The Costs Of A Data Breach

The cost of a data breach is not only the monetary value of an incident, but also the implications regarding loss of respect, negative PR and commercial credibility loss of the business. 
 
A severe data breach can be hugely detrimental to a company, particularly where stakeholders are concerned. The statistic, per IBM and the Ponemon Institute's annual Cost of a Data Breach report aggregates costs reported by 507 organisations, from 17 industries, from 16 regions worlwide.
 
Through interviews with 3,211 individuals, IBM and Ponemon collected data points regarding the number of customer records lost or stolen in breaches, how the company responded to the breach, and how their business fared after the breach. 
 
After analysing data breaches that happened across the world between April 2018 and April 2019, researchers at IBM reported that the average, total cost of a data breach to a business is a phenomenal $3.92 million.  They also found that companies in the US had the highest average cost of all countries, at around $8.19 million. 
 
To reach these figures, the researchers considered the monetary losses that were incurred in the four areas involved in a data breach:
 
  • Detection and escalation – this refers to any costs resulting from detecting and reporting a cybersecurity incident, such as auditing and investigation.
  • Notification – this aspect includes the financial cost of having to notify people of the incident, such as time spent making calls or writing letters to customers.
  • Response – this relates to the costs involved with the company’s response to the breach. This could be anything from legal advice to free gifts and discounts for customers.
  • Business losses – when a breach occurs, it will usually cause disruption and even downtime to a business. This area relates to the loss of revenue experienced as a result.
The Cost of Losing Credibility 
 
Even if  a business survives the financial difficulties that are associated with a data breach,there are further problems to contend with. A major cyber security incident, this can often deter new and even existing customers, who feel that their personal information is not in safe hands with your company. 
 
For small businesses in particular, this damaged reputation can be extremely hard, or even impossible to recover from.
 
Rebuilding a business reputation is vital in order to attract new customers, and keep existing clients on the books. After a breach, these stakeholders need to know that the business has taken the incident seriously, and is doing as much as possible to guarantee the protection of sensitive information going forwards.
 
Damaged  Stakeholder Relationships
 
As customers lose faith in a business after a data breach, so may other stakeholders, including investors and employees. The cost of these damaged relationships can also be profound, as these individuals, who are imperative to the business’ existence, may seek to part ways. 
 
A data breach can lead to discontent or even the departure of key employees, particularly if it was their personal information that was leaked. 
 
Such an incident will certainly lead to doubt and anxiety, causing employees to be distrustful of the employer. The publicity of such a data leak is also likely to put off potential new recruits in the future.
 
Where investors are concerned, many are likely to lose faith in the company simply because a breach has been allowed to happen. This is because a data breach demonstrates that the business is vulnerable, and ill-prepared for cyber-attacks.
 
The Real Cost Of A Data Breach
 
Taking into account the financial, credibility, and relationship implications of a data breach, it’s clear that the cost of this kind of incident can be severely damaging. For SMEs in particular, that may have a small budget and therefore less of a defence against cyber-crime, the costs can even lead to bankruptcy. Sadly, cyber criminals are all too aware of this, and are often known to target smaller businesses.
 
The true cost of a data breach will entirely depend on the nature of the attack, and the damage it has caused. Cyber criminals want different thing and while the overall goal is usually financial, this cost may not always be crippling. Many companies find that the damage a breach causes to their reputation is actually more detrimental than the immediate monetary costs involved.
 
The best defence against a data breach is to put in place adequate shields against cyber-crime, before one happens. This should include the use of quality security software, data encryption, and educating your staff about staying protected online.
 
IBM:        CPO Magazine:        Data Insider:   
 
You Might Also Read:
 
Cyber Attacks Knock 7.2% Off The Average Company Share Price:
 
« Women In Cyber Security Are Paid Much Less Than Men
#BLM Targeted By Racist Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

International Consortium of Minority Cybersecurity Professionals (ICMCP)

International Consortium of Minority Cybersecurity Professionals (ICMCP)

ICMCP was launched to help bridge the ‘great cyber divide’ that results from the underrepresentation of minorities and women in the field of cyber security.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

Netsafe

Netsafe

Netsafe is an independent, non-profit New Zealand organisation focused on online safety. We help people stay safe online by providing online safety education, advice and support.

Internet Solutions (IS)

Internet Solutions (IS)

Internet Solutions (IS) provide ICT solutions in areas including cloud computing, connectivity, data centres, commmunications and security.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

Naoris

Naoris

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

Cingo Solutions

Cingo Solutions

Cingo Solutions is a Managed Detection & Response company providing specialized data security services.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

BITSCore

BITSCore

BITSCore stands as a leading service in cyber-security, provenance and supply-chain tracking. We provide unique and powerful solutions utilising our patented private blockchain platform.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

PhishProtection

PhishProtection

We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

Normalyze

Normalyze

Normalyze are solving some of the most painful problems enterprise IT security teams face in the cloud and data security space. We help enterprises protect all the data they run in the cloud.