{"id":67307,"date":"2023-05-25T17:16:09","date_gmt":"2023-05-25T09:16:09","guid":{"rendered":"https:\/\/version-2.com\/?p=67307"},"modified":"2023-05-25T17:18:05","modified_gmt":"2023-05-25T09:18:05","slug":"cost-benefit-analysis-of-cybersecurity-spending","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/05\/cost-benefit-analysis-of-cybersecurity-spending\/","title":{"rendered":"Cost-benefit analysis of cybersecurity spending"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"67307\" class=\"elementor elementor-67307\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1jvaAoafcCMB0Rm8nrqmVh\/9060e1147e662d7f9f388d8a23bc1b43\/Cost-benefit_analysis_of_cybersecurity_spending_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"800\" \/>\n<div class=\"nord-col lg:col-8 lg:offset-1 break-words mt-5 text-grey-shuttle\"><article>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">As new data breaches are making the headlines, cybersecurity is becoming one of the most critical elements of a long-term business strategy. To protect their sensitive data and mitigate potential risks, businesses are actively looking for ways to move into the 21st century in terms of their infrastructure. However, as many soon discover, cybersecurity integration within an existing business is rarely a one-click solution.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Even putting all the technical questions aside, cybersecurity raises many questions regarding return on investment. This article will provide a broad overview of how to approach cybersecurity spending. We&#8217;ll briefly cover what makes up cybersecurity costs, what factors could affect them, the financial impacts of cyberattacks, potential benefits, and some guidelines on approaching cybersecurity estimates in your company.<\/p>\n\n<h2 id=\"costs-of-cybersecurity\" class=\"Heading Heading-h2 text-dark-blue\">Costs of cybersecurity<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity spending can mean several things. The exact route will depend on the actual business case and the risks that the company is trying to mitigate. Still, no matter which options your company is considering, this is something where budget constraints will have to become a consideration.<\/p>\n\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n\n<img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5dlFWl5pl8IhgcTqWAKv6A\/04eafbf165cc320c75ad2fb9da0b40f0\/1_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"800\" \/>\n\n<picture>Let&#8217;s look at the costs from different cybersecurity ecosystem components: solutions, services, personnel, and training.<\/picture>\n\n<\/div>\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Solutions<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">One of the go-to routes for organizations looking to shield themselves against cyberattacks is <strong>purchasing cybersecurity hardware or software solutions<\/strong>. This allows companies to flexibly integrate them into the infrastructure, strengthening the areas needing attention.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">As such, businesses have numerous options available. Cybersecurity hardware and software provide easy access to firewalls, antivirus, access control mechanisms, intrusion detection and prevention systems. When used collectively, these technologies work together to halt cyberattacks or mitigate their impact if they do occur.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">While it&#8217;s also true that their costs depend on various factors (which we will address later on), let&#8217;s look at the average industry costs associated with various cybersecurity solutions. Please note that the distinction between solutions and services isn&#8217;t as set in stone as it used to be due to modern service delivery models (like SaaS) and the popularity of cloud computing.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">Firewalls<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">If an organization relies on a network, a firewall is a must as it monitors and controls network traffic. Acting as a barrier between the internet and\/or other untrusted networks and your private network, <strong>it&#8217;s the first defense against malicious connections based on predefined rules<\/strong>.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The tricky part for the comparison is that they can be implemented at different levels of the network stack, i.e., from the network layer (filtering packets) to the application layer (proxy servers). Finally, they can be hardware or software-based, or a combination of both, affecting the final price tag.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Therefore, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.designrush.com\/agency\/cybersecurity\/trends\/cost-of-cybersecurity\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">an average firewall configuration<\/a> can range between <strong>$450 and $2,500 <\/strong>(as a one-off investment not factoring in its maintenance which costs extra). That doesn&#8217;t take into account setup or maintenance costs, so the final cost can be higher.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">Antivirus software<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Antiviruses are still staples to protect computer systems from malware, viruses, and other security threats. As an essential component of comprehensive cybersecurity strategy, they can be used as the last line of defense. Usually, in business settings, they&#8217;re deployed across an organization&#8217;s network to protect all connected devices.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">It&#8217;s often the case that antiviruses also include additional features like firewalls, intrusion prevention systems, and email filtering to provide further protection against cyber threats. This also makes our comparison more difficult.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Still, if we&#8217;re looking for rough estimates, which is what we&#8217;re doing here: basic antivirus usually costs between <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/pentestmag.com\/the-costs-and-benefits-of-investing-in-cybersecurity\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">$3 and $5 per user and $5 to $8 per server monthly<\/a>. While the final price tag will entirely depend on your organization&#8217;s size, the estimate could be <strong>at least $30<\/strong> a month if you have around five users.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">Spam filters<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Business communication primarily still takes place over emails. This is something that hackers are exploiting in phishing attacks. For this reason, having spam filters is essential to identify and block harmful emails before they end up in employees&#8217; inboxes. Spam filters rely on various technologies to analyze the content and metadata of incoming messages to determine whether they are legitimate.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Some email providers offer spam filters already integrated into their suite. Meanwhile, for other cases, it&#8217;s required to set up a spam filter on top of it. It&#8217;s estimated that the price for this ranges between <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.atlantic-it.net\/cybersecurity-costs-for-small-businesses\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">$3 \u2013 $6 per user per month<\/a>.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Services<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">What makes cybersecurity services different from cybersecurity solutions is that they&#8217;re typically provided by a third-party provider, who may offer the service on a subscription basis. While a cybersecurity service may include various cybersecurity solutions, the two concepts are not interchangeable. Cybersecurity service by definition encompasses ongoing protection against cybersecurity threats.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Frequently this also means that cybersecurity services can help against threats of greater sophistication. This makes them a good pick for organizations looking into securing their digital assets and preventing unauthorized access, theft, and exploitation of sensitive information.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">VPN<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">With plenty of employees working remotely, businesses need a secure way for their employees to access company resources. VPN encryption seals the sensitive data in a secure tunnel, enabling secure exchanges to the company&#8217;s network. This additional protection layer also helps mitigate cyber threats by masking the user&#8217;s IP address.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Yet, as with most cybersecurity components, there are multiple routes to consider here. A VPN could be set up as a hardware stack with ongoing third-party maintenance fees or a software-only solution. This is something that can skew the price.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">While the software-only is cheaper and can <strong>be up to $10 per user<\/strong>, the hardware setup can range up to <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.archonsecure.com\/blog\/what-is-the-lifetime-cost-of-hardware-based-vpn\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">$3,500 per device<\/a>. That&#8217;s a significant gap between them, while both options provide similar functionality. The particular business case will be a deciding factor.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">Consulting and testing<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity consulting and testing service providers have a high level of expertise in identifying and mitigating security risks. This is something that few companies can manage to achieve out of their own resources. Specialized cybersecurity professionals perform various checks to properly evaluate the used cybersecurity measures&#8217; effectiveness and outline the most critical areas.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Due to the nature of their services, this can be a pretty expensive endeavor. A vulnerability assessment for a network with up to three servers would <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.designrush.com\/agency\/cybersecurity\/trends\/cost-of-cybersecurity\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cost $1,500 to $6,000<\/a>. It goes without saying that if the scope of investigations needs to be broader, this will only add up to the final price tag.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">Endpoint detection and response<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Businesses turn to endpoint detection and response (EDR) services because they provide high protection against cyber threats by monitoring and detecting potential security breaches. This allows businesses to detect and respond to cyber threats quickly and before they cause significant damage to the organization&#8217;s assets, reputation, and financial standing. EDR solutions typically operate through a combination of software agents and cloud-based systems.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Endpoint detection and response solutions <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.ajg.com\/us\/news-and-insights\/2022\/oct\/understanding-endpoint-detection-and-response-\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cost around $5 to $10 per month per device<\/a>. Yet, as with most subscription-based services, there are discounts: with more devices, EDR usually becomes cheaper per single device. Still, EDR solutions come in different depths and feature sets, so the final cost can be higher.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Personnel<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Personnel is one of the most important cybersecurity assets at any company&#8217;s disposal. These specialists will protect your data from various forms of cyberattacks and ensure the risks are minimal. Whatever cybersecurity solutions or services you&#8217;ve purchased, the IT personnel will set up and maintain those tools.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity doesn&#8217;t become an integral part of an organization&#8217;s DNA just by purchasing some subscriptions. It needs to be cultivated. One way to ensure this is sustainable is to develop security policies and protocols \u2014 exactly what cybersecurity personnel will do.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">Network administrators<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Network administrators are responsible for setting up and maintaining the organization&#8217;s network infrastructure. They must ensure the network is secure from unauthorized access and that all transmitted data is protected from interception and other potential threats. The administrators will be configuring and managing firewalls, blocking specific ports, managing user permissions, monitoring the network, and patching system components.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">As for their cost, you can look at conflicting data sources: depending on the region, experience, market saturation, and other factors. Still, if we&#8217;re looking for a broad view <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.payscale.com\/research\/US\/Job=Network_Administrator\/Salary\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">based on data from Payscale<\/a>, this should be within <strong>$63,244 per year<\/strong>.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">Compliance officers<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Compliance officers are specialists who ensure an organization&#8217;s cybersecurity by implementing policies and procedures to align compliance with regulations and industry standards. They identify risks, monitor security measures, and ensure employees follow security protocols. These key people outline how an organization should handle sensitive data, access controls, and incident response.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">A compliance officer&#8217;s salary is<strong> $73,255 a year<\/strong> based on publicly available data. Mind you, compliance is one of the trickiest landscapes to navigate, so these specialists must periodically refresh their knowledge to stay updated with the latest policy changes.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">Security analysts<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Security analysts identify potential threats to an organization&#8217;s network, systems, and data. They&#8217;re using various tools and techniques to detect and prevent cyberattacks before they can cause damage. Security analysts identify vulnerabilities in an organization&#8217;s systems and infrastructure by conducting risk assessments.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Security analysts are crucial in protecting an organization&#8217;s assets and cyber threats. Based on <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.glassdoor.com\/Salaries\/information-security-analyst-salary-SRCH_KO0,28.htm\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Glassdoor data<\/a>, their salaries, on average, <strong>are around $90,283 a year<\/strong>. Due to the increased frequency and complexity, professional cyber security analysts are in high demand, which can further increase their salaries.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Trainings<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The cybersecurity landscape is constantly changing. Therefore employees&#8217; skills and knowledge need to be periodically refreshed. This is where cybersecurity training and certifications ensure that employees know the best practices for protecting this information and can identify potential threats. These trainings can be expensive, and organizations must ensure they are effective.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">Courses<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity courses can be an invaluable resource in helping to understand the importance of protecting company data from cyberattacks. By teaching employees how to identify potential security threats and how to take preventative measures, companies can reduce the risk of data breaches and protect their sensitive information. Nowadays, there are plenty of resources, ranging from in-person training to online lectures.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">For this reason, cybersecurity training costs vary significantly and can range <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/startacybercareer.com\/cyber-security-training-cost\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">from freely available online resources to $5,000 or more<\/a>. Mind you that the price is affected by factors like depth and competencies. Courses intended for niche specializations will always cost more than a basic introduction.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">Certifications<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity certifications provide credibility to professionals working in the field, demonstrating that they have met rigorous standards and have the necessary knowledge and skills to protect against cyber threats. Using certification as a standardized measure allows aligning the team and ensuring that best practices are applied when making organization-level cybersecurity improvements.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">There are several popular cybersecurity certifications widely recognized in the industry. For example, the Certified Information Systems Security Professional (CISSP) exam <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.usnews.com\/education\/learn-cybersecurity-certifications\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">costs around $699<\/a>. Certified Ethical Hacker (CEH), another important pick for cybersecurity professionals, costs <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.knowledgehut.com\/blog\/security\/ethical-hacking-certification-cost\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">around $1199<\/a>. Along with GIAC Security Essentials (GSEC) certification and exam, it\u2019s priced <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/resources.infosecinstitute.com\/certification\/the-gsec-certification-and-exam\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">around $1699<\/a>, which makes it one of the more expensive courses.<\/p>\n\n<h2 id=\"factors-that-affect-cybersecurity-costs\" class=\"Heading Heading-h2 text-dark-blue\">Factors that affect cybersecurity costs<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">It&#8217;s important to note that the cybersecurity costs provided in the previous section are only rough estimates. The final price will depend on numerous factors, which will be the key differentials from business to business when calculating cybersecurity costs. Let&#8217;s look at some of them to see how they factor into the final price tag.