No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Data Breach Costs and Attacks Continue to Increase in 2019

The Growing Economic Burden of a Data Breach

by Kelly Frey and Joseph Damon
September 20, 2019
in Cybersecurity, Featured
giant pile of bundled American currency

With the average cost of a data breach in 2019 as high as $3.9 million, it’s imperative for companies to understand the increasing risks, rising costs and expanding customer turnover rates associated with breaches – and to plan accordingly. Nelson Mullins’ Kelly Frey and Joseph Damon discuss.

In its new 2019 Cost of a Data Breach Study for IBM, the Ponemon Institute[1] continues to track the escalating year-over-year costs of data breaches. According to the study, the average total cost of a data breach increased from $3.86 million to $3.92 million, and the average cost for each lost record increased from $148 to $150. And while the rate of increase this year is less than prior years, the total costs of data breaches across industries continues to climb. And there’s evidence that a single breach can have continuing, year-over-year costs after the breach is discovered and remediated.

The study this year also suggests that “the loss of customer trust [related to a data breach] has serious financial consequences, and [at 36 percent of total average breach costs] lost business is the largest of the four major cost categories contributing to the total cost of a data breach.”

A data breach typically involves situations where confidential, sensitive or personally identifiable information (the elements of which may be defined by state law or federal regulation) is accessed or used without permission or proper authorization. Breaches can occur when laptops containing sensitive information are lost or stolen, when disgruntled employees or third parties access or download such information or when cybercriminals/cyberterrorists gain access for profit or political reasons.[2] As such breaches increase in frequency, ingenuity and prevalence, companies are looking to studies such as Ponemon’s to justify the continued increases in cybersecurity spending.[3]

Ponemon provides ample evidence for such justification. The study notes that the costs of a data breach for organizations that invested in an incident response team and testing of their response plans was over 25 percent less than organizations that fail to take such preemptive actions (an average savings of over $1.2 million dollars per breach).

Ponemon also presents new evidence of how data breach costs are incurred. Not only does a single data breach result in immediate costs, but such costs can extend over multiple years. In general, about two-thirds of breach costs are estimated to occur in year one, 22 percent in the second year after a breach and 11 percent in year three. Such extended losses are greater in highly regulated industries, such as health care and finance, where 53 percent of breach costs are recognized in the first year, 32 percent in the second year and 16 percent more than two years after a breach. The study also notes the relationship between customer turnover and costs related to a data breach.

But perhaps the two most disturbing trends noted by this year’s survey relate to the life cycle and nature of cybersecurity attacks.

Disturbing Trends

The study notes that the average time to identify a breach in 2019 was 209 days, and the average time to contain a breach was 73 days, for a total of 279 days – almost a 5 percent increase over the 2018 life cycle of 266 days. This life cycle to containment is critical with respect to costs, as breaches with life cycles of less than 200 days typically create costs one-third lower than breaches with life cycles over 200 days.

The study also noted that malicious cyberattacks are the most common and most expensive of the breaches studied (increasing over 20 percent between 2014 and 2019). Malicious cyberattacks also have a longer life cycle (averaging 314 days) and are more costly (by 27 percent over human error breaches and 37 percent over system bugs and glitches).

But while malicious cyberattacks are now the most common cause of a breach, human errors and system glitches still represent 49 percent of data breaches studied by Ponemon (including the common phishing attacks all companies seem to be victims of these days).

Increasing vendor usage also presents significant potential risks for cyberattacks. Ponemon found that out of 26 factors contributing to the cost of a data breach, “the five that contributed the most cost were third-party involvement, compliance failures, extensive cloud migration, system complexity and operational technology.” Such factors acted as “major cost amplifiers” of a data breach.

And if increasing costs were not disturbing enough, the study indicates that the percentage chance of experiencing a data breach within two years has now risen to almost 30 percent (a 31 percent increase over the last six years).

With the 2019 study, Ponemon continues to present a series of snapshots in time that illustrate the increasing risks, rising costs and expanding customer turnover rates related to data breaches. But these snapshots also suggest immediate mitigation strategies that may save time (and money) when the inevitable breach occurs; strategies range from simple encryption requirements to expanded internal compliance and training. The key is planning and reasoned organizational integration of the staffing, training and systems required as a result of the increasing threats to a company’s digital assets.

The final caution: “Smugness” over not having experienced a data breach is not appropriate.[4] Given that on average, it takes over 200 days to even identify a data breach and the increasing probability of such a data breach, you may already have a multimillion-dollar data breach liability – you just don’t know about it yet.


[1] https://www.ibm.com/security/data-breach

[2] See generally Frey, Cyber-warfare, cyber-terrorism, and cyber-crime, Financier Worldwide, April 2013.

[3] Bloomberg reports that the cost of top cybersecurity experts to serve as Chief Information/Data Security Officer have quadrupled (with annual compensation at public companies ramping from $600,00 to over $2.5M in 2019. Bloomberg Reports, telecast July 7, 2019.

[4] See generally, https://en.wikipedia.org/wiki/Smug_Alert!


Tags: CybercrimeData BreachPersonally Identifiable Information (PII)Third Party Risk Management
Previous Post

Shearman & Sterling’s Annual Corporate Governance & Executive Compensation Survey

Next Post

The United States of Data Privacy: The Future of GDPR in the Land of the Free

Kelly Frey and Joseph Damon

Kelly Frey and Joseph Damon

Kelly Frey is a partner in the Nashville office of Nelson Mullins Riley & Scarborough LLP, where he represents clients in corporate acquisitions and divestitures, technology transactions and corporate compliance.
Joseph Damon is an associate in the Nashville office of Nelson Mullins Riley & Scarborough LLP, where he advises clients on technology licensing and sourcing matters.

Related Posts

GAN Integrity TPRM & AI

Where TPRM Meets AI: Balancing Risk & Reward

by Corporate Compliance Insights
May 13, 2025

Is your organization prepared for the dual challenges of AI in third-party risk management? Whitepaper Where TPRM Meets AI: Balancing...

new york and us flags

New York Tightens the Breach Clock: 30 Days to Notify

by Melissa Crespo and Reiley Porter
May 12, 2025

State joins growing national trend toward broader personal information definitions and stricter notification timelines for data compromises

robot reviewing contract

9 Emerging Use Cases for AI in TPRM

by Miriam Konradsen Ayed and Craig Moss
May 6, 2025

(Sponsored) As third-party ecosystems grow more complex, compliance teams face mounting pressure to assess and monitor external relationships effectively. Miriam...

robot hand pointing to sky

Agentic AI Can Be Force Multiplier — for Criminals, Too

by Steve Durbin
April 21, 2025

How polymorphic malware and synthetic identities are creating unprecedented attack vectors

Next Post
wooden gavel on american flag

The United States of Data Privacy: The Future of GDPR in the Land of the Free

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights