The Key to Reducing Data Breach Impacts: Ponemon Institute’s 2017 Cost of Data Breach Study
August 2, 2017 By Christopher George cost of cybercrime, cost of data breach study
With the odds of experiencing a data breach as high as 1 in 4, how long would it take your business to identify and contain an incident?
The Ponemon Institute’s 2017 Cost of Data Breach Study showed a global 10% decrease over last year in the average total cost of a data breach. One of the top cost-reducing factors for three years running continues to be access to a rapid-response team through outsourced IT services, such as Protelligent®.
Here is a brief overview of Ponemon’s Global Study released in June:
- Study included 419 companies in 13 country or regional samples
- $3.62 million is the average total cost of a data breach
- 10% one-year decrease in average total cost
- $141 is the average cost per lost or stolen record
- 11.4% one-year decrease in the per record cost
- 27.7% likelihood of a recurring material data breach over the next two years
- 2.1% increase in the likelihood of a recurring material data breach
While there was a global decrease of 10% in the average cost from last year, the elements that impact the cost of a data breach are affected by the country and the IT initiatives in progress. In the United States, the financial impacts of data breaches are far more dramatic.
Here is a cost breakdown for the United States:
- 52% of U.S. data breaches were caused by malicious or criminal attacks
- $7.35 million total-average data breach cost
- 28,512 average records were compromised
- $244 average cost per compromised record
The study’s findings also included costs incurred after detection and response for things such as legal expenses, identity protection services and loss of revenue due to problems with customer retention and diminished business reputation. The top 4 industries affected by cyber attacks were health, financial, services and education.
The good news is businesses do not have to compromise by shifting their time and focus away from innovation and revenue-growth strategies to navigate the ever-changing complexities of cybersecurity, or face potential financial devastation. Having an incident response team that can respond immediately is the key to reducing the impact of a cyber attack by identifying and containing a breach, as well as remediation of the threat. Outsourced IT service providers have the expertise and knowledge necessary to deliver the highest level of rapid response and incident response services that can easily be incorporated into an organization’s existing security program, and many offer fully managed, end-to-end packages for even greater peace of mind.
Strong security initiatives and the experience to see them through quickly and effectively are the best way to ensure an organization’s financial health and credibility. Protelligent’s Premontion™ Security Suite provides a multi-layered approach with expert guidance in creating customized programs that leverage the latest global-threat intelligence, along with rapid response to advanced threats and remediation, as well as complete security program design, implementation and management.
Know your risk. Contact Protelligent today at 855-PRO-TELL to schedule a time for us to complete a review of your organization’s security needs.
If you would like to review the complete Ponemon 2017 Cost of Data Breach Study, you can do so here.
Ponemon Institute’s Cost of Data Breach 2017 Study
Recent Posts
Archives
- August 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (1)
- February 2020 (1)
- January 2020 (1)
- December 2019 (1)
- November 2019 (1)
- October 2019 (1)
- September 2019 (2)
- July 2019 (1)
- June 2019 (3)
- April 2019 (1)
- March 2019 (1)
- February 2019 (1)
- January 2019 (1)
- December 2018 (1)
- November 2018 (1)
- October 2018 (1)
- September 2018 (1)
- August 2018 (1)
- May 2018 (1)
- March 2018 (1)
- February 2018 (1)
- January 2018 (2)
- December 2017 (2)
- November 2017 (3)
- October 2017 (3)
- September 2017 (2)
- August 2017 (3)
- July 2017 (2)
- June 2017 (5)
- May 2017 (7)
- April 2017 (5)
- March 2017 (5)
- February 2017 (1)
- January 2017 (5)
- December 2016 (1)
- October 2016 (4)
- September 2016 (1)
- August 2016 (3)
- July 2016 (1)
- June 2016 (1)
- May 2016 (1)
- April 2016 (1)
- November 2014 (1)
- July 2014 (2)
- June 2014 (1)
- May 2014 (3)
- April 2014 (3)
- March 2014 (1)
- February 2014 (2)
- January 2014 (3)
- December 2013 (1)
- November 2013 (4)
Categories
- Community (19)
- Cloud (18)
- IT (16)
- cloud backup (16)
- cybersecurity (15)
- cloud backup data recovery (9)
- cloud computing (8)
- clouddr (8)
- it security (8)
- cloud storage (7)
- data security (7)
- AWS (6)
- Education (6)
- cloud services (6)
- Giving Back (3)
- cloud restoration (3)
- compliance (3)
- data (3)
- assessment (2)
- business (2)
- chief information officer (2)
- client satisfaction (2)
- cloud data recover (2)
- cloud dr (2)
- critical power exchange (2)
- cyber (2)
- cyber responsibility (2)
- data recover (2)
- datacenter (2)
- duo security (2)
- end-to-end encryption (2)
- hackers (2)
- holiday season (2)
- internet (2)
- storage (2)
- 2019 goals (1)
- Android (1)
- Arts (1)
- Business Continuity (1)
- CASBO (1)
- Cisco Cloud Web Security (1)
- Cisco Security Intelligence Operations (1)
- Custom Design (1)
- Graphics (1)
- Protelligent (1)
- Virus (1)
- account protection (1)
- advanced persistent threats (1)
- alien vault technology (1)
- alienvault technology (1)
- antivirus program (1)
- antivirus software (1)
- apis (1)
- apt (1)
- attachment (1)
- attack (1)
- automatic updates (1)
- awareness (1)
- backup (1)
- benefits (1)
- best practices (1)
- bot-driven attacks (1)
- bring your own device (1)
- bug (1)
- business growth (1)
- byod (1)
- california joint powers insurance authority (1)
- california jpia (1)
- check cashing (1)
- cisco (1)
- cjpia (1)
- client testimonial (1)
- cloud backup vs cloud storage (1)
- cloud computing services (1)
- cloud conversion (1)
- cloud migration (1)
- cloud recovery (1)
- community link consulting (1)
- compliance program (1)
- compliance regulations (1)
- computer science (1)
- computer security (1)
- computers (1)
- contain attacks (1)
- cost of cybercrime (1)
- cost of data breach study (1)
- critical power (1)
- critical power products & services (1)
- customer testimonial (1)
- customer testimonial video (1)
- cyber liability (1)
- cyber-threat (1)
- cybercrimes (1)
- cybercriminals (1)
- cybersecurity program (1)
- data access (1)
- data breach (1)
- data breach protection (1)
- data center (1)
- data encryption (1)