Cybercrime is no longer an abstract problem that happens to “other people” in far-off offices. It’s happening right here, right now, in Nevada workplaces, on government computers, inside school networks, and across every industry from hospitality to healthcare. The numbers are staggering, the real-world consequences are personal, and the threat landscape is shifting faster than most workers realize.
For Nevada employees, the stakes got alarmingly real in 2025 when a ransomware attack crippled dozens of state agencies. But that was just one headline in a much longer and more unsettling story. Let’s dive in.
The Scale of the Problem: A Nation Under Digital Siege

Before we zoom into Nevada specifically, it’s worth understanding the size of the problem at the national level. In 2023, the FBI’s Internet Crime Complaint Center received a record number of complaints from the American public: 880,418 complaints with potential losses exceeding $12.5 billion, which is nearly a 10% increase in complaints and a 22% increase in losses compared to 2022. Let that sink in. That’s not a projection or a worst-case estimate. That’s confirmed, reported losses.
The situation didn’t improve heading into 2024. The FBI’s Internet Crime Complaint Center’s latest annual report detailed reported losses exceeding $16 billion, a 33% increase in losses from 2023, combining information from 859,532 complaints of suspected internet crime. We’re talking about a financial hit that dwarfs many natural disasters. And honestly, these are still conservative figures, since many cybercrime victims never report what happened to them.
Phishing: The Oldest Trick That Still Works

Here’s something that should genuinely surprise you: phishing, which is basically a fraudulent email or message designed to trick you into giving away credentials or clicking a malicious link, remains the single most reported cybercrime in the entire country. The most frequently reported crime in 2023 was phishing schemes, which use unsolicited email, text messages, and telephone calls purportedly from a legitimate company to request personal, financial, or login credentials. Over 298,000 complaints were filed about phishing schemes last year, which accounted for roughly a third of all complaints reported.
Think about it like fishing. The criminals cast thousands of lines all at once, and they only need one employee to bite. In 2023, attackers deceived their victims with a variety of tactics, like vishing, smishing, and pharming. Telephone-oriented attack delivery (TOAD), a form of phishing, was also popular, with malicious actors making 10 million TOAD attempts in 2023, according to Proofpoint research. These aren’t clumsy, obvious scams anymore. They’re precise, targeted, and terrifyingly convincing.
Business Email Compromise: The Scam Costing Billions

If phishing is the most common cybercrime, Business Email Compromise (BEC) is easily the most expensive one. In 2023, the FBI’s Internet Crime Complaint Center received 21,489 BEC complaints, resulting in adjusted losses exceeding $2.9 billion. This means a single successful BEC attack costs a business an average of $137,132, up from $125,612 the year before. Imagine walking into work one morning and discovering your company just wired a six-figure sum to a criminal who was impersonating your CEO via email.
BEC is the second-most prevalent cyberthreat tracked in the 2023 IC3 Report, with the actors behind these scams aiming to deceive users and businesses into making unauthorized fund transfers or divulging corporate information. Nevada workers in accounting, finance, and administrative roles are especially vulnerable because their jobs require them to process payments and respond to requests from management. BEC losses represent a 7% increase over 2022’s already staggering total of $2.7 billion, and a total of $14.3 billion since the IC3 began tracking this attack type in 2015.
Ransomware Hits Nevada Directly: A Wake-Up Call

Nevada workers got a painful, close-up view of ransomware in 2025. The ransomware attack, though discovered in August, occurred as early as May when a state employee mistakenly downloaded malicious software, and cost at least $1.5 million to recover, according to an after-action report the state released. The attack wasn’t some dramatic Hollywood-style hack. It started with one person downloading the wrong file, a mistake that any worker could make on any given Tuesday.
The 2025 ransomware attack disrupted Nevada state services across more than 60 agencies, including the DMV and Medicaid. Nevada refused to pay the ransom, recovering fully in 28 days with roughly 90% of data restored. The human cost was significant too. State workers were put on paid administrative leave, Nevada residents could not receive their driver’s licenses, and employers were unable to conduct background checks on new hires. This isn’t abstract. It disrupted thousands of lives.
Ransomware on the National Stage: A Growing Epidemic

Nevada’s experience isn’t unusual. Ransomware attacks have been rising sharply across the country, targeting hospitals, schools, utilities, and government systems. In 2023, ransomware incidents were again on the rise with over 2,825 complaints after a brief downturn in 2022, representing an 18% increase, with reported losses rising 74% from $34.3 million to $59.6 million. These numbers only reflect confirmed and reported cases.
Cybercriminals continue to adjust their tactics, and the FBI has observed emerging ransomware trends such as the deployment of multiple ransomware variants against the same victim and the use of data-destruction tactics to increase pressure on victims to negotiate. In other words, the attackers are getting smarter and more brutal. The critical infrastructure sectors most reported as impacted by ransomware were healthcare and public health, critical manufacturing, and government facilities. All three of these sectors have a massive presence in Nevada.
Credential Theft and Stolen Passwords: The Silent Entry Point

