The 2018 Cost of a Data Breach Study from Ponemon Institute is now available.

IBM is proud to sponsor the 12th annual “Cost of Data Breach Study,” the industry’s gold-standard benchmark research, independently conducted by the Ponemon Institute.

Ponemon Institute researchers recruited 419 organizations in 11 countries and two regions to participate in this year’s research. More than 1,900 individuals who are knowledgeable about data breach incidents in these 419 organizations were interviewed.

Incident Response Reduces the Cost of a Data Breach

This year’s study found that the average consolidated total cost of a data breach is $3.62 million, a decrease of 10 percent over last year. However, 48 percent of the decrease over last year can be attributed to the strong U.S. dollar, with significant variability from country to country.

The country with the highest cost, both per record and per incident, is the U.S., whereas the countries with the lowest cost per record and per incident are Brazil and India. Despite the decrease in cost, the average size of a data breach (number of records lost or stolen) increased 1.8 percent over last year.

Among the most notable findings of the study, the research identified a number of factors that reduced the average $141 per-record cost of a data breach. For starters, having an incident response team — either in-house, via a third party or a combination of both — can shave off $19.30 per record. Even for a breach of 10,000 records, that represents savings to the tune of $193,000 — or $1.9 million for a breach of 100,000 records.

Learn More

Read the complete “2017 Cost of Data Breach Study” to learn:

  • The average costs and consequences related to experiencing a data breach incident in various countries and regions;
  • What regional trends affect the cost of a data breach; and
  • The most common factors that influence and can limit the cost of a data breach.

Download the Ponemon Institute 2017 Cost of Data Breach Study: Global Overview

You can also use the new data breach calculator to explore the industry, location and cost factors in the event of a security incident.

More from Data Protection

Why safeguarding sensitive data is so crucial

4 min read - A data breach at virtual medical provider Confidant Health lays bare the vast difference between personally identifiable information (PII) on the one hand and sensitive data on the other.The story began when security researcher Jeremiah Fowler discovered an unsecured database containing 5.3 terabytes of exposed data linked to Confidant Health. The company provides addiction recovery help and mental health treatment in Connecticut, Florida, Texas and other states.The breach, first reported by WIRED, involved PII, such as patient names and addresses,…

Addressing growing concerns about cybersecurity in manufacturing

4 min read - Manufacturing has become increasingly reliant on modern technology, including industrial control systems (ICS), Internet of Things (IoT) devices and operational technology (OT). While these innovations boost productivity and streamline operations, they’ve vastly expanded the cyberattack surface.According to the 2024 IBM Cost of a Data Breach report, the average total cost of a data breach in the industrial sector was $5.56 million. This reflects an 18% increase for the sector compared to 2023.Apparently, the data being stored in industrial control systems is…

3 proven use cases for AI in preventative cybersecurity

3 min read - IBM’s Cost of a Data Breach Report 2024 highlights a ground-breaking finding: The application of AI-powered automation in prevention has saved organizations an average of $2.2 million.Enterprises have been using AI for years in detection, investigation and response. However, as attack surfaces expand, security leaders must adopt a more proactive stance.Here are three ways how AI is helping to make that possible:1. Attack surface management: Proactive defense with AIIncreased complexity and interconnectedness are a growing headache for security teams, and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today