Menu
​A costly business… What does an average breached enterprise bill look like?

​A costly business… What does an average breached enterprise bill look like?

“Large companies pay significantly more when a security breach is the result of a trusted third party failure."

Enterprises spend an average of $US551,000 to recover from security breaches, while small to medium businesses must fork out $US38,000.

According to the worldwide survey of 5,500 companies, commissioned by Kaspersky Lab, the most expensive types of security breaches are employee fraud, cyber espionage, network intrusion and the failure of third party suppliers.

A serious IT security systems breach leads to many business issues, and in many cases the damage is so diverse, it’s hard for the victims to estimate the total cost.

The methods used for this survey rely on data from previous years to pinpoint areas where companies have to spend money following a breach, or have lost money as a result of a breach.

“We have not seen too many reports on the consequences of IT security breaches, estimating a loss in real money,” says Brian Burke, Head of Market Intelligence Team, Kaspersky Lab.

“It is hard to come up with a reliable method of producing an average, but we understood that we had to do it, to bridge the theory of the corporate threat landscape with business practice.

“As a result, we have a list of corporate threats that caused the most significant damage - the ones we believe businesses should pay the utmost attention to.”

Typically businesses have to spend more on professional services (such as external IT experts, lawyers, consultants, etc.), and earn less thanks to lost business opportunities and downtime.

The probability of each separate consequence also varies and this, along with the size of a company has to be taken into account.

A similar method was used to estimate indirect spend: the budget businesses allocate after the recovery, but is still connected to a security breach. So, on top of the aforementioned figures, businesses typically pay from $8,000 (SMBs) to $69,000 (enterprises) on staffing, training and infrastructure upgrades.

An average breached enterprise bill:

Professional services (IT, risk management, lawyers): up to $84,000 with a probability of 88 per cent

Lost business opportunities: up to $203,000, 29 per cent

Downtime: up to $1.4m, 30 per cent

Total average: $551,000

Indirect spend: up to $69,000

Including reputation damage: up to $204,750

SMBs and enterprises: different ways to suffer

“Nine out of ten companies that have taken part in our survey reported at least one security incident,” Burke adds.

“However, not all incidents are serious and/or lead to the loss of sensitive data.”

Most frequently a serious security breach is the result of a malware attack, phishing, leaks of data by employees and exploited vulnerable software.

“Cost estimation provides a new look at the severity of IT security incidents and the outlook for SMBs and enterprises is slightly different,” Burke adds. “Large companies pay significantly more when a security breach is the result of a trusted third party failure.

“Other expensive types of breaches include fraud by employees, cyber espionage and network intrusion.

“SMBs tend to lose a significant amount of money on almost all types of breach, paying a similar high price on recovering from acts of espionage as well as DDoS and phishing attacks.”

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags securitykaspersky lab

Featured

Slideshows

Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Show Comments