Cybercrime Is Rising—But Most Risks Start With What You Already Have

Apr 7, 2026

When people talk about cybersecurity, the focus is usually on what’s coming next—new threats, new vulnerabilities, and the latest tools to defend against them.

But most of what’s happening right now isn’t new.

Cybercrime losses topped $20 billion last year, with more than a million complaints reported . The leading causes weren’t sophisticated zero-day exploits or highly technical attacks. They were things organizations already know about—phishing emails, stolen credentials, and social engineering.

That’s what makes this worth paying attention to.

The issue isn’t that attackers are getting dramatically more advanced. It’s that the same entry points continue to work.

It Usually Starts With Access

A lot of security conversations still revolve around keeping threats out. Firewalls, endpoint protection, monitoring—all of that matters.

But many incidents don’t start with a break-in. They start with access that already exists.

Once credentials are compromised, attackers don’t need to force their way through anything. They can move through systems as if they belong there, which makes detection more difficult and response slower.

That alone is a challenge, but it becomes a bigger problem when there are other gaps sitting quietly in the background.

The Stuff That Falls Off the Radar

Most organizations are pretty dialed in when equipment is active and in use. There are processes, controls, and visibility.

What tends to get less attention is everything that happens after that.

Devices get replaced and stacked in a closet. Hard drives are pulled and set aside. Equipment is shipped out with the assumption that it will be handled properly.

Over time, those small decisions add up. It becomes harder to track what’s still sitting on devices, where everything ended up, and whether anything was actually verified.

Nothing looks wrong on the surface, but the visibility just isn’t there anymore.

And when visibility drops, risk goes up.

Why This Still Gets Missed

It’s not usually a lack of effort. It’s a matter of priority.

Security investments are focused on active systems, current users, and immediate threats. End-of-life equipment doesn’t feel urgent, so it gets handled later or folded into existing workflows without much structure.

The problem is that data doesn’t follow the same timeline.

If it’s still on a device, it still exists. If that device is unaccounted for, so is the data.

That creates a situation where an organization can have strong security controls in place and still carry exposure tied to things they’re no longer actively thinking about.

This Isn’t Limited to Large Organizations

It’s easy to assume this is mostly a large enterprise issue, but that’s not what recent incidents show.

Attacks are hitting healthcare systems, local governments, and even infrastructure in this region, including a water treatment facility in North Dakota .

The common thread isn’t size or industry—it’s the same types of gaps showing up in different places.

Anywhere there’s a lack of visibility or follow-through, there’s an opportunity.

Looking at the Full Picture

Security has to go beyond what’s happening inside the network.

It includes understanding what data exists, where it lives, and what happens to it when systems and devices are no longer in use.

That doesn’t require a complicated overhaul. It comes down to being intentional about a part of the process that’s often treated as an afterthought.

  • Knowing what you have.
  • Knowing where it goes.
  • And having clear confirmation of how it was handled.

Without that, it’s easy to assume risk has been removed when it hasn’t.

A Different Way to Think About It

A lot of organizations are used to thinking about cybersecurity as a line of defense—something that keeps threats out.

It’s just as important to think about it as a lifecycle.

Every device that comes into your organization eventually leaves. The question is whether it leaves in a way that fully removes the risk, or whether it leaves behind unanswered questions.

Because in most cases, that’s where problems start—not with something new, but with something that was never fully closed out in the first place.

If This Sounds Familiar…

If you’re not sure what that looks like in your own environment, that’s usually where a quick conversation helps. Even just walking through how equipment is currently handled at the end of its life can surface gaps that aren’t obvious day to day.

SEAM works with organizations across the region to bring structure, tracking, and documentation into that process, so there’s clear visibility from pickup through final disposition.

If it’s something you’ve been meaning to take a closer look at, feel free to reach out. Our team is always happy to talk through it.

Levi Hentges is the Vice President / Development at SEAM. He helps clients build and manage their IT Asset Disposition (ITAD) programs to comply with legal, corporate and environmental requirements surrounding their technology devices; including asset recovery and resale, data destruction and secure electronics recycling.