VikingCloud

63 STATS2 REPORTS

All Statistics

66% of hotel IT and security executives expect a rise in attack frequency during the summer 2025 travel season.

HospitalityHotels

32% of hotel IT and security leaders say a significant increase in credit card transactions will increase their cybersecurity risk during the busy travel season.

HospitalityHotels

66% of hotels are investing in VPNs.

HospitalityHotelsTools

26% of hotel IT and security leaders say an influx of seasonal employees unfamiliar with cyber policies and best practices increases risk.

HospitalityHotels

Adoption of dark web monitoring among hotels is 26%.

HospitalityHotels

Adoption of penetration testing among hotels is 28%.

HospitalityHotels

12% of hotel IT and security leaders said an attack could lead to hotel closure.

HospitalityHotelsBreach consequences

50% of hotel IT and security executives expect an increase in attack severity during the summer 2025 travel season.

HospitalityHotels

42% of hotel IT and security executives say weaknesses in third-party systems like payment processors and booking platforms increase their cybersecurity risk.

HospitalityHotels

58% of hotels were targeted by five or more attacks during summer 2024.

HospitalityHotels

4 in 10 executives (which is 40%) at hotels say that 16-25% of their total IT budget is devoted to cybersecurity.

HospitalityHotelsBudget

72% of hotels are investing in next-gen antivirus, anti-malware, and anti-spam.

HospitalityHotelsTools

40% of hotel IT and security leaders say outdated technology increases their cybersecurity risk.

HospitalityHotels

Fewer than 50% of hotels have deployed advanced defenses like vulnerability scanning, automated data backups, or integrated ransomware protection.

HospitalityHotels

30% of hotels do not have plans to outsource to a managed security service provider (MSSP)

HospitalityHotels

72% of hotel IT and security executives identified payment systems and point-of-sale (POS) technology as the most vulnerable guest-facing technology.

HospitalityHotels

56% of hotel IT and security executives identified guest Wi-Fi as a most vulnerable guest-facing technology.

HospitalityHotels

16% of hotel IT and security leaders struggle to fill cybersecurity job vacancies.

HospitalityHotelsStaffTalent

48% of hotel IT and security executives are not confident in their staff's ability to reliably identify and respond to sophisticated AI-driven cyberattacks and deepfakes.

HospitalityHotelsAI

26% of hotel IT and security leaders report limited in-house cybersecurity expertise.

HospitalityHotelsStaffTalent

82% of North American hotels were hit with a successful cyberattack during summer 2024.

HospitalityHotels

22% of hotel IT and security executives admitted that cybercriminals outpace their teams.

HospitalityHotels

34% of hotel IT and security executives identified front desk systems as a most vulnerable guest-facing technology.

HospitalityHotels

Top hotel attack methods include data breaches exposing sensitive guest PII (46%), phishing attacks (40%), and guest Wi-Fi network compromise or misuse (38%).

HospitalityHotels

Last summer, 44% of hotels experienced more than 12 hours of downtime due to an attack.

HospitalityHotelsBreach consequences

34% of hotel IT and security leaders are worried about POS system attacks disrupting in-person transactions.

HospitalityHotels

The most likely business impacts of a cyberattack on a hotel include reputational damage from negative reviews (66%), financial losses (46%), lawsuits (42%), lower occupancy (32%), and higher insurance premiums (30%).

HospitalityHotelsBreach consequences

70% of hotels are investing in firewalls.

HospitalityHotelsTools

Wi-Fi or network disruptions (52%) were the most common cyber disruptions faced by SMBs in the past 12 months.

SMBNetwork disruptionWiFi disruption

SMBs are twice as likely to be unaware they’ve been breached by more sophisticated attacks, like a deepfake, compared with more common threats like network downtime.

SMBBreachDeepfakes

16% of SMBs never back up their data.

SMBBackups

Phishing texts and emails (48%) were a common cyber disruption faced by SMBs in the past 12 months.

SMBPhishing

49% of SMBs believe AI will be most useful in offering real-time threat response recommendations.

SMBAIThreat response

50% of SMB tech stacks include antivirus software.

SMBSecurity toolsAntivirusAV

32% of SMBs lack the budget to hire more cyber staff.

SMBBudgetStaff

24% of SMBs were targeted by malware in the past 12 months.

SMBMalware

55% of SMBs believe AI will be most useful in identifying threats before they impact business operations.

SMBCybersecurityAIThreats

A successful cyberattack would force nearly 1 in 5 SMBs to close.

SMBCyber attackClosure

49% of SMBs believe AI will be most useful in flagging phishing emails and texts.

SMBPhishingAI

23% of SMBs use easily hackable passwords with a pet’s name, a series of numbers, or a family member’s name.

SMBPasswordsCredentials

For nearly a third of SMBs, a cyberattack with minimal financial impact – less than $10,000 – would cause them to shut down.

SMBCyber attack

The risk of business downtime (55%) from cyberattacks is a concern for SMB owners.

SMBDowntimeCyber attackCyber attack consequences

22% of SMBs have deployed dark web monitoring.

SMBSecurity toolsDark web monitoring

19% of SMBs experienced deepfake attacks in the past 12 months.

SMBDeepfake

Over half of SMB owners (52%) see cybersecurity as a revenue booster

SMBCybersecurityRevenue booster

Fake social media accounts or website domains (32%) were a common cyber disruption faced by SMBs in the past 12 months.

SMBSocial media accountsWebsite domains

18% of SMBs have deployed penetration testing.

SMBPen testingPenetration testing

14% of SMBs experienced ransomware attacks in the past 12 months.

SMBRansomware

47% of SMB tech stacks include network scanning.

SMBSecurity toolsNetwork scanning

19% of SMBs experienced denial of service attacks in the past 12 months.

SMBDoS