The Costs Of A Data Breach

The cost of a data breach is not only the monetary value of an incident, but also the implications regarding loss of respect, negative PR and commercial credibility loss of the business. 
 
A severe data breach can be hugely detrimental to a company, particularly where stakeholders are concerned. The statistic, per IBM and the Ponemon Institute's annual Cost of a Data Breach report aggregates costs reported by 507 organisations, from 17 industries, from 16 regions worlwide.
 
Through interviews with 3,211 individuals, IBM and Ponemon collected data points regarding the number of customer records lost or stolen in breaches, how the company responded to the breach, and how their business fared after the breach. 
 
After analysing data breaches that happened across the world between April 2018 and April 2019, researchers at IBM reported that the average, total cost of a data breach to a business is a phenomenal $3.92 million.  They also found that companies in the US had the highest average cost of all countries, at around $8.19 million. 
 
To reach these figures, the researchers considered the monetary losses that were incurred in the four areas involved in a data breach:
 
  • Detection and escalation – this refers to any costs resulting from detecting and reporting a cybersecurity incident, such as auditing and investigation.
  • Notification – this aspect includes the financial cost of having to notify people of the incident, such as time spent making calls or writing letters to customers.
  • Response – this relates to the costs involved with the company’s response to the breach. This could be anything from legal advice to free gifts and discounts for customers.
  • Business losses – when a breach occurs, it will usually cause disruption and even downtime to a business. This area relates to the loss of revenue experienced as a result.
The Cost of Losing Credibility 
 
Even if  a business survives the financial difficulties that are associated with a data breach,there are further problems to contend with. A major cyber security incident, this can often deter new and even existing customers, who feel that their personal information is not in safe hands with your company. 
 
For small businesses in particular, this damaged reputation can be extremely hard, or even impossible to recover from.
 
Rebuilding a business reputation is vital in order to attract new customers, and keep existing clients on the books. After a breach, these stakeholders need to know that the business has taken the incident seriously, and is doing as much as possible to guarantee the protection of sensitive information going forwards.
 
Damaged  Stakeholder Relationships
 
As customers lose faith in a business after a data breach, so may other stakeholders, including investors and employees. The cost of these damaged relationships can also be profound, as these individuals, who are imperative to the business’ existence, may seek to part ways. 
 
A data breach can lead to discontent or even the departure of key employees, particularly if it was their personal information that was leaked. 
 
Such an incident will certainly lead to doubt and anxiety, causing employees to be distrustful of the employer. The publicity of such a data leak is also likely to put off potential new recruits in the future.
 
Where investors are concerned, many are likely to lose faith in the company simply because a breach has been allowed to happen. This is because a data breach demonstrates that the business is vulnerable, and ill-prepared for cyber-attacks.
 
The Real Cost Of A Data Breach
 
Taking into account the financial, credibility, and relationship implications of a data breach, it’s clear that the cost of this kind of incident can be severely damaging. For SMEs in particular, that may have a small budget and therefore less of a defence against cyber-crime, the costs can even lead to bankruptcy. Sadly, cyber criminals are all too aware of this, and are often known to target smaller businesses.
 
The true cost of a data breach will entirely depend on the nature of the attack, and the damage it has caused. Cyber criminals want different thing and while the overall goal is usually financial, this cost may not always be crippling. Many companies find that the damage a breach causes to their reputation is actually more detrimental than the immediate monetary costs involved.
 
The best defence against a data breach is to put in place adequate shields against cyber-crime, before one happens. This should include the use of quality security software, data encryption, and educating your staff about staying protected online.
 
IBM:        CPO Magazine:        Data Insider:   
 
You Might Also Read:
 
Cyber Attacks Knock 7.2% Off The Average Company Share Price:
 
« Women In Cyber Security Are Paid Much Less Than Men
#BLM Targeted By Racist Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Parasoft

Parasoft

Parasoft is an independent software testing and software quality assurance tool and solution vendor.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

Astra

Astra

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

SafeCharge

SafeCharge

SafeCharge is a global provider of technology-based multi-channel payments services and risk management solutions for demanding businesses.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

StrataCore

StrataCore

StrataCore is a single-source technology lifecycle advocate that works behind IT teams as a strategic partner to help them achieve peak enterprise outcomes.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

Avint

Avint

Avint delivers transformational cybersecurity solutions that help both commercial and government entities achieve mission success.

Gotham Security

Gotham Security

Gotham Security delivers high-quality penetration testing, malicious adversary simulation, compliance program development, and threat intelligence services.

Sweet Security

Sweet Security

Sweet Security delivers Runtime Attack Security for Cloud Workloads.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.