Updated · Jan 10, 2024
With a master's degree in telecommunications and over 15 years of working experience in telecommunic... | See full bio
Updated · Jan 02, 2024
With a master's degree in telecommunications and over 15 years of working experience in telecommunic... | See full bio
If I was asked to describe myself using just a few words, I’d go with digital marketing expert, ex... | See full bio
Cyber crime affects everyone, whether you run a large organization or you’re just interested in keeping personal information private. As these up-to-date data breach statistics, TechJury put together show, the issue of stolen and compromised records is becoming increasingly serious.
Attackers are getting savvier and the average cost of breaches is rising up. We also found that the increasing use of ‘transformative’ technologies like IoT and cloud computing seems to be making companies more vulnerable to data breaches.
Before we continue, what is online data breach in the first place? Online data breach refers to an incident where sensitive, proprietary, or confidential information is taken from a system without the knowledge of the system’s owner.
These statistics, of course, are not meant to scare you or discourage you from using the advanced systems that make our work so much more convenient and productive. Our hope is that a wholesome idea of the size of the problem, the key vulnerabilities, and the set of preventive and corrective measures can help you minimize the risks or effects of data breaches. Indeed, it should add to your cyber resilience and your enterprise’s capacity to maintain its core purpose and integrity in the face of digital threats.
Data breaches are a serious crime. You may not notice it at first, but it could cost you millions.
(Source: Security Intelligence)
That would approximate to more than $3 billion lost in the first half of 2018. Again, while the number of data breaches has come down marginally over the same period a year earlier, the average cost per incident has gone up by 1.5% compared to 2018. This is the actual cost businesses are paying to cyber criminals, and it is going up almost every year.
(Source: Forbes)
So, how many hacks happen in a day? That’s more than 20 on average in the first six months of 2019, causing more than a staggering 22.5 million records to be stolen every day!
(Source: Thales)
The extent of the problem becomes clear when you realize how many people have been hacked. In a comprehensive survey of organizations worldwide, 3 out of 5 say that they have experienced this issue at some point. Half of them have done so within the last year. The problem is graver in the US, where the corresponding figures are 65% and 36%.
(Source: European Data Protection Board)
There is a silver lining to this spurt in incidents, though. Since the General Data Protection Regulation (GDPR) took effect on May 25, 2018, there has been a marked improvement in voluntary reporting of data breaches in Europe. Pre-GDPR, only a few sectors like telecom and banking were obliged to report data breaches. The GDPR has also helped raise the public’s awareness of their rights under data protection law.
(Source: Gartner)
How much does cyber security cost? A whole lot, it seems. Worldwide spending on information security products and services is supposed to have been over $114 billion in 2018, an increase of 12.4% from 2017.
Persisting skills shortages and regulatory changes like the European Union’s (EU) GDPR are driving continued growth in the security services market. The top three drivers for security spending are (1) Security Risks; (2) Business Needs; and, (3) Industry Changes. Privacy concerns are also becoming a key factor for organizations.
(Source: IBM-Ponemon Institute)
Out of the four high-level components of data breach—detection and escalation; notification; ex-post response; lost business cost—data breach statistics indicate that companies attribute about 37.5% to lost business cost.
These include activities that attempt to minimize the abnormal loss of customers as a result of a data breach event as well as the cost to acquire new customers following the data breach disclosure. It also includes costs related to business disruption and revenue losses.
(Source: IBM-Ponemon Institute)
Data breaches are serious enough to cause a material disruption to the business processes for at least three-quarters of the companies surveyed. Not all of the cost suffered due to the disruption can be neatly translated into monetary figures.
(Source: IBM-Ponemon Institute)
Data breach trends show that these incidents also have a negative effect on reputation, brand, or marketplace image of companies. In the age of fast-traveling global news and extra-finicky customers, reputation management is a tough ask in normal conditions. Most companies can’t afford their reputation taking a beating because of data breaches. Ask Facebook, which saw a massive drop in share price after the Cambridge Analytica scandal came to public notice in early 2018.
(Source: IBM-Ponemon Institute)
That’s 197 days of the company’s processes partly or entirely busy dealing with the effects of the breach. In some cases, incident response can take up more than a year, especially when companies do not adopt basic tools like automation and encryption.
(Source: IBM-Ponemon Institute)
The time to identify and contain varies across industries. While entertainment, health care, and media take the highest time to respond on average as per data breach stats, research, energy, and financial services take the lowest.
(Source: IBM-Ponemon Institute)
Similarly, the average incident response time varies across geographic locations, too. Companies in the Middle East, Brazil, and Turkey seem to take the highest time to identify and contain data breaches, while USA, Canada, UK, South Africa, and Germany are the fastest. The average time in the Middle East is almost twice that of the average time in Germany.
