Advantage IT Management Blog

IBM Concludes Data Breaches Aren’t Getting Any Cheaper

IBM Concludes Data Breaches Aren’t Getting Any Cheaper

Working in conjunction with the Ponemon Institute, IBM Security completed a report tracking trends in 2018’s data breaches. As you might imagine, much of the data contained in this report could be seen as troubling to a business.

Let’s examine a few of the insights from the 2019 Cost of a Data Breach Report.

Costs Have Continued to Increase

There has been an increase in the average cost of a data breach of 12 percent over the past five years, with the cost per breached record recently increasing from $148 to $150. If that doesn’t seem too significant, keep in mind that the average data breach compromises 25,575 records, resulting in losses of almost 4 million dollars.

These costs are even higher in the United States, where each breached record costs about $242, boosting the average cost per breach to $8.19 million. This is even more pronounced in breaches to the healthcare industry, with an average cost of $6.45 million worldwide, and $15 million in the United States. Each breached healthcare record increased in cost by 5.15 percent within the span of a year, jumping from $408 to $429.

For reference, breached data from the financial industry costs an average of $210 per record… just under half of what each healthcare record costs.

The Impact is Long-Lasting

In this study, IBM also examined how a business is affected in the long term by a breach, although many impacts are felt in the relative short term. 67 percent of the costs associated with a data breach are felt within a year after the breach, while 22 percent occur in the second year and 11 after that point.

These costs are primarily due to the loss of business an organization experiences once the word gets out, with 36 percent of the total cost coming from the 3.9 percent loss of customers (a figure that is much higher in the healthcare industry).

For a business with fewer than 500 employees, a data breach can easily cost them 5 percent of their total annual revenue - leading to many failing within 6 months of a data breach.

Causes and Mitigation

Of all causes of data breaches, malicious attacks contributed to 51 percent, and tend to cost 25 percent more than breaches by other causes. Worse, malicious attacks are on the rise, increasing by 21 percent between 2014 and 2019. However, businesses who had prepared themselves by establishing an incident response team were able to significantly reduce their costs, averaging $1.23 million less. The faster a business was able to catch a breach, the more money it could save. The average discovery time was 279 days, but companies that solved the problem within 200 days saved $1.2 million on average.

Advantage IT Management can help you catch a data breach faster - and that’s if we don’t stop it outright. To learn more about our security services, reach out to us at 251-662-9770.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, September 17 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Productivity Hackers Malware User Tips Hardware Efficiency Google Computer Communication Microsoft Data communications Internet Smartphones Cybersecurity Tech Term Innovation Email Software Business Management Outsourced IT VoIP Business Backup Managed IT Services Ransomware Mobile Device IT Support Passwords Smartphone Android Windows 10 Small Business Hosted Solutions Users Apps Miscellaneous Mobile Devices Alert IT Services Gadgets Managed IT Services Social Media Network Browser Collaboration Windows Microsoft Office Workplace Tips Bandwidth Cloud Computing Data Backup Save Money Internet of Things Wi-Fi Applications Holiday Data Recovery Business Intelligence Employer-Employee Relationship Information Saving Money Business Continuity Gmail Access Control Data Management Office Managed Service Computers Upgrade Password Virtualization Blockchain Chrome Facebook Twitter IT Support Wireless Router Government Automation Excel Hosted Solution Office 365 Mobile Device Management Networking Marketing Phishing Analytics Physical Security Workers Value Battery Politics Laptop Quick Tips Telephony VoIP Cybercrime Company Culture Vulnerability Word Paperless Office Patch Management Law Enforcement Data Breach Settings BYOD Maintenance Medical IT G Suite Mobility Wireless Charging Cost Management Net Neutrality Data Protection Education Website Health Virus Productivity Disaster Recovery Processor Managed IT Service Apple Recovery Tech Terms Connectivity Update Dark Web HIPAA Spam Telephone Systems iPhone Scam Compliance RAM Tip of the week Remote Monitoring Smart Technology Operating System Remote Computing BDR Virtual Assistant Going Green Voice over Internet Protocol Healthcare Cortana Artificial Intelligence Retail How To Remote Monitoring and Management Server VPN Data Security App Hacking Disaster WiFi Hard Drive e-waste Electronic Health Records Spam Blocking Sales Machine Learning Movies SaaS Social Engineering Hard Drives Analysis Windows 7 IT Management PowerPoint Biometrics Profitability Recycling Amazon E-Commerce Edge Internet Explorer Antivirus Authentication OneNote Content Filtering Spotify Botnet Emergency Processors disposal Automobile GDPR Employees Email Management Tablet Telecommute Unified Communications Bring Your Own Device Training Social SSD The Internet of Things Time Management Copy File Sharing Eliminating Downtime Batteries Payment Lithium-ion battery News Big Data Threat Authorization Windows Server 2008 R2 Multi-Factor Security User Tip Display Voice over IP Dongle Phone System Licensing Sports Spyware Storage Streaming Media Solid State Drive Knowledge Data loss Hybrid Cloud Security Cameras Bitcoin Lead Generation Inventory Chrome OS Paste User Security Search Network Attached Storage Downloads Entertainment Printer Server Wireless Internet Uninterrupted Power Supply Windows XP Plug-In instant Messaging Telephone System Printing Taskbar Cabling Benchmarks eCommerce Wearables Travel Webcam HP Error Hard Disk Drive Tech Support Comparison Current Events Staff Cleaning Cables Payment Cards Mobile Security Worker Human Resources Business Technology Access Google Maps Server Management Trends Printers Microsoft Teams Help Desk Proactive IT DDoS Vulnerabilities Managed Service Provider Paper Information Technology Troubleshooting National Security Telecommuting Managed IT Risk Management Online Shopping Technology Tips Gadget Live Streaming Files Document Management Database Touchscreen Video Google Drive Specifications Websites Office Tips WannaCry Environment Printer Reporting eWaste Employee-Employer Relationship Best Practice Remote Control Work/Life Balance A.I. Personal Information Managing Stress Certification Backup and Disaster Recovery Distributed Denial of Service Cryptocurrency Remote Support Avoiding Downtime IT budget Ink Outlook Windows 10 Shortcut WhatsApp Digital Tactics Microsoft Office 365 Customer Service Two-factor Authentication Conferencing Updates Millennials Safety Employer Employee Relationship Vendor Management Video Games Television Freedom of Information IaaS Hiring/Firing Thank You CrashOverride Synergy Autocorrect HaaS Administrator Congratulations Staffing Emoji Money Scheduling Samsung Regulation Leadership Scalability Budget Unified Threat Management Trending Yahoo Internet Exlporer Dark Data Computer Care Instagram Credit Cards Chromecast Financial Wireless Technology Encryption Gaming Console

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Mia Taylor Tip of the Week: How to Handle a Paper Jam Without Freaking Out
13 September 2019
You have posted a fantastic blog! This is the best blog, most concise step by step guide. Toshiba te...
Galvin Caldwell How and Why Cyber Crime is so Effective
06 September 2019
Cyber crime is the crime has the well recognized worth all over the world due to the lack of the sec...
Abby Aspinall Ransomware Increasingly Targets Android Devices
27 August 2019
Ransom ware has some targets that were among the all android devices that were good to be read over ...
JozephChristopher Google Wants You to Tweet Emojis at Them. Here’s Why
22 August 2019
As per my research with a dissertation writing services company, Google was working on this from a l...
Chris Greenwalty Most Noteworthy Data Breaches in 2019
21 August 2019
Since there are many threats that we are listening about data breach. You need to figure out the bes...