Cyberattacks and how they work

Cyber attack

Cybercriminals in 2019 managed to expose more than 165 million records of confidential data across 1,365 known breaches.

But how do they get in, how long do they stay and what are they there for? The answers to these questions are in the 2020 Compromise Flashcard produced by compromise assessment company Lumu.

The infographic compiles recent industry research data to show how companies are being attacked, the types of data attackers are seeking, which industries are most frequently targeted, and the duration for which an attacker is able to dwell inside the network without being detected.

You can see the full graphic below.

Lumu compromise flashcard

Photo credit: Tashatuvango/Shutterstock

Comments are closed.

Why Trust Us



At BetaNews.com, we don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.