(Source: IBM-Ponemon Institute)
Once an organization has identified and contained a data breach, there is time that goes into the recovery process as well. Security breach statistics indicate that having a specialized disaster recovery function or team in the organization can bring down the average recovery time by almost one half.
(Source: IBM-Ponemon Institute)
The likelihood of a data breach involving a minimum of 10,000 records has consistently risen over the last five years. The 32.3% figure for FY2018 is a slight increase from 31.6% for FY2017. Interestingly, the larger the data breach an organization suffers once, the less likely it is that it will have another breach in the next 24 months.
(Source: IBM-Ponemon Institute)
A theme common to many such surveys and studies is that cybercriminals are using the most modern tools to target the security systems of organizations, making it more difficult by the day to counter the attacks.
57% of professionals in the same survey also say that the time to resolve an incident has increased. Plus, the growing use of big data also increases the likelihood of big data security breaches.
(Source: Gemalto Breach Level Index)
Not all data breaches are equally severe though. Some of the biggest ones in recent times have been targeted at social media platforms, including the Cambridge Analytica-Facebook incident. After all, social media sites are the easiest resources for collecting information on millions of customers.
As we will see later, IT professionals feel that this personal user information is of prime interest to cyber criminals. A total of 4.5 billion records were compromized in H1 2018 alone.
(Source: Identity Theft Resource Center)
Facebook has been the undisputed leader when it comes to social media hack statistics. Among multiple incidents, including the Cambridge Analytica data misuse, one significant breach caused by a coding vulnerability allowed hackers to access tokens for 50 million accounts and view all information in users’ profiles.
Google+ was breached twice impacting 53 million users. Quora (impact on 100 million users) and MyFitnessPal (impact on 150 million users) were other well-known platforms breached in 2018.
(Source: Identity Theft Resource Center)
Cathay Pacific and Delta in travel, Hudson Bay (5 million shoppers’ payment card information exposed) and Chegg, the online textbook site (40 million users’ profile details exposed) in retail, and UnityPoint Health (health insurance information of 1.4 million patients exposed) in health care were some other notable entries in the list of recent data breaches.
(Source: Gemalto Breach Level Index)
Most sectors saw an increase in the number of incidents compared to the previous half–the exceptions were government, professional services, retail, and technology. Both retail and technology saw an increase in the number of records breached through fewer events.
Social media ranks top for number of records breached (76%) due to the high-profile customer data leaks at Facebook and Twitter, involving 2.2 billion and 336 million, respectively.
(Source: Gemalto Breach Level Index)
Security breach statistics show that the number of incidents has come down in the US, though, by 17% compared to H2 2017. With the implementation of the Notifiable Data Breaches law, the number of incidents in Australia increased dramatically from 18 to 308 as could be expected.
Europe saw 36% fewer incidents but a 28% increase in the number of records breached, indicating growing severity of attacks. The United Kingdom remains the most breached country in the region. In Asia, the highest number of notified attacks was in India (11).
(Source: Verizon, Privacy Rights Clearinghouse)
If you thought that cybercriminals target only huge companies like Facebook and Marriott, small business data breach statistics will surprise you. Small and medium-sized businesses are as much at risk as larger companies.
That's because small businesses are less likely to have the resources available to beef up their cybersecurity. So, many attackers might prefer making money from multiple small targets than a single big one.
According to Privacy Rights Clearinghouse, an advocacy group, more than 90% of the breaches they have tracked since 2005 have affected fewer than 100,000 customers in one go.
(Source: IBM-Ponemon Institute)
This means that despite tracking of cyberattacks by independent parties, there might be many incidents that just go unreported.
Organizations that do share data say that apart from fostering collaboration among peers and industry groups, sharing also has a direct bearing on improving the security posture of the organization. It also has to do with the effectiveness of their incident response plan as well as reducing the cost of detecting and preventing data breaches.
The key factors that prevent organizations from doing so include no perceived benefits, anti-competitive concerns, and risk of exposure of sensitive information.
Have you ever wondered how data breaches actually happen? It's not what you think.
(Source: Ernst & Young)
Malware comes a close second at 20%, followed by cyberattacks to disrupt (13%), to steal money (12%), and to steal IP (8%). Although there has been quite a lot of discussion about insider threats and state-sponsored attacks, the fear for internal attacks shows up as number eight on the list; espionage ranks bottom of the list.
(Source: Dark Reading, Cofense)
In the first half of 2018, some 6.4 billion of the emails sent every day were fake. According to internet security statistics from the email security firm Valimail, the US is the No. 1 source of fake email, sending some 120 million phony messages in the second quarter of 2018. According to Cofense, 91% of all cyberattacks start with a phishing email.
