Updated: 24 May 2024
Contributor: Matthew Kosinski
A data breach is any security incident in which unauthorized parties access sensitive or confidential information, including personal data (Social Security numbers, bank account numbers, healthcare data) and corporate data (customer records, intellectual property, financial information).
The terms "data breach" and "breach" are often used interchangeably with "cyberattack." However, not all cyberattacks are data breaches. Data breaches include only those security breaches where someone gains unauthorized access to data.
For example, a distributed denial of service (DDoS) attack that overwhelms a website is not a data breach. A ransomware attack that locks up a company's customer data and threatens to leak it unless the company pays a ransom is a data breach. The physical theft of hard drives, USB flash drives or even paper files containing sensitive information is also a data breach.
Get insights to better manage the risk of a data breach with the latest Cost of a Data Breach report.
Get the X-Force Cloud Threat Landscape Report 2024
According to the IBM Cost of a Data Breach report, the global average cost of a data breach is USD 4.88 million. While organizations of every size and kind are vulnerable to breaches, the severity of these breaches and the costs to remediate them can vary.
For example, the average cost of a data breach in the United States is USD 9.36 million, about 4 times the cost of a breach in India (USD 2.35 million).
Breach consequences tend to be especially severe for organizations in highly regulated fields like healthcare, finance and the public sector, where steep fines and penalties can compound the costs. For example, according to the IBM report, the average healthcare data breach costs USD 9.77 million, twice the average cost of all breaches.
Data breach costs arise from several factors, with IBM's report noting four key ones: lost business, detection and containment, post-breach response and notification.
The loss of business, revenue and customers resulting from a breach costs organizations USD 1.47 million on average. The price of detecting and containing the breach is even higher at USD 1.63 million. Post-breach expenses—including fines, settlements, legal fees, providing free credit monitoring to affected customers and similar expenditures—cost the average breach victim USD 1.35 million.
Notification costs, which include reporting breaches to customers, regulators and other third parties, are the lowest at USD 430,000. However, reporting requirements can still be onerous and time-consuming.
The US Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) requires organizations in national security, finance and other designated industries to report cybersecurity incidents affecting personal data or business operations to the Department of Homeland Security within 72 hours.
US organizations subject to the Health Insurance Portability and Accountability Act (HIPAA) must notify the US Department of Health and Human Services, affected individuals and sometimes the media if protected health information is breached.
All 50 US states also have their own data breach notification laws.
The General Data Protection Regulation (GDPR) requires companies doing business with EU citizens to notify authorities of breaches within 72 hours.
Register for the X-Force® Threat Intelligence Index
Data breaches are caused by:
Innocent mistakes, such as an employee emailing confidential information to the wrong person.
Malicious insiders, including angry or laid-off employees who want to hurt the company and greedy employees who want to profit off the company's data.
Hackers, malicious outsiders who commit intentional cybercrimes to steal data. Hackers can act as lone operators or part of an organized ring.
Financial gain is the primary motivation for most malicious data breaches. Hackers steal credit card numbers, bank accounts or other financial information to directly drain funds from people and companies.
Some attackers steal personally identifiable information (PII)—such as Social Security numbers and phone numbers—for identity theft, taking out loans and opening credit cards in their victims' names. Cybercriminals can also sell stolen PII and account information on the dark web, where they can fetch as much as USD 500 for bank login credentials.1
A data breach can also be the first phase of a larger attack. For example, hackers might steal the email account passwords of corporate executives and use those accounts to conduct business email compromise scams.
Data breaches might have objectives other than personal enrichment. Unscrupulous organizations might steal trade secrets from competitors, and nation-state actors might breach government systems to steal information about sensitive political dealings, military operations or national infrastructure.
Most intentional data breaches caused by internal or external threat actors follow the same basic pattern:
Malicious actors can use various attack vectors or methods to carry out data breaches. Some of the most common include:
According to the Cost of a Data Breach 2024 report, stolen or compromised credentials are the second most common initial attack vector, accounting for 16% of data breaches.
Hackers can compromise credentials by using brute force attacks to crack passwords, buying stolen credentials off the dark web or tricking employees into revealing their passwords through social engineering attacks.
Social engineering is the act of psychologically manipulating people into unwittingly compromising their own information security.
Phishing, the most common type of social engineering attack, is also the most common data breach attack vector, accounting for 16% of breaches. Phishing scams use fraudulent emails, text messages, social media content or websites to trick users into sharing credentials or downloading malware.
Ransomware, a type of malware that holds data hostage until a victim pays a ransom, costs an average of USD 4.91 million according to the Cost of a Data Breach report. These breaches tend to be expensive, as this figure does not include ransom payments, which can run to tens of millions of dollars.
Cybercriminals can gain access to a target network by exploiting weaknesses in websites, operating systems, endpoints, APIs and common software like Microsoft Office or other IT assets.
Threat actors don't need to hit their targets directly. In supply chain attacks, hackers exploit vulnerabilities in the networks of a company's service providers and vendors to steal its data.
When hackers locate a vulnerability, they often use it to plant malware in the network. Spyware, which records a victim's keystrokes and other sensitive data and sends it back to a server that the hackers control, is a common type of malware used in data breaches.
Another method of directly breaching target systems is SQL injection, which takes advantage of weaknesses in the Structured Query Language (SQL) databases of unsecured websites.
Hackers enter malicious code into user-facing fields, such as search bars and login windows. This code causes the database to divulge private data like credit card numbers or customers' personal details.
Threat actors can take advantage of employees' mistakes to gain access to confidential information.
