The Asia-Pacific is a region of unique contracts — rules, customs, cultures, languages, food and more. However, there is a common thread that glues the region together: On the whole, it is growing. Per capita income is rising, and so is consumerism. Markets are growing at a remarkable rate and show no signs of slowing. Organizations are embracing cloud, mobile and social technology at an unprecedented speed.

But there is another side of the coin: All this growth is leading to a rise in cyberattacks, and the region has become a key target for the bad guys. Organizations know that data breaches can be damaging and carry big costs. But how much?

Breaking Down the Cost of a Data Breach by Country

The Ponemon Institute’s “2017 Cost of Data Breach Study,” sponsored by IBM, looked at the qualitative and quantitative aspects of a data breach, and examined ways to reduce the cost.

According to the study, the average cost of a data breach in India was 110 million rupees ($1.7 million) in 2016, a 12 percent rise year over year, and 2.51 million Australian dollars ($1.9 million) in Australia, a 5 percent decrease from the previous year. Meanwhile, the average cost of a breach in the Association of Southeast Asian Nations (ASEAN) totaled 3.18 million Singapore dollars ($2.3 million).

The cost associated with a data breach varies by industry as well as geography. Needless to say, some industries are more at risk than the others. In India, the top three sectors in terms of average cost per record were services (6,175 rupees), financial (5,836 rupees) and industrial (5,505 rupees).

In Australia, the financial sector suffered the largest cost per record (380 Australian dollars), followed by services (336 Australian dollars) and technology (274 Australian dollars). The financial industry (247 Singapore dollars) also topped the list in the ASEAN region, with transportation (194 Singapore dollars) and technology (180 Singapore dollars) rounding out the top three.

Reducing the Cost of a Data Breach

To reduce the cost of a data breach, companies should establish incident response teams, use encryption extensively, appoint a chief information security officer (CISO) to oversee the security program and participate in threat sharing. In addition to these security basics, employee training is crucial.

Of course, every company is different, and the cost of a data breach depends heavily on the organization’s industry and security posture. Use IBM Security’s Cost of Data Breach Calculator to determine what a potential data breach could cost your organization.

For more detailed findings and recommendations, download the country-specific reports for India, Australia and ASEAN.

Download the 2017 Cost of Data breach Report: ASEAN

More from Data Protection

Cybersecurity 101: What is Attack Surface Management?

There were over 4,100 publicly disclosed data breaches in 2022, exposing about 22 billion records. Criminals can use stolen data for identity theft, financial fraud or to launch ransomware attacks. While these threats loom large on the horizon, attack surface management (ASM) seeks to combat them. ASM is a cybersecurity approach that continuously monitors an organization’s IT infrastructure to identify and remediate potential points of attack. Here’s how it can give your organization an edge. Understanding Attack Surface Management Here…

Six Ways to Secure Your Organization on a Smaller Budget

My LinkedIn feed has been filled with connections announcing they have been laid off and are looking for work. While it seems that no industry has been spared from uncertainty, my feed suggests tech has been hit the hardest. Headlines confirm my anecdotal experience. Many companies must now protect their systems from more sophisticated threats with fewer resources — both human and technical. Cobalt’s 2022 The State of Pentesting Report found that 90% of short-staffed teams are struggling to monitor…

The Importance of Modern-Day Data Security Platforms

Data is the backbone of businesses and companies everywhere. Data can range from intellectual property to critical business plans to personal health information or even money itself. At the end of the day, businesses are looking to grow revenue, innovate, and operationalize but to do that, they must ensure that they leverage their data first because of how important and valuable it is to their organization. No matter the industry, the need to protect sensitive and personal data should be…

Meeting Today’s Complex Data Privacy Challenges

Pop quiz: Who is responsible for compliance and data privacy in an organization? Is it a) the security department, b) the IT department, c) the legal department, d) the compliance group or e) all of the above? If you answered "all of the above," you are well-versed in the complex world of compliance and data privacy! While compliance is a complex topic, the patchwork of regulations imposed by countries, regions, states and industries further compounds it. This complexity has turned…