(Source: Check Point, Panda Security)
81% of heads of corporate IT security have detected an increase in the number of cases of attacks getting in through this channel.
One of the most common forms of phishing attacks is the BEC (Business Email Compromise) scam where cyberattackers pass themselves off as a client or supplier in order to get money. Around 60% of BEC scam emails do not contain a link, making it harder for cybersecurity systems to detect them.
(Source: Check Point)
According to data theft statistics, the average number of mobile malware attacks per organization was 54 between H2 2016 and H1 2017. Even though enterprise mobility management solutions were in place, 75% of the organizations in the studied sample had at least one jailbroken iOS device or rooted Android device connected to their corporate networks.
The average number of jailbroken devices was 35 per company. This is a concerning result obviously as jailbreaking strips away the built-in security provided by the iOS and Android operating systems, rendering the entire enterprise vulnerable to an easy attack.
(Source: Check Point)
Unlike ransomware, crypto mining offers cybercriminals a much stealthier style of attack that can remain on an organization’s servers for months without being detected.
During this period, its authors earn a steady stream of passive income. Check Point Research also found that over 20% of organizations are impacted by crypto jacking malware every week.
(Source: Verizon)
Ransomware is a low-risk, high-gain crime that, as recent cyber breach statistics show, is gaining popularity at a terrifying pace.
Cybercriminals are also growing bolder with the share of personal devices targeted with ransomware coming down. In addition, that of enterprise servers, for which much greater ransoms can be demanded, going up.
An easy way to stay protected from ransomware is by installing antivirus software on your computer.
(Source: Gemalto Breach Level Index)
This was a decrease of 7% from H2 2017. In terms of the number of compromised records, the share is higher at 73%.
Accidental loss accounted for over 879 million (26 percent) of the records lost this half, the second most popular cause of data breaches representing over one-third of incidents.
The number of records and incidents involved in malicious insider attacks fell by 60 percent this half compared to the same time period in 2017.
(Source: Gemalto Breach Level Index)
Identity theft has continued to be the leading type of data breach, at least since 2013. While the number of identity theft breaches decreased by 26% over the first half of 2017, the number of records stolen through these incidents increased by 757%, representing 83% of all records stolen.
Data breach statistics show a disturbing trend in the escalation of severity. Though overall incident numbers are on the decline H1 2017 vs. H1 2018 (171 for H1 2017 and 123 for H1 2018), the number of records breached increased H1 2017 vs. H1 2018 (2.7 million and 359 million) respectively.
(Source: Ernst & Young)
12% say it’s the companies’ financial information, while another 12% say their strategic plans are the top information cyber criminals are looking for. Other categories that rank slightly lower in terms of threat perception are R&D information, M&A information, and intellectual property.
(Source: IBM-Ponemon Institute)
Automation means codifying a set of manual disaster recovery steps via the creation of scripts that drive singular actions at component levels. Cybersecurity statistics show that the difference in the average cost of the data breach can be as much as 50% between companies that don’t and those that do deploy an automated disaster recovery process that provides resiliency orchestration.
(Source: IBM-Ponemon Institute)
Ponemon Institute studied companies from different parts of the world. It found that as many as 40% continued to use a completely manual data recovery process.
This is a definite improvement from the previous year, but, given the potential savings involved, remains a metric that organizations fare surprisingly poorly on.
(Source: IBM-Ponemon Institute)
Out of 22 factors that can either increase or decrease the cost of data breach, having an incident response team has been found to be the most beneficial, with a potential to lower the per capita data breach cost by $14.
Equally critical are the factors that can increase the per capita cost, which include third-party involvement (by $13.4), extensive cloud migration ($11.9), compliance failures ($11.9), and extensive use of mobile platforms and IoT devices.
(Source: Kaspersky)
Even though there is a wider acceptance of the risks of third party data breach, more than half of industrial organizations permit outsiders to access critical systems. It is important to note that organizations that allow third-party access like this are also 63% more likely to experience a security breach as compared to those that don’t allow such access.
(Source: Gemalto Breach Level Index)
Extensive use of encryption is one of the top factors that decrease the cost of a data breach, as it can render the stolen information useless. This wasn’t the case with pretty much all the data cyber criminals were able to lay their hands on in H1 2018. This figure was at an already low level of 2.5% in H1 2017, which makes a further drop of a percent-and-a-half even more concerning.
(Source: Thales)
These technologies include cloud computing, big data, IoT, containers or mobile environments, all of which create new attack surfaces and new risks for data. The idea is not to discourage companies from using these technologies but to ensure they are aware of the kinds of vulnerabilities these create and take adequate steps to safeguard their and their customers’ data.
