Cyber Attacks Knock 7.2% Off The Average Company Share Price

Data breaches can cause devastating financial losses and affect an organisation’s reputation for years. From lost business to regulatory fines and remediation costs, data breaches have far reaching consequences. 

IBM Security has calculated that a data breach could wipe as much as 7.2% off a company’s share price. It’s the equivalent of up to $8.8 million in cash terms for UK companies listed on the FTSE 100, or up to $32.3 million for listed US companies on the NASDAQ index.

These figures demonstrated the importance effectively training staff with cyber security training, as most attacks come through phishing emails sent to employees and management.  When an attack has happened ensuring you find the data breaches quickly. On average it takes tech companies 187 days to identify a breach and 59 days to contain it. However, in other sectors that number rises to 246 days to identify and contain.

Listed companies in the US and UK could face a bill of $42.9 billion. This equates to $174.4 million per day, or $5.3 billion per month. These figures do not account for reputational impact, loss of customers or GDPR penalties, so could even be even higher. scandal, including subsequent reputational impact, the value of the company

For example, if Amazon experienced a breach equivalent to the 2018 Facebook Cambridge Analytica breach, its value would drop by a predicted $167.9 billion. In its 2019 annual Cost of a Data Breach report, IBM made similar findings, putting the cost per breach at US$3 million per organisation.

Globally, IBM figures show that the hardest hit sector was healthcare, which faced an average bill of $6.45 million per breach, while the US is the most expensive country in which to suffer a breach, with the average cost there rising to $8.19 million per organisation.

Taking a global perspective, IBM’s report further stated that the average total cost of a breach in the US has increased 130% in 14 years, from $3.54 million in 2006 to $8.19 million in 2019. Consequences of a data breach can be particularly acute for small and midsize businesses. Companies with less than 500 employees often suffered losses of more than $2.5 million on average, a potentially crippling amount for small businesses, which typically earn $50 million or less in annual revenue.

IBM:         Data-Economy:         Data Breach Calculator

You Might Also Read: 

Cybercrime’s Deadly Impact On Business:
 

 

 

« Cyber Security At Schiphol Airport Is Ineffective
The Victims Of Cybercrime In Britain »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality ISAC operates as a central hub for sharing sector-specific cyber security information and intelligence.

CYBERSEC Forum

CYBERSEC Forum

CYBERSEC Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity.

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

IAC

IAC

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

DarkLight

DarkLight

DarkLight is a cybersecurity platform that mimics human thinking at scale to build resiliency to Advanced Persistent Threats.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

Spamhaus

Spamhaus

Spamhaus is the world leader in supplying realtime highly accurate threat intelligence to the Internet's major networks.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

eCloudvalley Digital Technology

eCloudvalley Digital Technology

eCloudvalley Digital Technology is a born-in-the-cloud partner focused entirely on AWS services across APAC region.

Cloudsec Asia

Cloudsec Asia

Cloudsec Asia is Thailand's top-ranked cybersecurity consultant company. We offers security services to ensure that all your IT assets are reliable, accessible, and secure.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

Mobb

Mobb

Mobb's AI-powered technology automates vulnerability remediations to significantly reduce security backlogs and free developers to focus on innovation.