{"id":98091,"date":"2024-11-26T11:45:24","date_gmt":"2024-11-26T03:45:24","guid":{"rendered":"https:\/\/version-2.com\/?p=98091"},"modified":"2024-11-22T11:47:54","modified_gmt":"2024-11-22T03:47:54","slug":"what-drives-data-breach-costs","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/11\/what-drives-data-breach-costs\/","title":{"rendered":"What Drives Data Breach Costs?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"98091\" class=\"elementor elementor-98091\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Data-breach-costs.png\" width=\"1200\" height=\"798\" \/><\/p><div class=\"fl-module-content fl-node-content\"><p><b>What drives data breach costs?<\/b><\/p><p>The worldwide cost of a data breach in 2024 averages around $4.88 million, which is a 10% increase over 2023.<span class=\"Apple-converted-space\">\u00a0 <\/span>If you are unlucky enough to be a victim of <a href=\"https:\/\/www.portnox.com\/cybersecurity-101\/crypto-ransomware\/\">ransomware<\/a>, the cost is 10% higher, at$ 5.37 million. And if you\u2019re in the United States, the average cost almost doubles to $9.36 million.<span class=\"Apple-converted-space\">\u00a0 <\/span>What exactly are you spending all this money on?<span class=\"Apple-converted-space\">\u00a0 <\/span>Let\u2019s dive deeper into the costs of a data breach.<\/p><p><b>Where does it all go?<\/b><\/p><p>According to <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">IBM<\/a>, there are four key categories to spend money in post-breach: <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p><b>Detection and Escalation<\/b><\/p><p>Detection is about finding the breach (and determining the extent of it) as fast and ideally as early as possible.<span class=\"Apple-converted-space\">\u00a0 <\/span>When a data breach is detected, the first priority is to figure out what has been compromised, how far the hackers got in, and how to plug the hole.<span class=\"Apple-converted-space\">\u00a0 <\/span>Costs associated with this might include a new messaging system \u2013 communicating via your existing e-mail or instant messenger might tip the hackers off as to your plans, which will prevent you from being able to contain the damage.<span class=\"Apple-converted-space\">\u00a0 <\/span>You might need more robust network monitoring, firewalls, SIEM (security information and event management) systems, and more.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p>Time is of the essence during the detection phase \u2013 the longer it takes, the more expensive it will be to unwind.<span class=\"Apple-converted-space\">\u00a0 <\/span>It takes around <a href=\"https:\/\/www.statista.com\/statistics\/1417455\/worldwide-data-breaches-identify-and-contain\/\">194 days<\/a> to find a data breach, with an additional 64 days to contain it \u2013 that\u2019s a lot of time for a bad actor to have access to your systems.<span class=\"Apple-converted-space\">\u00a0 <\/span>The longer detection takes, the more <a href=\"https:\/\/www.armis.com\/faq\/what-is-the-average-cost-of-a-data-breach\/\">expensive the breach is<\/a>. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p>Escalation begins the process of notifying internal stakeholders.<span class=\"Apple-converted-space\">\u00a0 <\/span>IT and any Security personnel are often the first to know.<span class=\"Apple-converted-space\">\u00a0 <\/span>It\u2019s crucial to loop in customer-facing organizations like support and sales early in the process, as they are the first points of contact your customers will often make when reaching out to you.<span class=\"Apple-converted-space\">\u00a0 <\/span>You will want to have a statement crafted that can be sent out, which will likely involve marketing.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p><b>Notification<\/b><\/p><p>Moving on from internally, next will be letting the world know \u2013 this will include regulators, customers, and the general public. Hiring a<span class=\"Apple-converted-space\">\u00a0 <\/span>PR firm to help craft a statement is a smart move, and you\u2019ll surely want to retain legal counsel to make sure you don\u2019t make your situation any worse.<span class=\"Apple-converted-space\">\u00a0 <\/span>Doing this in a timely manner is crucial so that you don\u2019t run afoul of any <a href=\"https:\/\/www.portnox.com\/resources\/compliance\/\">regulations<\/a>.<span class=\"Apple-converted-space\">\u00a0 <\/span>There are several laws in different countries that have time-bound requirements; for instance, <a href=\"https:\/\/www.portnox.com\/resources\/compliance\/gdpr\/\">GDPR<\/a> requires notification within 72 hours of discovering a data breach.<span class=\"Apple-converted-space\">\u00a0 <\/span>In this stage your customers will have questions \u2013 probably a lot of questions \u2013 and it will be all hands on deck, not just for sales and support, but product and marketing as well.<span class=\"Apple-converted-space\">\u00a0 <\/span>Maintaining accurate, clear, and consistent communication with customers, the press, and regulators is of paramount importance.<\/p><p><b>Post-Breach Response<\/b><\/p><p>This is a crucial, make-it-or-break-it time for companies; after the initial announcement, there is likely a great deal of attention laser-focused on you, your business, your customers, and any other person or organization in your orbit. A good post-breach response will help restore lost confidence, and hopefully minimize the impact of lost business. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p>An excellent example of a post-breach response comes from <a href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/unpacking-the-okta-data-breach\/\">Okta.<\/a><span class=\"Apple-converted-space\">\u00a0 <\/span>When they were breached in 2023, although only less than 150 customers were impacted, their communication was transparent, forthright, and thoroughly detailed what they found and their <a href=\"https:\/\/sec.okta.com\/harfiles\">next steps<\/a>. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p><b>Lost Business Cost<\/b><\/p><p>Inevitably, when you suffer a breach, you will lose some business.