2020 Cost of a Data Breach Report

IBM Security
August 5, 2020

REPORT Details

IBM Security has released results of a global study examining the financial impact of data breaches, revealing that these incidents cost companies $3.86 million per breach on average, and that compromised employee accounts were the most expensive root cause. Based on in-depth analysis of data breaches experienced by over 500 organizations worldwide, 80% of these incidents resulted in the exposure of customers’ personally identifiable information (PII). Out of all types of data exposed in these breaches, customer PII was also the costliest to businesses.

As companies are increasingly accessing sensitive data via new remote work and cloud-based business operations, the report sheds light on the financial losses that organizations can suffer if this data is compromised. A separate IBM study found that over half of employees new to working from home due to the pandemic have not been provided with new guidelines on how to handle customer PII, despite the changing risk models associated with this shift.

Sponsored by IBM Security and conducted by the Ponemon Institute, the 2020 Cost of a Data Breach Report is based on in-depth interviews with more than 3,200 security professionals in organizations that suffered a data breach over the past year. Report analyzes data breaches occurring between August 2019 and April 2020. Limitations of the report’s methodology can be found in the report. Some of the top findings from this year’s report include:

  • Smart Tech Slashes Breach Costs in Half: Companies who had fully deployed security automation technologies (which leverage AI, analytics and automated orchestration to identify and respond to security events) experienced less than half the data breach costs compared to those who didn’t have these tools deployed – $2.45 million vs. $6.03 million on average.
  • Paying a Premium for Compromised Credentials: In incidents where attackers accessed corporate networks through the use of stolen or compromised credentials, businesses saw nearly $1 million higher data breach costs compared to the global average – reaching $4.77 million per data breach. Exploiting third-party vulnerabilities was the second costliest root cause of malicious breaches ($4.5 million) for this group.  
  • Mega Breach: The 2020 Cost of a Data Breach Report examines the cost of a mega breach, namely breaches involving the loss or theft of one million records or more, based on a separate analysis of a specific sample.
  • Costs Soar by the Millions: Breaches wherein over 50 million records were compromised saw costs jump to $392 million from $388 million the previous year. Breaches where 40 to 50 million records were exposed cost companies $364 million on average, a cost increase of $19 million compared to the 2019 report.
  • Nation State Attacks – The Most Damaging Breaches:  Data breaches believed to originate from nation state attacks were the costliest, compared to other threat actors examined in the report. State-sponsored attacks averaged $4.43 million in data breach costs, surpassing both financially motivated cybercriminals and hacktivists.

Publisher's website.

DOWNLOAD

Price: FREE

DOWNLOAD COUNT: 1,230

SHARE:
Share on linkedin
Share on facebook
Share on twitter
Share on email

DOWNLOAD

Price: FREE

COVER

PROVIDER

IBM Security
In today’s expanding threat landscape, you need more than just cyber security — you need cyber resiliency. IBM’s cyber resiliency experts and solutions can help your business thrive, not just survive.

TOPICS

more from this PUBLISHER

Cloud Threat Landscape Report 2020
Fri, Jun 12
Free Direct Download
Cloud Threat Landscape Report 2020
IBM Security
X-Force Threat Intelligence Index 2020
Tue, Feb 18
Free Direct Download
X-Force Threat Intelligence Index 2020
IBM Security
2019 Cost of a Data Breach Report
Mon, Oct 28
2019 Cost of a Data Breach Report
IBM Security

MORE FOR YOU

The Psychology of Fake News
Fri, Sep 18
Free Direct Download
The Psychology of Fake News
Routledge
The changing face of cybercrime
Fri, Sep 18
Free Direct Download
The changing face of cybercrime
LexisNexis
Building Australian adults’ confidence and resilience online
Fri, Sep 18
Free Direct Download
Building Australian adults’ confidence and resilience online
eSafety Commissioner
Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)
Thu, Sep 17
Free Direct Download
Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)
NIST

TRENDING NOW IN THE MARKETPLACE

The Psychology of Fake News
Fri, Sep 18
Free Direct Download
The Psychology of Fake News
Routledge
The changing face of cybercrime
Fri, Sep 18
Free Direct Download
The changing face of cybercrime
LexisNexis
Building Australian adults’ confidence and resilience online
Fri, Sep 18
Free Direct Download
Building Australian adults’ confidence and resilience online
eSafety Commissioner
Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)
Thu, Sep 17
Free Direct Download
Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)
NIST
Scroll to Top