This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. If you do not agree to the use of cookies, you should not navigate this website. Visit our updated privacy and cookie policy to learn more.
THIS WEBSITE USES COOKIES.
If you do not agree to the use of cookies, you should not navigate this site. LEARN MORE
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. If you do not agree to the use of cookies, you should not navigate this website. Visit our updated privacy and cookie policy to learn more.
Subscribe
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2018
      • ASIS 2017
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
  • InfoCenters
    • Mitigating Risk in Real Time
    • Preventing Unauthorized Building Access
  • Contact
    • Editorial Guidelines
  • Advertise
Home » IBM Study: Cost of a Data Breach Reaches $350 Million
Cyber Security NewsSecurity Leadership and ManagementCyberHospitals & Medical CentersSecurity Newswire

IBM Study: Cost of a Data Breach Reaches $350 Million

cyber6-900px.jpg
July 25, 2018
KEYWORDS cyber security / data breach / healthcare cybersecurity / healthcare security
Reprints
No Comments

A study IBM Security and conducted by Ponemon Institute found that the average cost of a data breach globally is $3.86 million, a 6.4 percent increase from the 2017 report.

This year for the first time, the 2018 Cost of a Data Breach Study also calculated the costs associated with "mega breaches" ranging from 1 million to 50 million records lost, projecting that these breaches cost companies between $40 million and $350 million respectively.

"While highly publicized data breaches often report losses in the millions, these numbers are highly variable and often focused on a few specific costs which are easily quantified," said Wendi Whitmore, Global Lead for IBM X-Force Incident Response and Intelligence Services (IRIS). "The truth is there are many hidden expenses which must be taken into account, such as reputational damage, customer turnover and operational costs. Knowing where the costs lie, and how to reduce them, can help companies invest their resources more strategically and lower the huge financial risks at stake."

Hidden Figures – Calculating the Cost of a Mega Breach

In the past five years, the amount of mega breaches (breaches of more than 1 million records) has nearly doubled - from just nine mega breaches in 2013, to 16 mega breaches in 2017. Due to the small amount of mega breaches in the past, the study historically analyzed data breaches of around 2,500 to 100,000 lost records.

Based on analysis of 11 companies experiencing a mega breach over the past two years, this year's report uses statistical modelling to project the cost of breaches ranging from 1 million to 50 million compromised records. Key findings include:

  • Average cost of a data breach of 1 million compromised records is nearly $40 million
  • At 50 million records, estimated total cost of a breach is $350 million
  • The vast majority of these breaches (10 out of 11) stemmed from malicious and criminal attacks (as opposed to system glitches or human error)
  • The average time to detect and contain a mega breach was 365 days – almost 100 days longer than a smaller scale breach (266 days)

For mega breaches, the biggest expense category was costs associated with lost business, which was estimated at nearly $118 million for breaches of 50 million records – almost a third of the total cost of a breach this size. IBM analyzed the publicly reported costs of several high profile mega breaches, and found the reported numbers are often less than the average cost found in the study. This is likely due to publicly reported cost often being limited to direct costs, such as technology and services to recover from the breach, legal and regulatory fees, and reparations to customers.

What Impacts the Average Cost of a Data Breach?

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study.  The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study.

The study also examines factors which increase or decrease the cost of the breach, finding that costs are heavily impacted by the amount of time spent containing a data breach, as well as investments in technologies that speed response time.

  • The average time to identify a data breach in the study was 197 days, and the average time to contain a data breach once identified was 69 days.
  • Companies who contained a breach in less than 30 days saved over $1 million compared to those that took more than 30 days ($3.09 million vs. $4.25 million average total)

The amount of lost or stolen records also impacts the cost of a breach, costing $148 per lost or stolen record on average. The study examined several factors which increase or decrease this cost:

  • Having an incident response team was the top cost saving factor, reducing the cost by $14 per compromised record
  • The use of an AI platform for cybersecurity reduced the cost by $8 per lost or stolen record
  • Companies that indicated a "rush to notify" had a higher cost by $5 per lost or stolen record

This year for the first time, the report examined the effect of security automation tools which use artificial intelligence, machine learning, analytics and orchestration to augment or replace human intervention in the identification and containment of a breach. The analysis found that organizations that had extensively deployed automated security technologies saved over $1.5 million on the total cost of a breach ($2.88 million, compared to $4.43 million for those who had not deployed security automation.)

Regional and Industry Differences

The study also compared the cost of data breaches in different industries and regions, finding that data breaches are the costliest in the U.S. and the Middle East, and least costly in Brazil and India. 

  • U.S. companies experienced the highest average cost of a breach at $7.91 million, followed by the Middle East at $5.31 million.
  • Lowest total cost of a breach was $1.24 million in Brazil, followed by $1.77 million in India.

One major factor impacting the cost of a data breach in the U.S. was the reported cost of lost business, which was $4.2 million – more than the total average cost of a breach globally, and more than double the amount of "lost business costs" compared to any other region surveyed. One major factor impacting lost business costs is customer turnover in the aftermath of a breach; in fact a recent IBM / Harris poll report found that 75 percent of consumers in the U.S. say that they will not do business with companies that they do not trust to protect their data.

For the 8th year in a row, Healthcare organizations had the highest costs associated with data breaches – costing them $408 per lost or stolen record – nearly three times higher than the cross-industry average ($148).

"The goal of our research is to demonstrate the value of good data protection practices, and the factors that make a tangible difference in what a company pays to resolve a data breach," said Dr. Larry Ponemon, chairman and founder of Ponemon Institute. "While data breach costs have been rising steadily over the history of the study, we see positive signs of cost savings through the use of newer technologies as well as proper planning for incident response, which can significantly reduce these costs."

https://www.prnewswire.com/news-releases/ibm-study-hidden-costs-of-data-breaches-increase-expenses-for-businesses-300679124.html

Subscribe to Security Magazine

Related Articles

Study Reveals Average Cost of Data Breach Reaches Record Levels

Study Blasts Hospitals’ Security Practices

Healthcare Security Professionals Have Reduced Confidence in Assessing IT Risks

How Cybersecurity is a Serious Problem for Physicians

Related Products

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws 2E

The Database Hacker's Handbook: Defending Database Servers

Risk Analysis and the Security Survey, 4th Edition

Effective Security Management, 6th Edition

Related Events

The Opioid Epidemic and the Role of Enterprise Security

Workplace Violence Prevention Training Considerations for Healthcare Staff

You Can't Provide Good Building Security Without Good Cybersecurity

Industrial Control Systems Cyber-Security Conference

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

Close
Axis_analytics_900x500pxl_1809__auldhth2ic__
Sponsored By
Axis

Rethinking Security Surveillance with Intelligent Analytics

Video surveillance has long been deployed for safety and security purposes, but until recent years most installations were analog-based.

Popular Stories

SEC1018-talk-Feat-slide1_900px

A Call for the Thin Purple Line

drones

Smart Cities Have New Physical Threats: The Impact of Drones on Security and Public Safety

Video Cybersecurity

3 Steps to Improve Physical Security Systems' Cybersecurity

SEC1018-kidnap-Feat-slide1_900px

Our Executive is Missing: Kidnap and Ransom Basics for Security Professionals, Part 2

hacker

How to Work with Hackers to Make Your Company More Secure

Events

November 8, 2017

5 Ways Your Surveillance System Exposes Your Entire Organization to Risk (and what you can do about it)

Video surveillance systems are supposed to protect you from risk, not expose you to it. Unfortunately, DVRs, NVRs and SAN/NAS storage devices were never designed to handle the demands of modern video surveillance. Conventional technologies such as commodity servers and SAN/NAS storage leave you vulnerable to system downtime, permanent data loss, degraded image quality and out of control costs...
November 14, 2017

Becoming Proactive: Staying One Step Ahead Using Real-Time Information

After attending this webinar, attendees should be able to implement strategies to confront the changing, real-time security landscape, use social media information with precision to separate the signal from the noise and gain actionable insight, coordinate an effective response from alerts derived from social media and recognize how real-time information impacts ROI so you can be more agile and efficient.
View All Submit An Event

Poll

Recruiting Diverse Candidates

Do you actively seek to employ personnel of various races and backgrounds with your security team?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security-500

Security Magazine

SEC-Oct-Cover-2018-144px

2018 October

How is the FBI combatting terrorism today? Public-private partnerships play a huge role. Find out how from Michael McGarrity, Assistant Director for the FBI’s Counterterrorism Division, in the October edition of Security.

View More Subscribe
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2018. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing