Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Recent Data Shows Surprising Trends in Cybercrime Victimization

Recent Data Shows Surprising Trends in Cybercrime Victimization

When it comes to who is victimized in cybercriminal efforts, there may be a few stereotypes and presumptions that a lot of people may hold. A recent report, Oh, Behave!, released by the National Cybersecurity Alliance and Cybsafe, shows that the real victims of many forms of cybercrime aren’t who many would expect.

Let’s break down what Oh, Behave! indicates.

Cybercrime Victimization is a Complicated Subject

First off, surveyed participants overwhelmingly agreed that their online security was a priority—78% reporting in the affirmative, an excellent sign.

That being said, only half of respondents felt that remaining secure online was possible or under their control, with just under half claiming that doing so was either frustrating or intimidating. This is not the attitude you want present in your business, protecting the data that could potentially end your business if it were to be breached.

This Research Also Revealed Who Was Most Prone to Different Scams

Across effectively all forms of cybercriminal attack the survey covered—phishing, identity theft, romance scams, and cyberbullying—it was the younger generations, Gen Z and Millennials, who were most often victimized, or at least reported it most often.

Fortunately, many people are willing to report when they have been victimized, at least when it comes to phishing (69% reporting, as compared to 31% who did not report) and identity theft (74% reporting, as compared to 26% who did not report). Less promising were the reporting/not reporting rates for romance scams with 55% reporting, 45% not reporting, and cyberbullying with 52% reporting, and 48% not reporting, respectively.

It Is So Important to Train Your Team Members to Do Better

We can help. Reach out to us to learn more about how we can help teach your team to be more secure. Give us a call at 800.618.9844 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 06 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Email Workplace Tips Privacy Google Computer Workplace Strategy Small Business Hosted Solutions Backup Collaboration Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Covid-19 Gadgets Cloud Computing Training Compliance Remote Work Server IT Support Managed Service Provider Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Vendor Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Two-factor Authentication Managed Services Mobile Office WiFi App Employer-Employee Relationship BYOD Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking How To BDR HIPAA Computing Physical Security Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Password Managed IT Services Big Data Operating System Router 2FA Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Healthcare Augmented Reality Retail Storage Bring Your Own Device The Internet of Things Cooperation Solutions Going Green Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Windows 11 Customer Service Display Printer Excel Paperless Office Infrastructure Monitoring Remote Workers Document Management Managed IT Service Firewall Free Resource Project Management Telephone Scam Windows 7 Data loss Microsoft 365 Employees Telephone System Robot Integration Cost Management Settings Printing Wireless Content Filtering IT Management Customer Relationship Management Holidays VPN YouTube Meetings Cryptocurrency Data Storage User Tip Supply Chain Modem Hacking Presentation Computer Repair Mobile Security Video Conferencing Processor Managed Services Provider Virtual Machines Professional Services Virtual Desktop LiFi Wireless Technology Data storage Smart Technology Outlook Machine Learning Money Saving Time iPhone Word Humor Vulnerabilities Maintenance Data Privacy Antivirus Sports Downloads Images 101 Mouse Licensing Multi-Factor Authentication Safety Mobility Entertainment Administration Best Practice Trends Alert Remote Working Memory Vendors Data Breach Managed IT Customer Resource management Google Play Be Proactive Buisness File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Videos Electronic Health Records Legal Data Analysis Workforce IT solutions Star Wars Wasting Time Threats Business Growth Gamification Notifications Staff Trend Micro Security Cameras Workplace Strategies Travel Social Networking Application Legislation Cortana Software as a Service Techology Fileless Malware Meta Google Maps Managing Costs Amazon Alt Codes Content IBM Wearable Technology eCommerce Health IT SSID Downtime Unified Threat Management Motherboard Comparison Permissions Surveillance Unified Threat Management Directions Virtual Assistant Outsource IT Hosted Solution Assessment Virtual Machine Environment Typing Media Reviews Medical IT Network Congestion Specifications Competition Knowledge Fraud Development Google Drive User Error Microchip Transportation Small Businesses Internet Exlporer Hypervisor Displays Username Shopping Optimization PowerPoint Point of Sale 5G Black Friday Experience Google Docs Employer/Employee Relationships Outsourcing Unified Communications Database Bitcoin Network Management Navigation Running Cable Tech Support IT Technicians User PCI DSS Gig Economy Google Wallet Proxy Server Workplace Cookies Monitors Cyber Monday Tactics Hotspot Internet Service Provider Teamwork Hiring/Firing Windows 8 IP Address Evernote Paperless Laptop Websites Mirgation Regulations Compliance Memes Drones Co-managed IT Nanotechnology Addiction Electronic Medical Records Language Net Neutrality SharePoint SQL Server Technology Care History Management Business Communications Halloween Chatbots Recovery Financial Data Writing Distributed Denial of Service Smartwatch IT Lenovo Scams Screen Reader Hard Drives Service Level Agreement Domains Virtual Reality Computing Infrastructure Procurement Azure Hybrid Work Cyber security Hacks Server Management Tech Human Resources Scary Stories Private Cloud Identity Telework Fun CES Communitications Superfish Bookmark Cables Identity Theft Smart Tech Refrigeration Deep Learning Download Public Speaking Twitter Alerts Supply Chain Management Lithium-ion battery Term Google Apps Error FinTech Social Engineering Break Fix Entrepreneur IT Assessment Browsers IT Maintenance Education Connectivity Upload Remote Computing Flexibility Value Business Intelligence Mobile Computing Social Network Shortcuts Multi-Factor Security Organization Search Dark Web Digital Security Cameras Smart Devices Ransmoware Tablet IoT Undo

Blog Archive