A data breach is any security incident in which unauthorized parties gain access to sensitive or confidential information, including personal data (Social Security numbers, bank account numbers, healthcare data) or corporate data (customer data records, intellectual property, financial information).
The terms ‘data breach’ and ‘breach’ are often used interchangeably with ‘cyberattack.’ But not all cyberattacks are data breaches—and not all data breaches are cyberattacks.
Data breaches include only those security breaches in which data confidentiality is compromised. So, for example, a distributed denial of service (DDoS) attack that overwhelms a website is not a data breach. But a ransomware attack that locks up a company’s customer data and threatens to sell it for ransom, is a data breach—so is the physical theft of hard drives, thumb drives, or even paper files containing sensitive information.
Get insights to better manage the risk of a data breach with the latest Cost of a Data Breach report.
Register for the X-Force Threat Intelligence Index
According to the IBM Cost of a Data Breach 2022 report, the global average cost of a data breach is USD 4.35 million. Also, the average cost of a data breach in the United States is more than twice that amount at USD 9.44 million. Eighty-three (83) percent of organizations surveyed in the report experienced more than one data breach.
Organizations of every size and type are vulnerable to breaches—large and small businesses, public and private companies, federal, state and local governments and non-profit organizations. The consequences of a data breach are especially more severe for organizations in fields such as healthcare, finance and the public sector.
The value of these data—government secrets, patient health information, bank account numbers and log-in credentials—and the strict regulatory fines and penalties are what these organizations carry when a breach occurs. For example, according to the IBM report, the average healthcare data breach cost USD 10.10 million—more than twice the average cost of all breaches.
Data breach costs arise from several factors, some more surprising than others. The resulting loss of business, revenue and customers cost data breach victims USD 1.42 million on average. But the average cost of detecting and containing a breach is slightly more expensive at USD 1.44 million. And post-breach expenses—including everything from fines, settlements and legal fees to reporting costs and providing free credit monitoring from affected customers—cost the average data breach victim USD 1.49 million. Data breach reporting requirements can be particularly costly and time-consuming.
Data breaches are caused by:
Financial gain is the primary motivation for most malicious attacks. Hackers may steal credit card numbers, bank accounts, or other financial information to drain funds from people and companies directly.
They could steal personally identifiable information (PII)—social security numbers and phone numbers—for identity theft (taking out loans and opening up credit cards in their victims' names) or for sale on the dark web, where it can fetch as much as USD 1 per social security number and USD 2,000 for a passport number (link resides outside ibm.com). Cybercriminals may also sell personal details or stolen credentials to other hackers on the dark web, who may use them for their own malicious purposes.
Data breaches may have other objectives. Unscrupulous organizations may steal trade secrets from competitors. Nation-state actors may breach government systems to steal information about sensitive political dealings, military operations, or national infrastructure.
Some breaches are purely destructive, with hackers accessing sensitive data only to destroy or deface it. Such destructive attacks, which account for 17% of breaches according to the Cost of a Data Breach 2022 report, are often the work of nation-state actors or hacktivist groups seeking to damage an organization.
According to the Cost of a Data Breach 2022 report, the average data breach lifecycle is 277 days, which means it takes that long for organizations to identify and contain an active breach.
Intentional data breaches caused by internal or external threat actors follow the same basic pattern:
Malicious actors can use various attack vectors, or methods, to carry out data breaches. Some of the most common include:
According to the Cost of a Data Breach 2022 report, stolen or compromised credentials are the most common initial attack vector, accounting for 19% of data breaches. Hackers may steal or compromise credentials by using brute force attacks, buying stolen credentials off the dark web, or tricking employees into revealing credentials through social engineering attacks.
Social engineering is the act of psychologically manipulating people into unwittingly compromising their own information security. Phishing, the most common type of social engineering attack, is also the second most-common data breach attack vector, accounting for 16% of breaches. Phishing scams use fraudulent emails, text messages, social media content or web sites to trick users into sharing credentials or downloading malware.
According to the Cost of a Data Breach 2022 report, it takes a company 326 days on average to identify and contain a ransomware breach. This issue is particularly chilling because according to the X-Force Threat Intelligence Index 2023, the average time to execution for ransomware dropped from 60+ days in 2019 to just 3.85 days in 2021. The average cost of a ransomware-related breach is USD 4.54 million—a figure that does not include ransom payments, which can run to tens of millions of dollars.
