Given the breadth and complexity of cybersecurity, compiling figures manually or allowing them to be produced in a fragmented way is not viable.