Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

Cybercriminals are starting to target lower-hanging fruit rather than C-level executives

compromised -freepik
July 2, 2021

 Avanan announced the release of the company's 1H 2021 Global Phish Cyber Attack Report, which analyzes today’s threat landscape, phishing vectors, and industry-based attacks, exposing healthcare and manufacturing as two of the top industries being targeted by hackers in the first half of the year.

“With hospitals around the world being hit with ransomware attacks and manufacturers experiencing supply chain disruption due to cyber attacks, the Avanan research shows that hackers are using one of the most basic tactics to get in ‒ phishing attacks,” said Gil Friedrich, CEO and Co-Founder of Avanan. 

According to Avanan’s security research and analysis, the most attacked industries are IT, healthcare, and manufacturing. IT saw over 9,000 phishing emails in a one month span, out of an average of 376,914 total emails; healthcare saw over 6,000 phishing emails out of an average of 451,792 total emails; and manufacturing saw just under 6,000 phishing emails out of an average of 331,184 total emails.

These industries are the most targeted because they hold incredibly valuable data from health records to social security numbers, combined with the fact that healthcare and manufacturing tend to use outdated tech and often have non-technical board of directors. In healthcare, in particular, the industry is largely unprepared. Though every industry gets attacked, the ones that hold the most data are the most at risk.

For this report, Avanan security researchers analyzed over 905 million emails spanning a six-month period. Since Avanan works as a layer of security behind Microsoft’s EOP, ATP/Defender, Google Workspace, or any SEGs, this analysis only looks at the emails these other layers did not quarantine. The report reflects an analysis of the most sophisticated and evasive attacks in use today. 

Key Findings:

  • Because threats have gotten so advanced, AI is required to stop the majority of attacks missed by legacy solutions. Without the use of sophisticated AI, 51% of attacks would be missed and reach end-users. 
  • Impersonation and credential harvesting attacks remain top phishing vectors. Credential harvesting, 54% of all phishing attacks, has risen by nearly 15% when compared to 2019; 20.7% of all phishing attacks are Business Email Compromise (BEC); and only 2.2% of phishing attacks are extortion. 
  • Hackers are starting to target lower-hanging fruit rather than C-level executives. Now, 51.9% of all impersonation emails attempted to impersonate a non-executive in the organization. In fact, non-executives are targeted 77% more often.
  • Misconfiguration is playing a rising role in phishing. Over 8% of phishing emails ended up in the user’s inbox simply because of an allow or block list misconfiguration, a 5% increase from last year, and 15.4% of email attacks are on an Allow List. 
  • The most commonly used tactic is using non-standard characters and limited sender reputation. Non-standard characters are used in 50.6% of phishing links and 84.3% of phishing emails do not have a significant historical reputation with the victim.

Avanan anticipates that cyberattacks will continue to explode with healthcare and education being hit hardest, predicting that attacks on the education sector will surge over the next six months with massive increases when school returns in the fall. In addition, Avanan predicts COVID-related phishing emails will decrease, while officeplace related phishing emails will increase. As workers around the globe return to the office, there will be a spike in phishing attacks leveraging services like fax, scanners, copiers, targeting the things used in office life that sat dormant for the last year and a half. 

KEYWORDS: cyber security healthcare security phishing risk management supply chain

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • phishing freepik

    New spear phishing emails target C-suite executives, assistants & financial departments

    See More
  • leadership

    Increased Attention from Middle-Market C-Level Executives

    See More
  • Hacker in a hoodie

    Cybercriminals target marketing, C-suite and IT

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing