Alltech IT Solutions Blog

IBM Concludes Data Breaches Aren’t Getting Any Cheaper

IBM Concludes Data Breaches Aren’t Getting Any Cheaper

Working in conjunction with the Ponemon Institute, IBM Security completed a report tracking trends in 2018’s data breaches. As you might imagine, much of the data contained in this report could be seen as troubling to a business.

Let’s examine a few of the insights from the 2019 Cost of a Data Breach Report.

Costs Have Continued to Increase

There has been an increase in the average cost of a data breach of 12 percent over the past five years, with the cost per breached record recently increasing from $148 to $150. If that doesn’t seem too significant, keep in mind that the average data breach compromises 25,575 records, resulting in losses of almost 4 million dollars.

These costs are even higher in the United States, where each breached record costs about $242, boosting the average cost per breach to $8.19 million. This is even more pronounced in breaches to the healthcare industry, with an average cost of $6.45 million worldwide, and $15 million in the United States. Each breached healthcare record increased in cost by 5.15 percent within the span of a year, jumping from $408 to $429.

For reference, breached data from the financial industry costs an average of $210 per record… just under half of what each healthcare record costs.

The Impact is Long-Lasting

In this study, IBM also examined how a business is affected in the long term by a breach, although many impacts are felt in the relative short term. 67 percent of the costs associated with a data breach are felt within a year after the breach, while 22 percent occur in the second year and 11 after that point.

These costs are primarily due to the loss of business an organization experiences once the word gets out, with 36 percent of the total cost coming from the 3.9 percent loss of customers (a figure that is much higher in the healthcare industry).

For a business with fewer than 500 employees, a data breach can easily cost them 5 percent of their total annual revenue - leading to many failing within 6 months of a data breach.

Causes and Mitigation

Of all causes of data breaches, malicious attacks contributed to 51 percent, and tend to cost 25 percent more than breaches by other causes. Worse, malicious attacks are on the rise, increasing by 21 percent between 2014 and 2019. However, businesses who had prepared themselves by establishing an incident response team were able to significantly reduce their costs, averaging $1.23 million less. The faster a business was able to catch a breach, the more money it could save. The average discovery time was 279 days, but companies that solved the problem within 200 days saved $1.2 million on average.

Alltech IT Solutions can help you catch a data breach faster - and that’s if we don’t stop it outright. To learn more about our security services, reach out to us at 954-628-3770.

The Future of Windows 7
Intro to Your Tech: Dark Web


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, September 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

A.I. Project Management User Tips Website Alert Phishing Microsoft Office 365 Windows 7 SaaS Physical Security Edge Disaster Recovery Technology Tips Voice over IP Managed IT Services Internet Productivity e-waste Live Streaming Bring Your Own Device Telephony File Sharing Gmail Artificial Intelligence Microsoft Inventory Social Media Mobile Security Save Money Update E-Commerce Android Sports Upgrade Server Medical IT Printing Emoji Internet of Things Wireless Charging Data Protection Managing Stress Analytics Eliminating Downtime Tablet Information Technology Staffing WhatsApp CrashOverride Knowledge Connectivity VoIP HP Net Neutrality Workers Going Green Saving Money HaaS Windows Server 2008 R2 Network Security Business Management Google Maps Data Backup Remote Monitoring Tech Support Current Events Printer Leadership Innovation Display Hybrid Cloud Data loss Law Enforcement Wireless Communication Travel Movies Dark Web Hiring/Firing Freedom of Information Business Computing Holiday DDoS Vulnerability Network Paste WiFi The Internet of Things eWaste Cloud Computing Payment Cards Regulation Amazon Best Practices Lead Generation Computer Employee-Employer Relationship Data Management Patch Management Users Document Management Telephone System Printer Server Hard Drive Hard Disk Drive Antivirus Mobile Devices Proactive IT Windows 10 Training Recycling Touchscreen HIPAA Ransomware Data Breach Automobile Facebook Hacker Safety Network Attached Storage Content Filtering Spyware Telecommuting Database Networking Hosted Solution Television Unified Threat Management Instagram Efficiency WannaCry Storage Botnet Risk Management Downloads Apps Remote Support Millennials Scam Sales Company Culture Congratulations Solid State Drive Dongle Laptop Backup Wearables Gadget Data Recovery Unified Communications Batteries Managed IT App Comparison VoIp Two-factor Authentication Human Resources Password Miscellaneous BYOD Business Intelligence Marketing Electronic Health Records Value Virtualization User Tip Microsoft Teams Scheduling Data Security Spam Scalability Politics Updates Multi-Factor Security Threats Credit Cards Staff Licensing Government Managed IT Service Time Management Remote Monitoring and Management Customer Service Smartphone Tip of the Week Apple Threat Phone System Settings Malware Battery IT Support Collaboration Scams Managed Service Hacking Gaming Console User Security Samsung Maintenance Entertainment BDR Windows Virtual Assistant Chrome OS Compliance Mobile Device Blockchain Online Shopping Computers Conferencing Outsourced IT Reporting Workplace Tips Recovery Synergy Money Digital Virus Chrome Ink Privacy Spam Blocking Smartphones Word Software Smart Technology Webcam PowerPoint Spotify Telephone Systems Cables Windows XP Environment Passwords Avoiding Downtime Processors Paperless Office National Security G Suite Hackers IT Services Vendor Management News Yahoo Payment Access Google Technology Troubleshooting Computer Care Specifications Analysis Hosted Solutions Video Certification Work/Life Balance Bandwidth Automation IaaS Files Managed Service Provider Cortana Communications Websites Shortcut Paper Business Continuity Streaming Media Google Drive Machine Learning Employees Managed IT Services Health Cabling Voice over Internet Protocol Outlook Tech Term Education Gadgets Applications Authorization Twitter Tech Terms Small Business Cloud Office 365 Cost Management Data Thank You Tactics Windows 10 Browser instant Messaging IT budget VPN Big Data Cybersecurity Microsoft Office Emergency Error Business Wi-Fi Excel Bitcoin Office Tips IT Management Help Desk Financial Email Employer-Employee Relationship Taskbar Processor Remote Control Productivity How To Cryptocurrency Remote Computing Server Management Benchmarks Trends Copy SSD Printers Mobility Wireless Internet Telecommute Email Management Hardware Router Alerts Dark Data Security iPhone Business Technology Tip of the week Encryption Operating System Healthcare Autocorrect Retail Cybercrime Backup and Disaster Recovery Budget Quick Tips Profitability Office Cleaning Employer Employee Relationship GDPR Vulnerabilities Hard Drives Access Control Search disposal Personal Information Information Plug-In Worker Internet Explorer Security Cameras RAM IT Support Authentication OneNote Video Games Biometrics eCommerce Mobile Device Management