It is a grave mistake to assume you won’t be subject to a data breach. Yet, organizations often mistakenly believe they are not attractive targets for hackers because they think their data lacks financial or strategic value. Smaller businesses or those in niche markets may assume their low profile makes them less appealing to cybercriminals. Moreover, smaller companies may face more limited budgets and prioritize other business needs over investing in strong security measures.
An Overview of Recent Data Breaches
Yet, we recently conducted a survey of over 1000 business, IT, and security executives, which found that 80% of respondents said they’d had a data breach in the last 12 months. When we look at the responses from security executives alone – the segment of respondents closest to the issue and the most in the know -- 87% of respondents said they had a breach within the last 12 months.
These are stark numbers indeed. Even if you take the mindset that it’s when, not if you’ll experience a data breach, for 87% or more of you the when will be in the next 12 months.[Source]
And data breaches have a profound business impact. According to IBM, the global average cost of a data breach in 2024 is $4.88M, 1 10% increase over 2023, and the highest total ever. [Source]
The total estimated cost of cybercrime is forecast to continuously increase between 2024 and 2029 from $9.22 trillion in 2024 to a whopping $15.62 trillion in 2029. [Source]
To give some context, that is more than all but two nations' Gross Domestic Product (GDP). So, to say that it is a major problem is basically an understatement. [Source]
Organization Affected | Summary |
---|---|
National Public Data |
|
Ticketmaster |
|
Change Healthcare |
|
Dell |
|
AT&T |
|
The Impact of Data Breaches
As mentioned earlier in this blog, the financial impact of data breaches is quite substantial. But it is by no means the only way data breaches affect an organization.
As evidenced by the examples in the table above, data breaches can negatively impact organizations in the following ways:
- Regulatory fines—Dell’s data breach resulted in increased scrutiny from regulators. That scrutiny has a cost, from extra labor costs to potential fines.
- Ransomware payments—Some data breaches, like the Change Healthcare breach, may have been caused by ransomware attacks, and businesses may feel compelled to pay the ransom.
- Lawsuits — In the Ticketmaster example, the data breach was a contributing factor causing the US Justice Department to sue for anti-competitive behavior. AT&T is under threat of multiple class action suits because of their breach.
- Brand damage—the truth is, if you are subject to a data breach, the blame falls on you. Even if a third-party vendor or cloud provider is the root cause, the customers look to you to take responsibility.
Additional Resources: Streamline Data Security Strategies
Action Plan to Mitigate the Impact of Data Breaches
Encrypt Data: Encryption is one of the most critical defenses against data breaches. It converts your data into a secure format that is unreadable without the appropriate decryption key. When properly implemented, encryption ensures that even if unauthorized parties gain access to your data, they cannot decipher or misuse it.
There are many ways in which you can encrypt data, and it’s important to have a solution that supports the wide array of data encryption needs your business may have including encryption of full disks, file systems, applications, and databases.
Tokenize Data: Tokenization is another effective method for protecting sensitive information. This process replaces sensitive data with a token—a unique identifier that has no meaningful value without additional information stored in a secure system. Consider data tokenization for when you want to use your data across applications, workflows, and AI models, but need the assurance that it is private and compliant.
Additional Resources: A Guide to Data Tokenization
Key Management: Encryption alone doesn’t stop unauthorized access. Errors in setup or configuration can expose data, and it doesn’t guard against insider threats. Effective security requires key management, access controls, audits, and training for full protection.
Encryption keys must be stored, rotated, and accessed securely to maintain data security. Ineffective key management can render encryption useless, leaving your data vulnerable. Having siloed key administration for all your different environments results in poor crypto posture visibility and increased resources. Implementing a policy-based, centralized Key Management System (KMS) helps automate and enforce best practices in managing encryption keys securely and consistently.
Additional Resources: 10 Key Management Best Practices
How Fortanix Can Help
Fortanix Data Security Manager is a unified platform that provides encryption, tokenization and key management across on-premises and multi-cloud environments from a single pane of glass, making it easy for organizations to apply consistent security policies wherever their data resides.
Our novel Key Insight solutions can also help you discover exposed data services so you can quickly close security gaps. Check out this short explainer video to learn more. We also offer a free 30-day trial, so you can see firsthand how Fortanix Data Security Manager can help you achieve your data security goals.