Enter your keyword

The FBI’s Latest Report on Cybercrime: What You Need to Know

The FBI’s Latest Report on Cybercrime: What You Need to Know

The FBI’s Internet Crime Complaint Center (IC3) has had their hands full. As the nation’s direct outlet for reporting cybercrimes, the team has received more than 6.5 million complaints since its inception in 2000. As you might imagine, the numbers in their latest report are staggering. In the last five years the U.S. has seen a steady increase in the number of incidents, average loss per incident, and total annual loss reported. 

In 2021, damages from cyberattacks totaled $6.9 billion – an increase of 64.3% from the prior year. Businesses across the country and in every major sector fell victim. If you’re considering exploring ways to better protect your company from these types of threats, here are a few 2021 cybercrime statistics from the FBI’s most recent report that might persuade you to do so: 

    • For the third year straight, Phishing is the most commonly used tactic by cybercriminals.
  • In 2021, with more than 323,000 victims, phishing attacks represented 38.2% of all reported cybercrimes.
  • Business Email Compromise (BEC) losses totaled nearly $2.4 billion. BEC is also known as Email Account Compromise (EAC) involves the unauthorized transfer of funds.
  • 2021 thefts involving cryptocurrency increased seven times over prior year totals and accounted for more than $1.6 billion in total losses.
  • Ransomware saw adjusted losses of more than $49.2 million while malware and virus incidents accounted for $5.6 million.
  • While corporate data breaches were down in 2021, they still accounted for $151.6 million in losses. Per breach losses were more than $117,700.
  • Fraudulent tech support scams accounted for almost $348 million in losses. 
  • 14 of the U.S.’s 16 critical infrastructure sectors fell victim to a ransomware attack in 2021, with the top three sectors being Healthcare and Public Health, Financial Services, and Information Technology.
  • Government impersonations were particularly successful, averaging losses of $12,584 per incident. 
  • Of those tracked, 36,034 cybercrimes were committed with the help of social media. 

There is some good news, thanks to the IC3’s Recovery Asset Team (RAT). Their successful investigative and recovery efforts in 2021 led to the recovery of $328.32 million in stolen funds. Of course, while hundreds of thousands of dollars are recovered by law enforcement each year, the majority of the money is lost. And while the FBI and IC3 teams are to be applauded, the key message here is that prevention is much wiser than recovery. 

If you want to protect yourself and your company from making the list of IC3 cybercrime statistics in coming years, you’ll need the help of a third-party email security platform. INKY is the industry’s best solution for the security of your email, capable of detecting and stopping phishing threats – including all types that made the FBI’s list last year. INKY works on any device and can be implemented quickly, regardless of whether your employees work at the office or remotely. 

Based on the current trajectory, cybercrime in 2022 is sure to outpace that of 2021. Take the next best step today and speak to your IT provider about INKY.

*Data found in this article was retrieved from the IC3’s Annual 2021 Report.


Dropsuite is a cloud software platform enabling businesses and organizations globally to easily backup, recover and protect their important business information including emails, contacts, calendars and OneDrive/Sharepoint files. Compliant email backup and archive system with a 10-year retention policy.

Vade Secure:

Vade Secure is an AI-based email security solution to improve security for Office 365 and block advanced phishing, spear phishing, and advanced malware threats. Vade Secure analyzes emails, webpages, attachments, and images with machine learning and deep learning algorithms that are trained to detect behaviors and anomalies common to advanced email threats.

Office Protect:

Office Protect is a service that’s designed to help you secure your Microsoft 365 tenant. Using our powerful in-house security software, our analysts actively monitor for threats, investigate alerts, eliminate false positives, and provide guided response and remediation. Protects against account break-ins, data exfiltration, business email compromise, phishing, internal threats, lateral movement, ransomware, and attacks by nation states.

Dark Cubed:

Dark Cubed focuses on real-time monitoring, threat intelligence, predictive analytics, elegant dashboard, streamlined workflow, executive reporting and active blocking. This is another layer of security that integrates with the firewall.


ThreatLocker is a zero-trust endpoint security tool giving companies control over what software can run, by whom, and what data can be accessed.

It keeps a full detailed audit of what applications are used and data accessed/transferred/deleted and by what users (signature tracking, etc.) If something unusual happens, such as a signature change, or a user opens an application that is out of their normal routine the administrator is alerted. This is a crucial tool in identifying malware threats, as well as helping organizations identify if users are accessing applications and/or data/ files they should not be.

ThreatLocker provides a solution that allows businesses to control the content that runs on their network. Unlike AntiVirus software ThreatLocker is not looking for known viruses or malware. ThreatLocker uses a complex set of rules to determine what can be executed on a network and stops anything that has not been approved before it can even execute.


Huntress is a supplement to SentinelOne. Hackers are becoming more sophisticated, and Huntress actively seeks out these threat actors with a "defend forward" mentality. This software combines both advanced security tools along with human intervention to ensure even the most advanced hackers can't penetrate your network.


SentinelOne is a comprehensive enterprise security platform that provides threat detection, hunting, and response features that enable organizations to discover vulnerabilities and protect IT operations. SentinelOne integrates static artificial intelligence (AI) to provide real-time endpoint protection and reduce false positives that derail investigations or make threat detection a capital-intensive process. This will replace Webroot in your current environment.