Global Cost of Data Breach Increased by 15 percent, According to Ponemon Institute
On average, companies around the globe are spending $3.5 million to respond to a data breach
TRAVERSE CITY, Mich., May 5, 2014 /PRNewswire/ — Today Ponemon Institute released its ninth annual Cost of Data Breach Study: Global Analysis, sponsored by IBM. According to the benchmark study of 314 companies spanning 10 countries, the average consolidated total cost of a data breach increased 15 percent in the last year to $3.5 million. The study also found that the cost incurred for each lost or stolen record containing sensitive and confidential information increased more than nine percent to a consolidated average of $145.
The research involved the collection of detailed information about the financial consequences of a data breach. For purposes of this research, a data breach occurs when sensitive, protected or confidential data is lost or stolen and put at risk. Ponemon Institute conducted 1,690 interviews with IT, compliance and information security practitioners representing 314 organizations in the following 10 countries: United States, United Kingdom, Germany, Australia, France, Brazil, Japan, Italy, India and, for the first time, the Arabian region (a consolidation of organizations in the United Arab Emirates and Saudi Arabia).
“The goal of this research is to not just help companies understand the types of data breaches that could impact their business, but also the potential costs and how best to allocate resources to the prevention, detection and resolution of such an incident,” said Dr. Larry Ponemon, Chairman and Founder of Ponemon Institute. This year’s Cost of Data Breach Study also provides guidance on the likelihood an organization will have a data breach.
The following are key takeaways:
-- The most costly breaches occurred in the U.S. and Germany at $201 and $195 per compromised record, respectively. The least expensive data breaches were in India and Brazil at $51 and $70, respectively. -- Root causes of data breaches differ among countries. Countries in the Arabian region and Germany had more data breaches caused by malicious or criminal attacks. India had the most data breaches caused by a system glitch or business process failure. Human error was most often the cause in the UK and Brazil. -- The most costly data breaches were those caused by malicious and criminal attacks. The U.S. and Germany paid the most at $246 and $215 per compromised record, respectively. These types of data breaches were least costly for companies in India and Brazil at $60 and $77 per compromised record, respectively. -- A strong security posture was critical to decreasing the cost of data breach. On average, companies that self-reported they had a strong security posture were able to reduce the cost by as much as $14 per record. -- The involvement of business continuity management reduced the cost of data breach by an average of almost $9 per record. -- The appointment of a Chief Information Security Officer (CISO) to lead the data breach incident response team reduced the cost of a breach by more than $6.
“Clearly, malicious insiders and criminal attacks are a growing concern for businesses, especially when we consider how persistent data has become in the age of cloud and mobility,” said Kris Lovejoy, General Manager, IBM Security Services Division. “A data breach can result in enormous damage to a business that goes way beyond the financials. At stake is customer loyalty and brand reputation.”
Consistent with previous Cost of Data Breach studies, most often the common cause of a data breach is a malicious insider or criminal attack. We asked companies what worries them most about security incidents. Following are some of the key findings:
-- The greatest threats to the companies in this study are malicious code and sustained probes. According to threats increased. -- Only 38 percent of companies have a security strategy to protect its IT infrastructure. A higher percentage (45 percent) has a strategy to protect their information assets. -- Malicious code and sustained probes have increased the most. Companies estimate that they will be dealing with an average of 17 malicious codes each month and 12 sustained probes each month. Unauthorized access incidents have mainly stayed the same and companies estimate they will be dealing with an average of 10 such incidents each month.
To download the complete report please use the following link:
Also released today is The Economic Consequences of an APT Attack study sponsored by Trusteer, an IBM company. This original research of 755 U.S. IT security practitioners supports the findings of The Cost of Data Breach study, wherein targeted criminal attacks are considered by a majority of respondents to be their organizations’ greatest threat. Another corroborating fact is that reputation damages represent the most costly component of criminal attacks, and especially those involving the theft or misuse of information assets.
About Ponemon Institute
Ponemon Institute conducts independent research and education that advances information security, data protection, privacy and responsible information management practices within businesses and governments throughout the world. Our mission is to conduct high quality, empirical studies on critical issues that affect the protection of information assets and IT infrastructure. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. www.ponemon.org.
About IBM Security
IBM’s security portfolio provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations. IBM monitors 15 billion security events per day in more than 130 countries and holds more than 3,000 security patents. For more information on IBM security, please visit: www.ibm.com/security.
 Local currencies were converted to U.S. dollars for comparison purposes.
This newly released report is part of a larger research study entitled, The State of Advanced Persistent Threats, published in December 2013.
SOURCE Ponemon Institute