<span class=\"Apple-converted-space\">\u00a0 <\/span>Some customers will leave, some prospects will go dark, and some current customers will reduce the amount they spend.<span class=\"Apple-converted-space\">\u00a0 <\/span>While that\u2019s inevitable, you will also suffer the loss of future plans \u2013 your roadmap, feature development, and all other work will grind to a halt as the data breach becomes a black hole that sucks all activity in, and everyone focuses on the other three areas we\u2019ve covered.<span class=\"Apple-converted-space\">\u00a0 <\/span>Your UX team will become QA testers; your marketers will become support reps; and your customers will be clamoring for answers you may not have yet.<span class=\"Apple-converted-space\">\u00a0 <\/span>It will take a long time, with a lot of intense effort, to return to some semblance of normal.<\/p><p>Each of these efforts alone can run up costs in the millions of dollars; combined altogether it\u2019s easy to see why<a href=\"https:\/\/redriver.com\/security\/target-data-breach\"> breaches like Target<\/a> run into the hundreds of millions of dollars.<span class=\"Apple-converted-space\">\u00a0 <\/span>Given that these costs are projected to continue to skyrocket, and you probably have many other things to spend $10 million dollars on, it\u2019s worth it to invest in training and security tools to keep your organization safe.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>What drives data breach costs? The worldwide cost of a  [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,1273,61],"tags":[352,423,1272],"class_list":["post-98091","post","type-post","status-publish","format-standard","hentry","category-portnox","category-1273","category-press-release","tag-network","tag-portnox","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Drives Data Breach Costs? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Drives Data Breach Costs? - Version 2\" \/>\n<meta property=\"og:description\" content=\"What drives data breach costs? The worldwide cost of a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-26T03:45:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Data-breach-costs.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/what-drives-data-breach-costs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/what-drives-data-breach-costs\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"What Drives Data Breach Costs?\",\"datePublished\":\"2024-11-26T03:45:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/what-drives-data-breach-costs\\\/\"},\"wordCount\":776,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/what-drives-data-breach-costs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Data-breach-costs.png\",\"keywords\":[\"Network\",\"Portnox\",\"2024\"],\"articleSection\":[\"Portnox\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/what-drives-data-breach-costs\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/what-drives-data-breach-costs\\\/\",\"name\":\"What Drives Data Breach Costs? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/what-drives-data-breach-costs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/what-drives-data-breach-costs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Data-breach-costs.png\",\"datePublished\":\"2024-11-26T03:45:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/what-drives-data-breach-costs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/what-drives-data-breach-costs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/what-drives-data-breach-costs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Data-breach-costs.png\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Data-breach-costs.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/what-drives-data-breach-costs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Drives Data Breach Costs?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Drives Data Breach Costs? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/","og_locale":"en_US","og_type":"article","og_title":"What Drives Data Breach Costs? - Version 2","og_description":"What drives data breach costs? The worldwide cost of a [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/","og_site_name":"Version 2","article_published_time":"2024-11-26T03:45:24+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Data-breach-costs.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/11\/what-drives-data-breach-costs\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"What Drives Data Breach Costs?","datePublished":"2024-11-26T03:45:24+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/11\/what-drives-data-breach-costs\/"},"wordCount":776,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Data-breach-costs.png","keywords":["Network","Portnox","2024"],"articleSection":["Portnox","2024","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/11\/what-drives-data-breach-costs\/","url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/","name":"What Drives Data Breach Costs? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Data-breach-costs.png","datePublished":"2024-11-26T03:45:24+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Data-breach-costs.png","contentUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Data-breach-costs.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/what-drives-data-breach-costs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What Drives Data Breach Costs?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-pw7","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/98091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=98091"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/98091\/revisions"}],"predecessor-version":[{"id":98098,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/98091\/revisions\/98098"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=98091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=98091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=98091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}