Newsletter Content

The Average Cost Per Data Breach Hits $4 Million

b2ap3_thumbnail_where_does_your_money_go_400.jpgIf you ever question why your business needs to take advantage of network security and all of its components, consider this fact: the average cost of data breaches, worldwide, has increased by 29 percent since 2013. Believe it or not, the average cost per data breach is now an astounding $4 million! Now, we’ll ask you again; can your business afford to deal with a data breach or data loss disaster?

These numbers come from a study performed by the Poneman Institute and IBM Data, where 283 companies from all over the world were examined. The results may be quite shocking, especially for a small business that may never have experienced a data breach. Here are some of the highlights of the study:

  • The United States leads in terms of sheer overall cost of breaches by record value. The value per record is $223 on average. In total, the average cost of a data breach in the United States was roughly $7.01 million.
  • Particular industries, like healthcare, education, and finance, have a higher value per record at $355, $246, and $221 respectively.
  • 48 percent of all data breaches were the result of malicious intent, like hacking attacks and network infiltrations.
  • Encryption and other security protocol decrease the costs of data breaches by up to $16/record.
  • How quickly a company responded to the security breach had a positive impact on the overall cost of the breach.
  • There’s a 26 percent chance that an enterprise will be hit by one or more data breaches of over 10,000 records within the next two years.

Think about it; a data breach has far more repercussions than just the strain on your budget. It can lead to a damaged reputation, as well as lost clients and revenue. Can you afford to lose clients and revenue, and more importantly, can you recover data that’s lost or stolen due to your negligence? It’s estimated that businesses that fail to recover their data following a breach, will go out of business within one year following the incident.

Another point of interest is the cost associated with data breaches and loss associated with these three leading factors:

Data theft due to malicious intent
$236 per record. This is data that’s considered lost or stolen due to a hacking attack, like ransomware or a network virus. Really, the sky’s the limit for data theft in this category; there are so many threats out there that it’s basically impossible to specifically prepare for each one.

Data loss due to hardware failure
$213 per record. This is data that’s lost due to system malfunctions or hardware failure, like a server or workstation crashing unexpectedly. Unlike hacking attacks, this is something that you can prepare for, by taking proper care of your technology and keeping an eye out for warning signs.

Data loss due to human error
$197 per record. This is data that’s lost when your users do something on accident, like move a file or expose credentials to hackers, that puts your data in harm’s way. This is a bit more difficult to protect from, as you’re relying on your end users knowing what they’re doing. Be sure to educate them on best practices, and ensure that they only have access to data that they absolutely need for their position.

Is your business prepared to handle the many situations that could lead to expensive and costly data breaches? If you’re not sure, reach out to White Mountain IT Services. We offer several solutions that are designed to protect your business from all manners of threats, including proactive security solutions (firewall, antivirus, spam-blocking, content-filtering), backup and disaster recovery, and user access control. To get started, all you need to do is call 603-889-0800.

Related Articles

  • Could You Spot a Social Engineering Attack? As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its ...
  • Here’s How Companies Struggle with IT Security No business can be successful if it’s constantly suffering from data breaches. Therefore, you should take measures to mitigate the issues caused by these threats before they present themselves. Here are four of the biggest issues your business could face in the field of network security. Password...
  • Help! My Staff Hates My Company’s IT! Fellow business owners, do you ever feel like you need to walk around on eggshells when it comes time to implement a new process or policy with your employees? Does it seem like your staff fights back tooth and nail when there is any technology change or IT restriction? You aren’t alone. More oft...
  • A Brief Overview of Network Security The reliance the modern business has on its IT cannot be understated. As a result, to keep their computing network and infrastructure running efficiently, companies need to have a network and cybersecurity policy in place. With the development and use of organizational computer networks with multipl...
  • Could Your Router be Infected with Malware? Certain threats out there are dangerous enough to cause major entities to warn against them. In particular, a recent malware by the name of VPNFilter has been deemed dangerous and prevalent enough that the FBI has addressed it. Since the malware targets routers (probably not your first guess in term...
  • FREE Printout: Dos and Don’ts of IT Security The following guide is designed to be used by business owners and office managers as an educational resource to establish some basic IT security best practices in the workplace. Feel free to print it out and hand it out or post it in common areas. You work on important things. Let’s all work togeth...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.



White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064


 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions