Yes, claims that “nearly 60 percent of data breaches” share a common cause are broadly true - but often misleading without context. Most versions of this statistic point to human-related factors such as stolen credentials, phishing, weak passwords, or misconfigurations. However, the exact percentage varies by report, year, and definition of “breach.”

In short: a majority of data breaches are not caused by sophisticated hacking alone, but by preventable human or process failures. The “60 percent” figure is a simplification, not a universal law.

This question is trending globally for three main reasons:

  1. High-profile cyber incidents continue to affect governments, hospitals, and major companies, prompting people to look for patterns.
  2. Security reports and headlines frequently cite eye-catching statistics like “60% of breaches involve credentials” without explaining the nuance.
  3. Businesses and individuals are trying to understand whether breaches are inevitable or avoidable - and what actually puts them at risk.

As cyber threats become more visible, people want a simple explanation for a complex problem.

What’s Confirmed vs. What’s Unclear

well established

Across multiple industry reports over recent years:

  • A majority of breaches involve human elements, such as:

    • Phishing emails
    • Stolen or reused passwords
    • Social engineering
    • Misconfigured cloud storage
  • Attackers often do not “break in” technically; they log in using valid credentials.

unclear or variable

  • The exact percentage (whether 55%, 60%, or 65%) depends on:

    • How a “breach” is defined
    • Whether incidents are self-reported
    • The industry and region studied
  • Some reports group many causes together under “human error,” which inflates a single category.

What People Are Getting Wrong

Several common misunderstandings drive confusion:

  • “Hackers are always highly technical.” In reality, many breaches start with a convincing email or reused password.
  • “If 60% are human-caused, technology doesn’t matter.” False. Weak systems amplify human mistakes.
  • “This only affects large corporations.” Small businesses and individuals are often easier targets and less prepared.

The statistic is not about blame; it is about where defenses fail most often.

Real-World Impact (Everyday Scenarios)

Scenario 1: A small business An employee reuses a password from a personal site that later gets leaked. Attackers use it to access company email, reset cloud logins, and extract customer data. No malware, no advanced hacking - just credential reuse.

Scenario 2: An individual user A phishing message appears to come from a bank or delivery service. The user enters login details on a fake site. The account is compromised, and personal data is exposed.

In both cases, the breach fits into the category behind the “60 percent” claim.

Benefits, Risks & Limitations

statistic gets right

  • It highlights that many breaches are preventable.
  • It shifts focus toward:
    • User education
    • Strong authentication
    • Better access controls

falls short

  • It can oversimplify complex incidents.
  • It may understate:
    • Supply-chain attacks
    • Zero-day vulnerabilities
    • Insider threats with intent

The number is useful as a directional insight, not a precise measurement.

What to Watch Next

Going forward, expect:

  • More breaches involving identity and access abuse
  • Increased use of multi-factor authentication as a baseline
  • Greater scrutiny of how companies handle basic security hygiene

The trend is less about new attack methods and more about attackers exploiting familiar weaknesses at scale.

What You Can Ignore Safely

  • Claims that “almost all breaches are the same”
  • Headlines implying inevitability or helplessness
  • Viral posts treating the 60% figure as a fixed, universal truth

These add noise without improving understanding.

Is 60% an exact number? No. It is an approximation that varies by report and methodology.

Does this mean hacking skills are irrelevant? No. Skilled attackers still exist, but many breaches succeed without advanced techniques.

Can this risk be reduced? Yes. Strong passwords, password managers, multi-factor authentication, and basic training significantly reduce exposure.