FBI IC3 data, local trends, and the risk picture for Phoenix-area businesses

Unlock full access

2025 technology

This report is published annually by AEGITz and updated each year following release of the FBI’s Internet Crime Complaint Center (IC3) Annual Report. Data referenced reflects the most recently available IC3 reporting period.

This report is published annually by AEGITz and updated each year following release of the FBI’s Internet Crime Complaint Center (IC3) Annual Report. Data referenced reflects the most recently available IC3 reporting period.


Executive Summary

Arizona is not a cybercrime backwater. It is an active, high-loss target market that the FBI’s Internet Crime Complaint Center consistently places among the top 10–15 states nationally for both complaint volume and total financial losses.

The Phoenix-Mesa-Scottsdale metropolitan statistical area accounts for the majority of Arizona’s cybercrime exposure. As the 5th largest city in the United States and one of the fastest-growing business markets in the country, Phoenix presents a combination of high transaction volume, rapid business formation, and IT security infrastructure that has not kept pace with growth.

This report summarizes the current threat landscape, documents the attack categories where Arizona businesses are most vulnerable, and provides a prioritized risk framework for Phoenix-area business owners and IT decision-makers.


Section 1: Arizona in the FBI IC3 Data

National Context

The FBI’s IC3 Annual Report is the most comprehensive publicly available source of cybercrime data in the United States. It aggregates complaints filed directly with the IC3 and provides state-level breakdowns of complaint volume and dollar losses.

Key national data points from recent IC3 reporting:

•       Over 800,000 cybercrime complaints are filed with the IC3 annually, representing only a fraction of actual incidents (most go unreported).

•       Total losses reported to IC3 exceed $12 billion annually — a figure that has grown significantly year over year.

•       Business Email Compromise remains the highest-dollar crime category, accounting for billions in annual losses despite being less frequently reported than other crime types.

•       Ransomware incident count significantly understates actual ransomware losses because many victims pay without reporting.

Arizona’s Position

Arizona consistently appears in the top tier of states for both complaint volume and total losses. This reflects several structural characteristics of the Arizona economy:

Factor

Why It Creates Cyber Risk

High-growth business market

Rapid company formation outpaces security infrastructure build-out

Real estate and construction activity

High-volume wire transfers create BEC opportunity

Healthcare concentration

Maricopa County has one of the highest concentrations of medical practices per capita in the Southwest

Legal market growth

Phoenix ranks among the fastest-growing legal markets in the country; smaller firms dominate

Remote workforce density

Post-2020 relocation wave created large distributed workforce with inconsistent home office security

Financial services hub

Significant concentration of insurance, mortgage, and financial services processing

Retiree population

Maricopa County’s large retiree population is disproportionately targeted by tech support and investment fraud

 


Section 2: Top Threat Categories for Arizona Businesses

1. Business Email Compromise (BEC)

BEC is the highest-dollar cybercrime category in Arizona and nationally. Attackers compromise or spoof business email accounts to redirect wire transfers, divert payroll, or fraudulently authorize payments.

Arizona-specific exposure is elevated by:

•       Active real estate and construction markets with frequent, large wire transfers

•       High volume of legal settlements and trust account transactions

•       Rapid business growth creating new vendor relationships with limited verification history

Average BEC loss per incident nationally: $120,000+. Arizona’s transaction-heavy economy pushes incident losses higher.


Key prevention: Implement call-back verification for any change to payment instructions or banking information. No exceptions, regardless of urgency claimed by the requestor.

2. Ransomware

Arizona’s SMB-heavy business landscape makes it a prime ransomware market. Smaller businesses lack the security infrastructure of enterprise targets but often have sufficient revenue to make ransom demands financially rational.

Healthcare and legal sectors are disproportionately targeted due to the sensitivity of their data and the leverage it creates in ransom negotiations. Maricopa County’s concentration of medical practices, legal firms, and professional services creates a target-dense environment.

Average recovery cost for a small business ransomware incident: $500,000–$1,000,000 when all costs are included (ransom, forensics, legal, notification, downtime, reputational damage).


Key prevention: Immutable off-site backups, MFA on all accounts, EDR on all endpoints. These three controls break the most common ransomware attack chains.

3. Tech Support Fraud

Arizona’s large retiree population in the greater Phoenix area creates an unusually active tech support fraud market. These scams target both individuals and small businesses, often using pop-up warnings or phone calls claiming to be from Microsoft, Apple, or antivirus vendors.

For businesses, the risk is compounded when employees — particularly those in non-technical roles — engage with fake tech support callers who request remote access to business systems. Remote access granted in this context can lead to credential theft, malware installation, and data exfiltration.


Key prevention: Security awareness training that specifically covers tech support fraud scenarios. Clear policy: no external party is granted remote access to any business system without IT approval.

4. Investment and Cryptocurrency Fraud

Arizona ranks among the top states for investment fraud losses, a category that includes pig butchering scams (long-con cryptocurrency investment fraud), fake business investment opportunities, and fraudulent wire transfer solicitations disguised as investment vehicles.

