Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Which States Are Most at Risk for Cyberattacks on Government and Infrastructure?
Published:
August 26, 2024

Which States Are Most at Risk for Cyberattacks on Government and Infrastructure?

By:
Team Huntress
Share icon
Glitch effectGlitch effectGlitch effect

Cyberattacks on U.S. government and critical infrastructure surged in 2023. According to Forescout Research, there were more than 420 million critical infrastructure attacks globally between January and December 2023. At 13 attacks per second, this is a 30 percent increase from 2022. The United States stands as the primary target, with 168 threat actors in 2023, more than the second and third most targeted countries combined.

Cyber Threats by US State

Data collected by Network Assured which U.S. states have experienced the most data breaches over time, up until 2022.

PositionStateIncidents Reported
1California1,338
2New York618
3Texas581
4Florida458
5Maryland343
6Illinois343
7Pennsylvania279
8Ohio266
9Georgia255
10Massachusetts248

It found:

  • California had the highest number of reported data breaches, with 1,338 incidents
  • New York and Texas followed at 618 and 581, respectively

When looking at a per capita basis, things shift. The FBI's 2023 Internet Crime Report analyzed the number of cyberattack victims per 100,000 people in each state.

PositionStateAttacks per 100,000 Resident
1Alaska319
2Nevada310
3Delaware260
4Arizona223
5California198
6Colorado198
7Washington187
8South Dakota184
9Florida182
10South Carolina181

Their results identified:

  • Alaska had the highest rate of cyberattack victims at 318.8 per capita
  • Nevada had the second-highest rate at 309.7, followed by Delaware at 260.4 per capita

Alaska Has the Highest Exposure Per Capita 

All states are working to boost their cybersecurity measures to protect against evolving threats, but some states have higher exposure than others. As revealed in the 2023 FBI Internet Crime Report, Alaskans are more likely to be victims of cybercrime than other state populations.

As of 2022, 99.1 percent of business infrastructure in Alaska is small to midsized-sized businesses (SMBs). The FBI is concerned that SMBs are seen as “soft targets” by attackers; according to retired FBI Supervisory Special Agent Scott E. Augenbaum, they often lack the financial resources and skill sets to combat emerging cyber threats. This prompted the FBI field office in Anchorage to launch a cybersecurity awareness campaign. 

“Small businesses are particularly vulnerable, as they often lack the financial resources and expertise to combat emerging cyber threats,” notes Dan Kline, Partner and COO at Great Lakes Advisory. He also believes that “digital agencies play a crucial role in helping SMBs bolster their defenses against these increasing risks and that by partnering with these agencies, small businesses can implement advanced threat detection tools to prevent becoming “soft targets” for cybercriminals.

California Has the Highest Risk Profile

California has more data breaches than the second and third hardest-hit states put together. The European Repository of Cyber Incidents reveals that critical infrastructure is a top target for cybercriminals. California may have the highest cybersecurity risk profile due to its high concentration of technology and critical infrastructure. 

In the same report by Network Assured, three of the 10 largest data breaches in 2022 occurred in California, and despite this, California's cybersecurity spending is lower than New York, Texas, Florida, and Maryland.

Government and Critical Infrastructure Attacks in California

California has faced a surge in cyberattacks, targeting government agencies, hospitals, and educational institutions. 

Among the most disruptive was the August 2023 ransomware attack on Los Angeles-based Prospect Medical Holdings. The organization, which operates 17 hospitals and 166 outpatient clinics across the US, had its network hacked and its devices encrypted. 

The data breach affected hundreds of thousands of employees and patients. More than half a million social security numbers were stolen, along with other personal data, including driver’s licenses, passports, financial documents, and sensitive medical data.  

Rhysida, a notorious ransomware group, claimed responsibility and attempted to sell the stolen data on the dark web for 50 bitcoins, valued at around $1.5 million at the time. The nature of the attack and its far-reaching effects across Prospect Medical’s network serve as a reminder of how easily cyber vulnerabilities can escalate into a full-scale crisis.

Fortifying Our Digital Defenses

With sensitive information on the line, there needs to be a better way to defend against cyber threats to critical infrastructure and governments. As the landscape evolves, so too must the strategies employed to protect these systems. FBI Special Agent Spencer Evans says complacency is the biggest problem—he told KSNV’s Steve Wolford: “Everybody says it's not going to happen to you, and yet the number of victims every year continues to go up and up.”

To protect critical infrastructure, governments must prioritize cybersecurity investments, conduct rigorous risk assessments, and foster strong collaboration with the private sector. By implementing advanced threat detection tools and maintaining a proactive stance, organizations can significantly enhance their resilience against cyberattacks, preserving the safety and well-being of communities.

Discover how Huntress can defend your organization from cyber threats, safeguard critical infrastructure, and protect sensitive data. Schedule a free demo today.

Categories
Cybersecurity Trends
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Is There an Effective Way to Defend Against Cyber Threats to Critical Infrastructure?

    Learn about the current state of cyber threats to critical infrastructure and find out how state and local governments can protect against devastating breaches.
  • The 36 Most Common Cyberattacks [2025]

    Learn about some of the most common cyberattacks, how threat actors access computers and networks, and how to lower future risks.
  • A Wake-Up Call for Healthcare Cybersecurity

    Discover how the Health Infrastructure Security and Accountability Act aims to enforce stricter cybersecurity standards across the healthcare sector.
  • A Look Back at the Most Influential Cyber Threats: A Decade, Defined

    Celebrate 10 years of wrecking hackers! See how Huntress has evolved and elevated in an ever-changing cybersecurity landscape, shaped by key milestones and critical lessons.
  • Understanding the Recent Surge in Cybersecurity Threats to Dental Practices

    Learn why the FBI recently warned dental practices of potential cyberattacks and discover how Huntress Security Awareness Training can help prevent them.
  • Healthcare Held Hostage: Fighting the Plague of Ransomware

    Ransomware is spreading like wildfire. Learn about its growing threat to healthcare, its impact on patient care, and how Huntress managed solutions can better protect your organization from cyberattacks.
  • Qakbot Malware Takedown and Defending Forward

    With the FBI's takedown of Qakbot malware, we're sharing how the Huntress team developed our own Qakbot vaccine and our commitment to defend forward.
  • It Costs How Much?!? The Financial Pitfalls of Cyberattacks on SMBs

    Learn how managed EDRs can help SMBs offset limited cybersecurity budgets, thwart cyberattacks, and save money for the long term.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy