Alltech IT Solutions Blog

IBM Concludes Data Breaches Aren’t Getting Any Cheaper

IBM Concludes Data Breaches Aren’t Getting Any Cheaper

Working in conjunction with the Ponemon Institute, IBM Security completed a report tracking trends in 2018’s data breaches. As you might imagine, much of the data contained in this report could be seen as troubling to a business.

Let’s examine a few of the insights from the 2019 Cost of a Data Breach Report.

Costs Have Continued to Increase

There has been an increase in the average cost of a data breach of 12 percent over the past five years, with the cost per breached record recently increasing from $148 to $150. If that doesn’t seem too significant, keep in mind that the average data breach compromises 25,575 records, resulting in losses of almost 4 million dollars.

These costs are even higher in the United States, where each breached record costs about $242, boosting the average cost per breach to $8.19 million. This is even more pronounced in breaches to the healthcare industry, with an average cost of $6.45 million worldwide, and $15 million in the United States. Each breached healthcare record increased in cost by 5.15 percent within the span of a year, jumping from $408 to $429.

For reference, breached data from the financial industry costs an average of $210 per record… just under half of what each healthcare record costs.

The Impact is Long-Lasting

In this study, IBM also examined how a business is affected in the long term by a breach, although many impacts are felt in the relative short term. 67 percent of the costs associated with a data breach are felt within a year after the breach, while 22 percent occur in the second year and 11 after that point.

These costs are primarily due to the loss of business an organization experiences once the word gets out, with 36 percent of the total cost coming from the 3.9 percent loss of customers (a figure that is much higher in the healthcare industry).

For a business with fewer than 500 employees, a data breach can easily cost them 5 percent of their total annual revenue - leading to many failing within 6 months of a data breach.

Causes and Mitigation

Of all causes of data breaches, malicious attacks contributed to 51 percent, and tend to cost 25 percent more than breaches by other causes. Worse, malicious attacks are on the rise, increasing by 21 percent between 2014 and 2019. However, businesses who had prepared themselves by establishing an incident response team were able to significantly reduce their costs, averaging $1.23 million less. The faster a business was able to catch a breach, the more money it could save. The average discovery time was 279 days, but companies that solved the problem within 200 days saved $1.2 million on average.

Alltech IT Solutions can help you catch a data breach faster - and that’s if we don’t stop it outright. To learn more about our security services, reach out to us at 954-628-3770.

The Future of Windows 7
Intro to Your Tech: Dark Web
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, February 27 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Current Events Millennials Holiday Wireless Charging Mobile Device Management Cloud Disaster Recovery Google Licensing Virus Word Wi-Fi Access Control Document Management PowerPoint Comparison Battery Machine Learning Quick Tips Staffing Education News Backup and Disaster Recovery Unified Communications Digital Alerts Workers The Internet of Things Shadow IT Environment Hybrid Cloud Business Intelligence Social Network Remote Monitoring and Management Microsoft Office Eliminating Downtime HaaS Patch Management Saving Money G Suite Data Management SSD Bitcoin Remote Monitoring Authorization Mobile Device Shortcut Smart Technology SaaS Emoji Politics IT Services Printing Security Taskbar Telephone System Telephone Systems Project Management Websites Customer Service Telecommute Employee-Employer Relationship Tablet Internet Explorer Remote Support iPhone Managed IT Services Outsourced IT Botnet Mobility Benchmarks Biometrics Touchscreen Operating System Save Money Business Personal Information Backup Trends Mobile Insurance Users Spam Blocking Technology WannaCry Voice over Internet Protocol Best Practices Budget App Cybercrime Copy Sports GDPR Telephony Cables Windows 7 Hard Drive Hard Disk Drive Data Recovery instant Messaging Analysis Excel Profiles Networking Internet of Things Staff E-Commerce Scheduling Gmail Remote Control Regulation Antivirus Productivity Edge Help Desk Electronic Health Records Synergy Apps Instagram Settings Hiring/Firing IT budget Vendor Updates Entertainment Distribution Passwords Profitability Bandwidth Inventory Workplace Tips Worker User Security Wearables Managing Stress Automation Alert Scam Credit Cards Apple Managed IT Malware Windows Server 2008 R2 Managed Service Provider Tip of the Week Security Cameras Scalability Computers Sales User Tip Streaming Media RAM Information Technology Retail Cybersecurity Microsoft Collaboration Paperless Office Hacker Samsung Financial Television Plug-In Chrome OS Vendor Management Wireless Internet Voice over IP eWaste Managed Service WiFi Cloud Computing Router Big Data Applications Congratulations Chrome Facebook OneNote Video Games IT Management Training Email Management Tip of the week Upgrade Managed IT Services Troubleshooting Error Cortana Marketing Customer Relationship Management Email Business Continuity Business Computing Dongle Spotify Vulnerabilities VoIp Social Media Proactive IT Multi-Factor Security Computer Telecommuting Cabling Small Business Remote Computing Communication Printer Virtualization Search Work/Life Balance Wireless Compliance Webcam Lead Generation Smartphones Gaming Console Vulnerability Government HP Phishing CrashOverride Analytics Human Resources Avoiding Downtime Ransomware Medical IT Hosted Solutions Gadget BYOD Solid State Drive Access National Security User Tips Live Streaming Paste Leadership Laptop Server Reporting Hard Drives Spam How To Conferencing IT Windows 10 Firewall Internet Data Security Virtual Private Network Google Maps Data Protection Authentication Paper Computer Care Smartphone Amazon Virtual Assistant VPN Hosted Solution Online Shopping Risk Management Physical Security Safety Company Culture Tech Term Fleet Management Printers Office Tips Mobile Office Threat Emergency Gadgets IT Support Video Communications Humor File Sharing Ink Network Co-Managed IT Payment Cards Printer Server Microsoft Office 365 Autocorrect Website Encryption Payment IT Support Data loss Display DDoS Two-factor Authentication Files Batteries Office Yahoo VoIP Healthcare Scams Network Security Knowledge Managed Services Provider Specifications Downloads Certification Recycling Storage Mobile Devices Information Productivity Holidays Business Technology Server Management Data Backup Unified Threat Management Health Content Filtering Android Browser Data e-waste Cost Management Dark Web Hackers Cleaning A.I. Dark Data Twitter Memes Freedom of Information Technology Tips Automobile Law Enforcement Going Green Time Management Windows 10 BDR Phone System Movies Processor Recovery Office 365 Cryptocurrency Business Management Windows XP Mobile Security Net Neutrality WhatsApp Privacy Employer Employee Relationship Miscellaneous Managed IT Service eCommerce Processors Hacking Network Attached Storage Software disposal Employer-Employee Relationship Multi-Factor Authentication Threats Employees Artificial Intelligence Data Breach Efficiency Hosted Desktop Bring Your Own Device Value IaaS Microsoft Teams Tech Support Spyware File Management Tech Terms Thank You Blockchain Hardware Update Innovation HIPAA Money Outlook Windows Connectivity Travel Tactics Password Maintenance Google Drive Database