Cybercriminals may gain access to a target network by exploiting weaknesses IT assets like websites, operating systems, endpoints and commonly used software like Microsoft Office or web browsers. Once hackers locate a vulnerability, they will often use it to inject malware into the network. Spyware, which records a victim's keystrokes and other sensitive data and sends it back to a command and control server that the hackers operate, is a common type of malware used in data breaches.
Another method of breaching target systems directly, SQL injection takes advantage of weaknesses in the Structured Query Language (SQL) databases of unsecured websites. Hackers enter malicious code into the website's search field, prompting the database to return private data like credit card numbers or customers' personal details.
Hackers can take advantage of employees' mistakes to gain access to confidential information. For example, according to the IBM Cost of a Data Breach 2022 report, cloud misconfigurations served as the initial attack vector in 15% of breaches. Employees may also expose data to attackers by storing it in unsecured locations, misplacing devices with sensitive information saved on their hard drives, or mistakenly granting network users excessive data access privileges. Cybercriminals may also use IT failures, such as temporary system outages, to sneak into sensitive databases.
Attackers may steal an employees' work or personal device to gain access to the sensitive data it contains, break into company offices to steal paper documents and physical hard drives, or place skimming devices on physical credit and debit card readers to collect individuals' payment card information.
A handful of examples demonstrate the range of data breach causes and costs.
Standard security measures—regular vulnerability assessments, scheduled backups, encryption of data at rest and in transit, proper database configurations, timely application of systems and software—can help prevent data breaches and soften the blow when data breaches occur. But today organizations may implement more specific data security controls, technologies and best practices to better prevent data breaches and mitigate the damage they cause.
Incident response plans. An organization’s incident response plan (IRP)—a blueprint for detecting, containing and eradicating cyberthreats—is one of the most effective ways to mitigate the damage of a data breach. According to the Cost of a Data Breach 2022 report, organizations with regularly tested incident response plans and dedicated response teams have an average data breach cost of USD 3.26 million—USD 2.66 million less than the average cost of a data breach than those without.
AI and automation. The Cost of a Data Breach 2022 report also found that organizations apply high levels of artificial intelligence (AI) and automation for threat detection and response have an average data breach cost that is 55.3% lower than organizations applying lower levels of those technologies. Technologies such as security orchestration, automation and response (SOAR), user and entity behavior analytics(UEBA), endpoint detection and response(EDR) and extended detection and response (XDR ) leverage AI and advanced analytics to identify threats early—even before they lead to data breaches—and provide automation capabilities that enable a faster, cost-saving response.
Employee training. Because social engineering and phishing attacks are leading causes of breaches, training employees to recognize and avoid these attacks can reduce a company’s risk of a data breach. In addition, training employees to handle data properly can help prevent accidental data breaches and data leaks.
Identity and access management (IAM). Strong password policies, password managers, two-factor authentication (2FA) or multi-factor authentication (MFA), single sign-on (SSO) and other identity and access management (IAM) technologies and practices can help organizations better defend against hackers that use stolen or compromised credentials, the most common data breach attack vector.
A zero trust security approach. A zero trust security approach is one that never trusts and continuously verifies all users or entities, whether they’re outside or already inside the network. Specifically, zero trust requires
These controls can help thwart data breaches and other cyberattacks by identifying and stopping them at the outset and by limiting the movement and progression of hackers and attacks that do gain access to the network.
Outsmart attacks with a connected, modernized security suite. The QRadar portfolio is embedded with enterprise-grade AI and offers integrated products for endpoint security, log management, SIEM and SOAR—all with a common user interface, shared insights and connected workflows.
Implemented on premises or in a hybrid cloud, IBM® data security solutions help you gain greater visibility and insights to investigate and remediate cyberthreats, enforce real-time controls and manage regulatory compliance.
Proactive threat hunting, continuous monitoring and in-depth threat investigation are just a few of the priorities facing an already busy IT department. Having a trusted incident response team on standby can reduce your response time, minimize the impact of a cyberattack and help you recover faster.
Proactively protect your organization’s primary and secondary storage systems against ransomware, human error, natural disasters, sabotage, hardware failures and other data loss risks.
Get the latest insights into the expanding threat landscape and offers recommendations for how to save time and limit losses.
CISOs, security teams and business leaders: Find actionable insights for understanding how threat actors are waging attacks, and how to proactively protect your organization.
Learn how ransomware works, why it has proliferated in recent years, and how organizations defend against it.