Feeds

How much do security breaches cost anyway?

TJX case sheds light on 'inexact' science

Next gen security for virtualised datacentres

Information security breaches cost anywhere between $90 to $305 per lost record, according to a new study by Forrester Research.

Forrester bases its figures, which it has the good grace to say are difficult to be sure about, on a survey of 28 companies who had some sort of data breach. The estimate covers the cost of legal fees, call centers costs, lost employee productivity, regulatory fines, loss of investor confidence and customer losses. Senior analyst Khalid Kark describes its figures from costs as an "educated estimate". He admitted the auditing costs associated with security breaches is an inexact science (much like working out the damages resulting from malware infestations, we'd add).

Information security breach laws passed by many US states over the last two years or so have lead to multiple reports of data loses which might have gone unreported in the past. Last month, in the most high profile breach to date, TJX admitted details of up to 45.6m credit card numbers left exposed by a security breach to its database systems that lasted for over 17 months.

Excluding details of 30m expired credit cards that would be more difficult to use fraudulently, the lower end of Forrester's estimates yields a figure of $1.35bn for TJX's losses. Kark told the Boston Glode that $1.35bn was a "realistic minimum estimate" of TJX's costs over several years, though he admitted it might be lower.

A similar study by Michigan-based data privacy researcher Larry Ponemon estimated breaches cost $182 per compromised record. None of the 31 incidents cost the affected firm more than $22m. Ponemon told the Boston Globe that remediation costs, such as improving security, cost the same no matter how big the breach. TJX costs would only exceed $1bn if widespread incidents of identity theft associated with the breach forced the retail giant to slash costs and mount a costly marketing drive in a bid to woo punters back into stores.

Both the Ponemon and Forrester estimates represent a fraction of the $5bn+ loss guesstimates we've heard bandied about by security firms, with a clear axe to grind this week. TJX said it had spent just $5m up to the end of January on costs such as technical and legal fees and customer communications related to the breach. Tellingly investors haven't marked down its share price significantly in the expectation of major losses down the road.

TJX spokeswoman Sherry Lang described the $1bn cost estimates as "pure speculation by people who are outside the company". Many variables are involved in costs associated with breaches making comparisons difficult, she added. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?