For example, misconfigured or outdated systems can let unauthorized parties access data they shouldn't be able to. Employees can expose data by storing it in unsecured locations, misplacing devices with sensitive information saved on their hard drives or mistakenly granting network users excessive access privileges. Cybercriminals can use IT failures, such as temporary system outages, to sneak into sensitive databases.
According to the Cost of a Data Breach report, cloud misconfigurations account for 12% of breaches. Known, unpatched vulnerabilities account for 6% of breaches. Accidental data loss, including lost or stolen devices, accounts for another 6%. Altogether, these errors are behind nearly a quarter of all breaches.
Threat actors may break into company offices to steal employees' devices, paper documents and physical hard drives containing sensitive data. Attackers can also place skimming devices on physical credit and debit card readers to collect payment card information.
The 2007 breach of TJX Corporation, the parent company of retailers TJ Maxx and Marshalls, was at that time the largest and costliest consumer data breach in US history. As many as 94 million customer records were compromised, and the company suffered more than USD 256 million in financial losses.
Hackers gained access to the data by planting traffic sniffers on the wireless networks of two stores. The sniffers allowed the hackers to capture information as it was transmitted from the store's cash registers to back-end systems.
In 2013, Yahoo suffered what might be the largest data breach in history. Hackers exploited a weakness in the company's cookie system to access the names, birthdates, email addresses and passwords of all 3 billion Yahoo users.
The full extent of the breach was revealed in 2016 while Verizon was in talks to buy the company. As a result, Verizon reduced its acquisition offer by USD 350 million.
In 2017, hackers breached the credit reporting agency Equifax and accessed the personal data of more than 143 million Americans.
Hackers exploited an unpatched weakness in Equifax's website to gain access to the network. The hackers then moved laterally to other servers to find Social Security numbers, driver's license numbers and credit card numbers. The attack cost Equifax USD 1.4 billion between settlements, fines and other costs associated with repairing the breach.
In 2020, Russian threat actors executed a supply chain attack by hacking the software vendor SolarWinds. Hackers used the organization's network monitoring platform, Orion, to covertly distribute malware to SolarWinds' customers.
Russian spies gained access to the confidential information of various US government agencies, including the Treasury, Justice and State Departments, that use SolarWinds' services.
In 2021, hackers infected Colonial Pipeline's systems with ransomware, forcing the company to temporarily shut down the pipeline that supplies 45% of the US East Coast's fuel.
Hackers breached the network by using an employee's password that they found on the dark web. The Colonial Pipeline Company paid a USD 4.4 million ransom in cryptocurrency, but federal law enforcement recovered roughly USD 2.3 million of that payment.
In the fall of 2023, hackers stole the data of 6.9 million 23andMe users. The breach was notable for a couple of reasons. First, because 23andMe conducts genetic testing, the attackers obtained some unconventional and highly personal information, including family trees and DNA data.
Second, the hackers breached user accounts through a technique called "credential stuffing." In this kind of attack, hackers use credentials exposed in previous leaks from other sources to break into users' unrelated accounts on different platforms. These attacks work because many people reuse the same username and password combinations across sites.
According to the Cost of a Data Breach report, it takes an average of 272 days to identify and contain an active breach across all industries. Deploying the right security solutions can help organizations detect and respond to these breaches faster.
Standard measures, such as regular vulnerability assessments, scheduled backups, timely patching and proper database configurations, can help prevent some breaches and soften the blow of those that occur.
However, many organizations today implement more advanced controls and best practices to stop more breaches and significantly mitigate the damage they cause.
Organizations can deploy specialized data security solutions to automatically discover and classify sensitive data, apply encryption and other protections and gain real-time insight into data usage.
Organizations can mitigate breach damage by adopting formal incident response plans for detecting, containing and eradicating cyberthreats. According to the Cost of a Data Breach report, the most popular area of security investment this year was IR planning and testing, at 55% of all respondents.
Organizations that extensively integrate artificial intelligence (AI) and automation into security operations resolve breaches nearly 100 days faster than those that don't, according to the Cost of a Data Breach report. The report also found that security AI and automation reduce the cost of an average breach by USD 1.88 million or a savings of over 30%.
Many data security, data loss prevention and identity and access management tools now incorporate AI and automation.
Because social engineering and phishing attacks are leading causes of breaches, training employees to recognize and avoid these attacks can reduce a company's risk of a data breach. In addition, training employees to handle data properly can help prevent accidental data breaches and data leaks.
Password managers, two-factor authentication (2FA) or multifactor authentication (MFA), single sign-on (SSO) and other identity and access management (IAM) tools can protect employee accounts and credentials from theft.
Organizations can also enforce role-based access controls and the principle of least privilege to limit employee access to only the data that they need for their roles. These policies can help stop both insider threats and hackers who hijack legitimate accounts.
Protect data across hybrid clouds and simplify compliance requirements.
Strengthen data privacy protection, build customer trust and grow your business.
Improve your organization’s incident response program, minimize the impact of a breach and experience rapid response to cybersecurity incidents.
Learn how to improve your data security and compliance posture by centralizing security, addressing vulnerabilities and more.
Learn how today’s security landscape is changing and how to navigate the challenges and tap into the resilience of generative AI.
Learn how ransomware works, why it has proliferated in recent years and how organizations defend against it.
Data breach costs have hit a new high. Get insights on how to reduce these costs from the experiences of 604 organizations and 3,556 cybersecurity and business leaders.
Learn from the challenges and successes experienced by security teams around the world.
Get key insights and practical strategies for securing your cloud with the latest threat intelligence.
1 How Much Do Hackers Make From Stealing Your Data? (link resides outisde ibm.com), Nasdaq. 16 October 2023