(Source: Thales)
Encryption, as we have covered above, might not prevent data breaches, but it does ensure that the data stolen cannot be misused.
The Thales study also found that far too many companies globally have still not woken up to the value of data encryption, despite using new technologies that make data theft likelier.
The effects of how many data breaches could be rendered harmless if only companies opted for this one tool!
(Source: IBM-Ponemon Institute)
Lack of investment in AI and machine learning was ranked as the biggest barrier to cyber resilience, and investment in this area was ranked as the lowest priority for the next 12 months. Having insufficiently skilled personnel dedicated to cybersecurity was the second biggest barrier, with only 29% having the ideal staffing level.
(Source: Ernst & Young)
And many are worried that vital improvements are not yet under way. Data security statistics show that smaller companies are more likely to be lagging behind.
While 78% of larger organizations say their information security function is at least partially meeting their needs, that falls to just 65% among their smaller counterparts. This is in stark contrast to the proactive cybercriminals who continue to raise their game.
(Source: Thales)
This is above other reasons like staff, budget, and organizational buy-in. Many organizations work in a multi-cloud environment, which greatly compounds the difficulties they face in protecting their sensitive data as each environment, and often each implementation with the environment can require a unique data security approach.
(Source: Ernst & Young)
This is despite the indication from data breach statistics that organizations are spending more on cybersecurity, devoting increasing resources to improving their defenses, and working harder to embed security-by-design. Protections are patchy, relatively few organizations are prioritizing advanced capabilities, and cybersecurity too often remains siloed.
(Source: Ernst & Young)
With many organizations actively pursuing digital transformation, it is essential to see that cybersecurity doesn’t get left behind. Thankfully, about 31% additional organizations have management teams with limited knowledge and 25% have teams that are taking positive steps to improve their understanding.
Even in this department, data breach stats show that larger organizations score slightly better than smaller organizations. Interestingly, 60% of organizations say that the person directly responsible for the information security is not a board member.
(Source: PwC)
According to another 2018 survey of companies worldwide, it was found that for all the talk about security needing to become a board-level issue, many boards still appear to be relatively uninvolved in their organization's security strategy. Only 45% are involved in setting security budget, 44% formulate overall security strategy, and 31% review current security and privacy risks.
(Source: Ernst & Young)
Data breach statistics show that outdated security controls are ranked the biggest vulnerability by 26% of the organizations. In fact, 53% of organizations have no program or an obsolete one for critical cybersecurity aspects like threat detection, vulnerability identification, breach detection, data protection, breach response, and identity and access management. Vulnerabilities also increase when it comes to third parties.
(Source: Ernst & Young)
Organizations concede that they would be unlikely to step up their cybersecurity practices or spend more money unless they suffered some sort of breach or incident that caused very negative impacts.
Apart from the obvious red flag that such behavior raises, there is also the fact that, in many cases, even when there is actual harm done, it takes a long time for it to come to the surface.
There are things organizations can do in order to prevent data breaches. Let's have a look on common solutions.
(Source: IBM-Ponemon Institute)
More than 70% of organizations say their cyber resilience has improved in the 2017-2018 period. Top reasons for this include better hiring, improved information governance practices, visibility into applications and data assets, and implementation of new technology like cyber automation tools such as artificial intelligence and machine learning.
(Source: Ernst & Young)
Cloud computing will also see an increase in security spending by 57% of organizations. According to cybersecurity statistics, the other areas in the top 5 include cybersecurity analytics, mobile computing, IoT, and robotic process automation.
(Source: IBM-Ponemon Institute)
Asked to choose from seven key factors that help achieve a high level of cyber resilience, IT professionals from across the world gave the highest preference to preparedness and agility, notably well above planned redundancies. The best way to counter the unpredictable and ever-present nature of cyber threats is to be prepared all the time.
(Source: IBM-Ponemon Institute)
In addition to people and processes, data breach stats show that the right technologies are essential for achieving cyber resilience. The seven most effective technologies for achieving cyber resilience are:
Out of these seven, most IT professionals agree on identity management and authentication, making it the top security technology.
(Source: IBM-Ponemon Institute)
While it is impossible to predict how the next cyberattack will unfold, IT professionals agree that there are certain preventive measures they can take to minimize the risks involved. These measures reduce the chinks in the security armor that cybercriminals eventually exploit to steal data.
Data breach statistics show that the top measures include curtailing unauthorized access to mission-critical applications and sensitive or confidential data. Other important measures are limiting the theft of data-bearing devices (including IoT), enabling efficient backup and disaster recovery operations, and curtailing end-user access to insecure internet sites and web-based apps.
Your email address will not be published.
Updated · Jan 10, 2024
Updated · Jan 09, 2024
Updated · Jan 05, 2024
Updated · Jan 03, 2024