Paubox blog: HIPAA compliant email made easy

Summary of IBM's Data Breach Report

Written by Farah Amod | November 28, 2023

IBM’s 2023 Cost of a Data Breach Report highlights the rising cost of data breaches and the need for cybersecurity measures. 

Investing in advanced detection systems can significantly enhance their security outcomes. Additionally, continuous employee training on cybersecurity best practices arms organizations against tactics that often bypass traditional defenses.

 

The average cost of a data breach

According to the Cost of a Data Breach Report, the global average data breach cost in 2023 was USD 4.45 million. This represents a 15% increase over the past three years, highlighting the growing financial impact of data breaches. The report emphasizes the need for organizations to invest in cybersecurity measures to prevent and respond to breaches effectively.

Read alsoThe cost of security breaches

 

Investing in security measures

In response to data breaches, 51% of organizations plan to increase their security investments, including incident response planning and testing, employee training, and implementing threat detection and response tools. 

Taking proactive measures to strengthen cybersecurity can help organizations minimize the financial and reputational damage caused by data breaches.

 

Most vulnerable sectors

Financial institutions and the healthcare sector face cybersecurity challenges with costly data breaches. Breaches cost financial organizations $5.9 million on average. Healthcare breaches cost $10.93 million on average, with a 53.3% increase over the past three years.

 

Breach risk

The United States faces the highest breach risk among all countries studied, at $9.48 million in 2023. While some countries report a decrease in breach costs, the United States continues to experience increased costs and frequency of breaches.

 

Causes of data breaches

To effectively combat data breaches, it is necessary to understand their root causes:

Compromised credentials

Attacks involving compromised credentials pose a significant concern. These breaches provide cybercriminals unrestricted access to protected data and the organization itself. 

 

Phishing attacks

Perpetrators often employ deceptive mimicry, primarily through emails, in phishing attacks. These attacks continue to pose a significant threat to organizations.

 

Misconfigured databases

As businesses increasingly migrate to the cloud, misconfigured databases emerge as vulnerabilities, leading to unintended data exposure.

 

Internal actions

Both deliberate and unintentional internal actions have surfaced as significant threats. This emphasizes the importance of continuous internal monitoring and maintaining a vigilant workforce.

 

Outdated software

Outdated software provides cyber attackers with golden opportunities. Regular updates are a necessity to mitigate this risk.

 

Ransomware

Ransomware attacks, where data is held hostage until a ransom is paid, further complicate the evolving nature of data breaches.

 

Understanding the cost dynamics

In the era of remote work, the shift towards this model has brought forth a unique risk profile. The research reveals that compromised credentials have a pronounced impact, costing approximately $1 million more than other breaches. A practiced incident response plan can significantly curtail breach-associated costs, reducing them to an average of $3.62 million.

 

In the news

The latest update from UnitedHealth Group (UHG) reveals that the expenses incurred in response to Change Healthcare's ransomware attack of February 2024 have surged considerably. The current estimated cost ranges between $2.3 billion and $2.45 billion, which is an increase of over $1 billion from the previous figure reported earlier. Given that UHG has already shelled out almost $2 billion towards dealing with this issue so far, it marks one of their most significant financial challenges yet - largely due to an extended period of disruption caused by prolonged network downtimes across various components within their infrastructure. 

The aftermath of the Change Healthcare cyberattack and UnitedHealth's response shows how cybersecurity vulnerabilities in healthcare can have far-reaching consequences. Even though UnitedHealth showed resilience, the attack still had a severe financial impact that revealed potential economic risks for other large organizations as well. Directing extensive support towards addressing this issue head-on, particularly through financing solutions provided by large corporations like UnitedHealth, sets an unprecedented precedent that may influence industry standards or even regulatory expectations going forward.

See more: Change Healthcare ransomware attack projected to cost $2.3 billion 

 

FAQs

What is a data breach?

A data breach is an incident where sensitive, protected, or confidential data is accessed, disclosed, or stolen by unauthorized individuals. This can include personal information such as names, social security numbers, credit card details, and medical records. Data breaches can occur through various means, such as hacking, malware attacks, insider threats, or inadequate security measures.

 

Can legal action result from a data breach?

Yes, legal action can result from a data breach, as affected individuals or organizations may sue for damages caused by the breach.

 

How can healthcare organizations prevent data breaches?

Healthcare organizations can reduce the risk of data breaches by implementing strong cybersecurity measures, conducting regular security training for employees, and using encryption to protect sensitive data. 

 

What is the role of business associate agreements (BAAs) in preventing data breaches?

BAAs ensure that third-party vendors handling protected health information (PHI) comply with HIPAA regulations, reducing the risk of breaches caused by vendor actions.

 

What should a healthcare organization do immediately after discovering a data breach?

Upon discovering a data breach, a healthcare organization should contain the breach, assess the scope of the impact, notify affected individuals and relevant authorities, and begin an investigation to understand how the breach occurred and how to prevent future incidents.

See also: HIPAA Compliant Email: The Definitive Guide