{"id":2778,"date":"2018-07-16T12:30:47","date_gmt":"2018-07-16T10:30:47","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/?p=2778"},"modified":"2023-09-06T12:52:14","modified_gmt":"2023-09-06T10:52:14","slug":"hidden-costs-make-data-breaches-really-costly","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/","title":{"rendered":"Hidden costs make data breaches really costly"},"content":{"rendered":"

In 2018, IBM and the Ponemon Institute have once again been investigating how costly data breaches can become for companies \u2013 and now, for the first time, they have also taken \u201cmega breaches\u201d into consideration.<\/p>\n

The average cost of a data breach amounts to 3.86 million US dollars this year according to a recent press release<\/a>, which represents a rise of 6.4 percent compared to the previous year. For the very first time, IBM and Ponemon now also attach a virtual price tag to \u201cmega breaches\u201d, which are defined as data losses of a magnitude of 1 to 50 million data sets. For each such case, the actual costs incurred were between 40 million and 350 million dollars, the statement goes on to say (the 40 million is based on real data breaches, whereas the 350 million is based on projections).<\/p>\n

IBM and Ponemon reveal that the number of \u201cmega breaches\u201d has just about doubled between since 2013, when nine were detected, to sixteen in 2017. Of the eleven cases in the past two years which were investigated in more depth, the vast majority \u2013 ten out of eleven \u2013 were caused by malicious and criminal attacks (as opposed to system failures or human error). On average, almost 365 days passed before a \u201cmega breach\u201d was detected, almost a hundred more than with smaller breaches (266 days).<\/p>\n

The largest single cost factor in \u201cmega breaches\u201d was lost business, valued by IBM as costing 118 million dollars for every 50 million lost data sets. For cases which were made public, the declared damage was mostly significantly lower \u2013 presumably mostly because such reports are usually confined to direct costs and fail to take into account \u201csofter\u201d factors, which are more troublesome to quantify.<\/p>\n

\u201cThe truth is there are many hidden expenses which must be taken into account, such as reputational damage, customer turnover, and operational costs,\u201d Wendi Whitmore, Global Lead for IBM X-Force Incident Response and Intelligence Services (IRIS), is quoted as saying. \u201cKnowing where the costs lie, and how to reduce them, can help companies invest their resources more strategically and lower the huge financial risks at stake.\u201d<\/p>\n

From a regional perspective, the study reveals that data losses are most expensive in the USA and in the Middle East, while they are \u201ccheapest\u201d in Brazil and India. Concerning the sectors of impacted companies, healthcare heads up the field for the eighth year in a row, with each lost or stolen data set costing 408 dollars, almost three times as much as the average across all sectors (148 dollars).<\/p>\n

The entire 47-page study report can be downloaded from the IBM website<\/a> upon registration.<\/p>\n","protected":false},"excerpt":{"rendered":"

In 2018, IBM and the Ponemon Institute have once again been investigating how costly data breaches can become for companies \u2013 and now, for the first time, they have also taken \u201cmega breaches\u201d into consideration.<\/p>\n","protected":false},"author":14,"featured_media":2819,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_s2mail":"yes","footnotes":""},"categories":[8,15],"tags":[1119,1120,102],"acf":[],"yoast_head":"\nHidden costs make data breaches really costly - Retarus Corporate Blog - EN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hidden costs make data breaches really costly\" \/>\n<meta property=\"og:description\" content=\"In 2018, IBM and the Ponemon Institute have once again been investigating how costly data breaches can become for companies \u2013 and now, for the first time, they have also taken \u201cmega breaches\u201d into consideration.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/\" \/>\n<meta property=\"og:site_name\" content=\"Retarus Corporate Blog - EN\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-16T10:30:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-06T10:52:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2018\/07\/pepi-stojanovski-509192-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thomas Cloer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thomas Cloer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/\",\"name\":\"Hidden costs make data breaches really costly - Retarus Corporate Blog - EN\",\"isPartOf\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2018\/07\/pepi-stojanovski-509192-unsplash.jpg\",\"datePublished\":\"2018-07-16T10:30:47+00:00\",\"dateModified\":\"2023-09-06T10:52:14+00:00\",\"author\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/7f8954d8bf84d75cf384942c5f6cf2e5\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/#primaryimage\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2018\/07\/pepi-stojanovski-509192-unsplash.jpg\",\"contentUrl\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2018\/07\/pepi-stojanovski-509192-unsplash.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.retarus.com\/blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hidden costs make data breaches really costly\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#website\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/\",\"name\":\"Retarus Corporate Blog - EN\",\"description\":\"Always up to date\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.retarus.com\/blog\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/7f8954d8bf84d75cf384942c5f6cf2e5\",\"name\":\"Thomas Cloer\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/author\/thomasc\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hidden costs make data breaches really costly - Retarus Corporate Blog - EN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/","og_locale":"en_US","og_type":"article","og_title":"Hidden costs make data breaches really costly","og_description":"In 2018, IBM and the Ponemon Institute have once again been investigating how costly data breaches can become for companies \u2013 and now, for the first time, they have also taken \u201cmega breaches\u201d into consideration.","og_url":"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/","og_site_name":"Retarus Corporate Blog - EN","article_published_time":"2018-07-16T10:30:47+00:00","article_modified_time":"2023-09-06T10:52:14+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2018\/07\/pepi-stojanovski-509192-unsplash.jpg","type":"image\/jpeg"}],"author":"Thomas Cloer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thomas Cloer","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/","url":"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/","name":"Hidden costs make data breaches really costly - Retarus Corporate Blog - EN","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/#primaryimage"},"image":{"@id":"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2018\/07\/pepi-stojanovski-509192-unsplash.jpg","datePublished":"2018-07-16T10:30:47+00:00","dateModified":"2023-09-06T10:52:14+00:00","author":{"@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/7f8954d8bf84d75cf384942c5f6cf2e5"},"breadcrumb":{"@id":"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/#primaryimage","url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2018\/07\/pepi-stojanovski-509192-unsplash.jpg","contentUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2018\/07\/pepi-stojanovski-509192-unsplash.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retarus.com\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Hidden costs make data breaches really costly"}]},{"@type":"WebSite","@id":"https:\/\/www.retarus.com\/blog\/en\/#website","url":"https:\/\/www.retarus.com\/blog\/en\/","name":"Retarus Corporate Blog - EN","description":"Always up to date","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retarus.com\/blog\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/7f8954d8bf84d75cf384942c5f6cf2e5","name":"Thomas Cloer","url":"https:\/\/www.retarus.com\/blog\/en\/author\/thomasc\/"}]}},"_links":{"self":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/2778"}],"collection":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=2778"}],"version-history":[{"count":7,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/2778\/revisions"}],"predecessor-version":[{"id":9111,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/2778\/revisions\/9111"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/media\/2819"}],"wp:attachment":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=2778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=2778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=2778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}