The Most Expensive Data Breaches

A new study from Surfshark applies IBM's "Cost of a Data Breach" calculations to the largest data breaches in recent history in order to find the estimated cost of today's biggest data breaches.

What they found is that the Dark Web is currently the place to buy stolen data. When hackers lifted 162 million personal records from Dubsmash in 2019, the databases soon showed up for sale for $1,976 in Bitcoin. The most likely buyers were phishers and spammers.

But like many thefts, the resale value is only small  in comparison to the costs incurred by the victims. A hacker just needs to know your email address and that you’re a customer of, say, a bank or financial services to begin impersonating your identity.

  • The biggest data breach of the past two years was the Advanced Info Service (AIS) hack, which may have cost $58,103,238,250 ($58 billion) to resolve.
  • America’s biggest data breach of the 2020s so far was at ‘big data’ analysis firm BlueKai, where two billion records were exposed at a potential cost of $13.94bn.
  • The Microsoft leak in December 2019 may have cost as much as $1,742,500,000 to rectify.

According to IBM, businesses face four substantial bills in the aftermath of a data hack:

  • Detection and escalation: Including investigations and crisis management.
  • Notification: Communicating with customers, regulators, and lawyers.
  • Lost business: Downtime, dropped stock prices, lost customers, and damaged reputation.
  • Post-breach response: Restoring and improving security, legal expenses, fines, and compensation.

Surfshark

You Might Also Read: 

Cybercrime’s Deadly Impact On Business:

 

« UK Warns Of Russian Cyber Attacks
Digital Advertising Fraud Will Cost $68 Billion »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

Certification Europe

Certification Europe

Certification Europe is an accredited certification body which provides ISO management system certification including ISO 27001.

Allianz

Allianz

Allianz Cyber Protect is a comprehensive cyber insurance provided internationally and tailored to your company´s risk profile.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

National Accreditation Authority Hungary (NAH)

National Accreditation Authority Hungary (NAH)

NAH is the national accreditation body for Hungary. The directory of members provides details of organisations offering certification services for ISO 27001.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.

DerSecur

DerSecur

DerSecur has been engaged in advanced technology activities in the field of Application Security since 2011. We offer R&D technology solutions in the field of SAST, DAST and SCA analysis.