82% is the ratio of non-human identities (NHIs) to human users, indicating NHIs now outnumber human users by 82 to 1
Rubrik Zero LabsIdentity Crisis: Understanding & Building Resilience Against Identity-Driven Threats·Nov 13, 2025
Non-human identitiesHuman users
40% of respondents reported increased security costs as a consequence of a cyber attack.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
Cyber attackCyber attack consequences
37% of respondents noted reputational damage and loss of customer confidence as a consequence of a cyber attack.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
Cyber attackCyber attack consequences
30% of respondents cite a lack of centralized management as their top challenge.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
Security challengeCentralized management
Of the organizations that experienced a successful ransomware attack last year, 86% admitted they paid a ransom to recover their data.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
RansomwareRansom
29% of respondents cite a lack of visibility and control over cloud-based data as their top challenge.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
Security challengeVisibilityCloud
27% of high-risk sensitive files contain digital data such as API keys, usernames, and account numbers
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
Sensitive filesSensitive dataAPI keys
36% of sensitive files in the cloud are classified as high risk.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
CloudSensitive files
90% of global IT and security executives reported cyberattacks in the past year.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
Cyber attack
Insider threats were cited by 28% of IT leaders.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
Insider threat
92% of organizations use between two and five cloud and SaaS platforms.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
CloudSaaS
The most common attack vectors cited were: Data breaches (30%), Malware on devices (29%), Cloud or SaaS breaches (28%), Phishing (28%), and Insider threats (28%).
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
Attack vectorData breachMalwareSaaSCloud
33% experienced a forced leadership change following a cyber incident.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
Cyber attackCyber attack consequences
90% of IT and security leaders report managing hybrid cloud environments.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
CloudHybrid cloud
Half of IT leaders say the majority of their workloads are now cloud-based.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
Cloud
Nearly three-quarters (74%) of respondents said threat actors were able to partially compromise backup and recovery systems.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
BackupRecovery
35% of respondents said their backup and recovery systems were completely compromised.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025
BackupRecovery
35% of respondents cite securing data across varied ecosystems as their top challenge.
Rubrik Zero LabsThe State of Data Security in 2025: A Distributed Crisis·Apr 22, 2025