage growing threats due to advanced technologies | Most small to mid-size enterprises have limited cybersecurity investments due to financial constraints |
| Government and agencies can efficiently deal with ransomware | Many real cases show high ransom payments, such as $600,000 by Riviera Beach and $400,000 by Jackson County |
| Cyber liability insurance fully protects organizations financially | Companies often struggle to prove damages and may not receive full reimbursement |
The list of myths and realities is compiled using several data sources, including WaTech's state Office of Cybersecurity (OCS), Verizon DBIR, IBM study reports, and CybSafe-related risk themes.
Related Resources
Related Posts

Prevention, Detection, and Recovery from Cyberattacks - Part II
Review incident response readiness with a practical checklist covering six IR phases, audit questions, and standards mapping for prevention, detection, and recovery.
Read More
Prevention, Detection, and Recovery from Cyberattacks Part III
Explore Zero Trust as a practical security model, including the supporting technologies and adoption considerations for organizations.
Read More
Prevention, Detection and Recovery from Cyberattacks
Strengthen cyber resilience by understanding threat actors, attacker paths, and high-impact security basics for prevention, detection, and recovery.
Read More

GRC Insights That Matter
Exclusive updates on governance, risk, compliance, privacy, and audits — straight from industry experts.