July 26, 2016 By Rahul Agarwal 2 min read

The Digital India program, launched by Prime Minister Narendra Modi, promises to transform India into a digitally empowered society and a connected, knowledge economy. The program envisages the use of information technology to deliver quality education, health and banking services to the farthest corners of the country.

The importance of cybersecurity in achieving this goal cannot be overstated. According to a recent report, cybersecurity incidents in India grew by 117 percent in 2015.

As the volume of incidents increases, Indian companies should implement efficient and robust strategies to respond to cybersecurity threats and limit the cost of a data breach.

A Growing Challenge

IBM and Ponemon Institute recently released the “2016 Cost of Data Breach Study: India,” the annual benchmark study on the cost of data breach incidents for companies based in India.

Below are the key takeaways from the report:

  • The average total cost of a breach was 9.73 crore INR. This represents a 9.5 percent increase over 2015 costs. In comparison, the global average total cost of a data breach increased by 5.4 percent.
  • The size of data breaches increased as well — the average size grew by 8.5 percent in 2016. This is much more than the global average increase of 3.2 percent.
  • The impact of data breaches varied by industry. Certain sectors, such as financial services, had higher data breach costs when compared with industries such as research and the public sector.
  • Forty-one percent of companies experienced a data breach as a result of a malicious or criminal attack, which was the most common root cause of a breach.
  • The cost of a data breach was directly related to the number of records comprised in the attack. The greater the number of records lost, the higher the cost. Data breaches that involved less than 10,000 records had an average cost of 5.96 crore INR, while breaches involving more than 50,000 records had an average cost of 16 crore INR.
  • The longer it takes to detect and contain a data breach, the more costly it becomes to resolve.

As you can see from the statistics, the cost, size and complexity of the data breaches has continued to rise, much more than the global average.

Limiting the Cost of a Data Breach

For Digital India to succeed, it is important that industries and organizations prosper. As more and more Indian organizations implement cloud, mobility and big data technologies to grow their business, it is vital that they tackle the cybersecurity challenge head-on.

Companies should implement incident response capabilities and data security strategies, such as encryption and threat sharing, to reduce the impact and cost of a data breach.

Download the 2016 Ponemon Institute Cost of Data Breach Study: India

More from Data Protection

3 Strategies to overcome data security challenges in 2024

3 min read - There are over 17 billion internet-connected devices in the world — and experts expect that number will surge to almost 30 billion by 2030.This rapidly growing digital ecosystem makes it increasingly challenging to protect people’s privacy. Attackers only need to be right once to seize databases of personally identifiable information (PII), including payment card information, addresses, phone numbers and Social Security numbers.In addition to the ever-present cybersecurity threats, data security teams must consider the growing list of data compliance laws…

How data residency impacts security and compliance

3 min read - Every piece of your organization’s data is stored in a physical location. Even data stored in a cloud environment lives in a physical location on the virtual server. However, the data may not be in the location you expect, especially if your company uses multiple cloud providers. The data you are trying to protect may be stored literally across the world from where you sit right now or even in multiple locations at the same time. And if you don’t…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today