The business risk: executives and business owners are disproportionately targeted for high-value investment fraud. These schemes often begin with LinkedIn outreach or conference connections and escalate over weeks or months.

5. Data Breaches and Credential Theft

Arizona’s rapid population growth and high volume of online account creation creates fertile ground for credential stuffing and account takeover attacks. Breached credentials from other services are systematically tested against business applications, email accounts, and financial systems.

The prevalence of password reuse in the SMB market — where the same credentials are used across personal and business accounts — means that breaches from consumer services regularly translate into business account compromises.


Key prevention: Password manager deployment across the organization. MFA on all business accounts. Monitoring for compromised credentials through dark web scanning.


Section 3: Industry-Specific Risk in the Phoenix Market

Industry

Primary Threat

Arizona-Specific Factors

Risk Level

Healthcare / Medical Practices

Ransomware, HIPAA breach

Maricopa County has >3,000 medical practices; most are SMBs with limited IT

CRITICAL

Legal

Ransomware, BEC, privilege breach

Fastest-growing legal market in AZ; dominated by small/mid firms with minimal IT

CRITICAL

Real Estate / Title

BEC / wire fraud

High transaction volume; frequent large wire transfers; multiple parties

CRITICAL

Construction / GC

BEC, ransomware, mobile device

High-value project payments; mobile-first workforce; subcontractor risk

HIGH

Financial Services

BEC, credential theft

Insurance, mortgage, and lending concentration in Phoenix metro

HIGH

Professional Services

Ransomware, data theft

Accounting, consulting, marketing; high client data density

HIGH

Retail / Hospitality

POS malware, credential theft

High card transaction volume; seasonal staffing creates access control gaps

MEDIUM

Manufacturing / Distribution

Ransomware, industrial IoT

Growing manufacturing sector in East Valley and North Phoenix

MEDIUM

 


Section 4: Prioritized Risk Framework

Not every control can be implemented simultaneously. The following framework prioritizes investments by their impact on the most active threat vectors in the Arizona market.

  TIER 1: IMMEDIATE PRIORITY (ADDRESS FIRST) 

□      ☐ Multi-factor authentication on all email, VPN, and remote access — blocks BEC and credential-based attacks

□      ☐ Immutable off-site backup with tested restoration — eliminates ransomware leverage

□      ☐ Security awareness training with BEC and phishing focus — targets Arizona’s #1 dollar-loss category

□      ☐ MFA on all financial systems and banking portals

  TIER 2: NEAR-TERM PRIORITY (ADDRESS WITHIN 90 DAYS) 

□      ☐ Endpoint detection and response (EDR) on all devices

□      ☐ Email filtering with advanced phishing protection

□      ☐ Dark web credential monitoring

□      ☐ Written incident response plan with tested procedures

□      ☐ Cyber insurance policy review (or initial procurement)

  TIER 3: ONGOING SECURITY PROGRAM 

□      ☐ Quarterly phishing simulations

□      ☐ Annual third-party security assessment

□      ☐ Vendor risk reviews

□      ☐ Patch management program with documented SLAs

□      ☐ Annual cyber insurance questionnaire verification

 


AEGITz publishes this report annually. To receive the next edition automatically, subscribe at aegitz.com. For a personalized risk assessment based on your specific industry and size, contact us for a SCOUTz assessment.

Previous

Next Article

More Articles

Written by

Sawyer Mahony

Mar 12, 2026

The AI Productivity Gain Is Real. So Is the Risk. Here’s How to Get Both.

A report on the debate about AI in business, the risk vs the gain.

AEGITz Logo

Written by

Sawyer Mahony

Mar 12, 2026

The AI Productivity Gain Is Real. So Is the Risk. Here’s How to Get Both.

A report on the debate about AI in business, the risk vs the gain.

AEGITz Logo

Written by

Steve Copeland

Mar 8, 2026

Cyber Insurance Readiness Checklist for Arizona Businesses

What underwriters require — and how to document it before your next renewal

Cyber Insurance

Written by

Steve Copeland

Mar 8, 2026

Cyber Insurance Readiness Checklist for Arizona Businesses

What underwriters require — and how to document it before your next renewal

Cyber Insurance

Written by

Wyatt Mahony

Mar 8, 2026

The Arizona Law Firm Cybersecurity & Ethics Compliance Guide

ABA obligations, State Bar requirements, and the technical controls that satisfy them

 Cybersecurity & Ethics

Written by

Wyatt Mahony

Mar 8, 2026

The Arizona Law Firm Cybersecurity & Ethics Compliance Guide

ABA obligations, State Bar requirements, and the technical controls that satisfy them

 Cybersecurity & Ethics

Written by

Wyatt Mahony

Mar 8, 2026

Incident Response Template Pack

Print this. Fill it in before you need it. Keep a copy off-site.

cyber security technology network

Written by

Wyatt Mahony

Mar 8, 2026

Incident Response Template Pack

Print this. Fill it in before you need it. Keep a copy off-site.

cyber security technology network