There’s a quiet epidemic of credential theft happening underneath all the more dramatic headlines. Stolen usernames and passwords are now a thriving underground economy. Data from 2025 shows that stolen credentials now drive roughly 22% of breaches. That’s more than one in five attacks starting with nothing more than a purchased list of login details from the dark web.
IBM’s research shows breaches using stolen credentials average $4.81 million each, and these breaches usually last the longest: IBM cites 292 days to identify and contain, the longest of any attack vector, leading to deeper data theft and higher cumulative losses. For workers, this means a compromised password that you’ve been reusing across multiple accounts could silently give criminals access to your employer’s systems for months before anyone notices. Breaches that used stolen or compromised credentials took the longest to resolve, at 88 days just for containment, as reported by IBM. It’s a slow bleed that organizations rarely notice until significant damage is done.
Remote Work: Expanding the Attack Surface

Remote and hybrid work transformed the way Nevadans do their jobs, and it also handed cybercriminals a whole new playground. Data breaches cost an average of $131,000 more when remote work was a factor in the breach, according to IBM, and roughly 9 in 10 cybersecurity professionals reported an increase in cyberattacks due to remote working. Home networks are simply not built to the security standards of corporate environments.
When you work from your living room, you’re often connected to the same router as your kids’ gaming devices, your smart TV, and your home assistant speaker. IBM reported that data breaches cost on average $131,000 more when remote work was a factor in the breach. Think of it like locking the vault at the bank but leaving the back door to the building wide open. Workers often don’t realize how vulnerable an unsecured home network makes their employer’s systems until it’s far too late.
The Data Breach Wave: Millions of Workers Exposed

Beyond targeted attacks on specific companies or agencies, large-scale data breaches expose millions of ordinary workers to ongoing risk. The number of data breaches in the U.S. has significantly increased, from a mere 447 in 2012 to more than 3,200 in 2023, according to Statista. That’s a breathtaking rise, and it means the personal and professional data of millions of workers is now circulating in criminal marketplaces.
IBM Security’s annual Cost of a Data Breach Report showed that the global average cost of a data breach reached $4.45 million in 2023, an all-time high for the report and a 15% increase over the last three years. The financial damage eventually filters down to employees and consumers in the form of disrupted services, job losses, and higher costs. The 2023 IBM Security Cost of a Data Breach Report shows that data breaches in the United States were the costliest at an average of $9.48 million, nearly double the global average. Nevada workers are operating in the most expensive breach environment in the world.
Nevada Fights Back: New Laws and a Security Operations Center

It’s not all doom and gloom. Nevada has started to respond seriously and at scale. In the wake of the major ransomware attack that struck Nevada’s state government in summer 2025, lawmakers took swift action and during a special legislative session in November 2025, they unanimously passed Assembly Bill 1, which Governor Joe Lombardo signed into law. This legislation formalizes a statewide Security Operations Center to provide centralized 24/7 monitoring, threat detection, and incident response for state agencies.
Assembly Bill 1 also outlined plans to create a Cybersecurity Talent Pipeline Program to train future cybersecurity workers in the state and build out the workforce to fight future attacks. This is genuinely promising. A trained workforce is one of the most powerful defenses any organization can build. Nevada’s 2025 statewide cybersecurity incident was the biggest in the state’s history and could have compromised data for millions of residents. Fortunately, the state said the issue was fully contained, though UNLV experts warned the next time could come with much more serious consequences, from altered voting data to mass credit card data theft. The message is clear: the work is far from over.
Conclusion: The Threat Is Real, and It’s Personal

aren’t hypothetical risks sitting in some distant server room. They are active, evolving, and deeply personal. A single careless click, a reused password, or a convincing fake email can set off a chain of events that costs your employer millions, disrupts government services for tens of thousands of people, and puts your own personal data on the dark web.
The good news is that awareness is genuinely one of the most effective defenses. Workers who understand how phishing works, why credential hygiene matters, and what ransomware looks like before they click that link are exponentially harder to compromise. I think the most underrated weapon in cybersecurity has always been a skeptical, well-informed employee.
Nevada has had its warning shots. The question now is whether individuals, employers, and agencies will treat cybersecurity as the daily discipline it needs to be, not just a policy buried in a staff handbook. What would you do if your workplace systems went dark tomorrow? That’s worth thinking about seriously.