How Increasing Cyber Threats Are Changing Humanity 

How Increasing Cyber Threats Are Changing Humanity 

There is scarcely a day that passes without headlines reporting the impact of cybersecurity threats on organisations. According to CheckPoint Research, the global average number of weekly cyberattacks per organisation reached 1,984 in the second quarter of 2025—a 21% increase compared to the same period in 2024, and 58% higher than two years ago. 

In this same period, the education sector was the most heavily targeted, experiencing an average of 4,388 weekly cyberattacks per organisation, a 31% year-on-year increase. Government entities followed with 2,632 weekly attacks (up 26%), while telecommunications companies experienced 2,612 weekly attacks (up 38%). 

Ransomware remains one of the most common forms of attack, often involving extortion through cryptocurrency payments. In the United States, 53% of all cyberattacks involve ransomware, with business services (10.7%), industrial manufacturing (9.8%), and construction and engineering (9.5%) among the most frequently targeted industries. The long-term effect of sustained cyberattacks on specific industries often results in increased product and service costs, as cybersecurity expenses are passed on to end customers. 

The Human Impact 

A global shortage of cybersecurity professionals continues to challenge organisations. Estimates suggest there are approximately 3.4 million unfilled cybersecurity positions worldwide, with this number projected to reach 3.5 million by the end of 2025. Human factors remain a critical vulnerability: around 74% of data breaches involve human error, privilege misuse, or social engineering attacks. This reality underscores the urgent need for comprehensive workforce education and training. As a result, the market for cybersecurity training and awareness programs has expanded rapidly, becoming a core component of modern organisational strategy. 

Impact on Processes 

Manufacturing processes have been particularly affected by the growing frequency of cyberattacks. Over the last three decades, industries have increasingly adopted “Just in Time” production methods, originally developed in Japan during the 1960s and 1970s by Taiichi Ohno at Toyota. This lean manufacturing philosophy eliminates waste by keeping inventory levels minimal. However, it also makes production systems highly sensitive to disruptions. When a cyberattack occurs, it can halt operations almost immediately. 

The cyberattack on Jaguar Land Rover in August 2025 serves as a prime example. Production was suspended following the incident and, as of the latest reports, has not yet resumed. This highlights how deeply cyber vulnerabilities can affect operational continuity in lean, interconnected supply chains. 

Technological Implications 

The escalating threat landscape has driven significant increases in cybersecurity spending. Gartner projects that global spending will reach $213 billion by the end of 2025, representing a 10.4% increase over 2024 budgets. Further growth of around 12% is expected in 2026. The range and sophistication of cybersecurity products and services have also expanded. In the UK alone, there are over 2,100 cybersecurity providers contributing to an estimated £13.2 billion in annual revenue. Globally, the number of providers now exceeds 3,200, with annual growth of approximately 3.5%. 

The Changing Face of Cybercriminals 

While financial gain remains the primary motivation behind most cyberattacks, political activism—particularly from actors in Russia, China, and North Korea—continues to influence the threat landscape. In recent years, a new type of attacker has emerged: inexperienced individuals or groups engaging in cyberattacks with limited technical skill but significant impact. Incidents such as the “Nursery Data Leak” by the Radiant Group highlight this trend and reflect a worrying shift towards what could be described as “moral backtracking,” where individuals justify unethical actions as harmless experimentation or activism. 

Initially dominated by professional criminal networks, cyberattacks have become increasingly accessible. The availability of affordable attack software on illicit markets has even enabled young individuals, including UK teenagers, to purchase and deploy their own attack tools, blurring the lines between organised crime and amateur digital vandalism. 

Conclusion 

Cyber threats are no longer confined to the IT department; they are a central concern shaping the entire structure and behaviour of modern organisations. From human training and recruitment to manufacturing efficiency and technology investment, cybersecurity has become woven into the fabric of business strategy. As threats continue to evolve in both scale and sophistication, organisations must not only defend against attacks but also adapt their culture, processes, and technologies to thrive in an era defined by perpetual digital risk.