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Size<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The size of an organization is one of the most important factors which can drastically alter cybersecurity costs. As larger companies have more complex IT infrastructures, more employees to train, and a higher risk of cyber attacks due to their visibility and financial resources \u2014 their security naturally costs more. When compared to smaller organizations, the difference might be night and day.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Keep in mind that, in some cases, some cybersecurity tools will need to be adjusted. They cannot operate that well when used in corporate settings, which are within a completely different pricing category. However, numerous reports confirm that <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.forbes.com\/sites\/edwardsegal\/2022\/03\/30\/cyber-criminals\/?sh=1fdac0552ae5\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">small businesses are three times more likely to be targeted by cybercriminals<\/a> than larger companies. So while the risks remain high, not all companies are as well equipped to tackle the potential risks.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Industry<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The industry in which an organization operates and any regulatory requirements it must comply with can impact its cybersecurity costs. Organizations working in highly regulated industries like healthcare and finance will have higher cybersecurity costs because more regulations apply to the data they&#8217;re holding.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">As a side note, the industry determines an organization&#8217;s risk tolerance. Different industries can have very different thresholds for acceptable risk levels. This means that security&#8217;s scope will have to be aligned, which will also, in turn, affect cybersecurity costs. In addition, businesses in certain industries seem to <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.forbes.com\/sites\/theyec\/2021\/01\/19\/what-businesses-are-the-most-vulnerable-to-cyberattacks\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">fall victim to more cyberattacks than others<\/a>, which is also a factor.<\/p>\n\n<h2 id=\"financial-impact-of-cyber-attacks\" class=\"Heading Heading-h2 text-dark-blue\">Financial impact of cyber attacks<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">While up until this point, you got the impression that cybersecurity is expensive, let&#8217;s move on to an overview of the financial impact of cyber attacks. Depending on what business operations are targeted, the attack scope, and the kinds of data leaking to the public, all constitute significant financial losses. Let&#8217;s look at revenue losses, legal fees, and reputational damage.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Revenue<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cyberattacks can disrupt normal organizations&#8217; day-to-day operations and compromise sensitive data. This can easily make an organization&#8217;s systems and networks inaccessible or unusable. The downtime when the IT team is trying to patch together a solution and get the operations back up and running costs time, which also translates into lost revenue.<\/p>\n\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n<div style=\"padding-top: 57.14285714285714%;\" aria-hidden=\"true\"><\/div>\n<div style=\"opacity: 1; transition: opacity 500ms linear; object-fit: cover;\" aria-hidden=\"true\" data-placeholder-image=\"\"><\/div>\n<picture><source srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=750&amp;h=429&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1080&amp;h=617&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1366&amp;h=781&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp 1400w\" type=\"image\/webp\" sizes=\"100vw\" \/><img decoding=\"async\" style=\"object-fit: cover; opacity: 0;\" title=\"2 financial impact of cyberattacks\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=png\" sizes=\"100vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=750&amp;h=429&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1080&amp;h=617&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1366&amp;h=781&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=png 1400w\" alt=\"2 financial impact of cyberattacks\" width=\"1\" height=\"0.5714285714285714\" data-main-image=\"\" \/><\/picture><noscript><picture><source type=\"image\/webp\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=750&amp;h=429&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1080&amp;h=617&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1366&amp;h=781&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp 1400w\" sizes=\"100vw\"\/><img title=\"2 financial impact of cyberattacks\" width=\"1\" height=\"0.5714285714285714\" data-main-image=\"\" style=\"object-fit:cover;opacity:0\" sizes=\"auto, 100vw\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=png\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=750&amp;h=429&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1080&amp;h=617&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1366&amp;h=781&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/66PwExA7fMdHZsJiOmSUM1\/35e5b6151c0b409b48c64c7058afdff3\/2_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=png 1400w\" alt=\"2 financial impact of cyberattacks\"\/><\/picture><\/noscript>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The recovery costs can also be factored in as damaged equipment needs to be replaced, and systems need to be restored from the backups. It&#8217;s not a coincidence that a quarter of companies that have experienced a cyber attack have <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.statista.com\/statistics\/1334399\/us-common-results-of-cyber-attacks\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">lost between $50,000 and $99,999 in revenue<\/a>. These are steep numbers, and they don&#8217;t factor in the costs of getting the operations back up and running.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Legal fees<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">After data breach remediation and operations restoration, the trouble isn&#8217;t over. Especially in cases of a large data breach, companies need to hire legal counsel, forensic experts, and other professionals to help manage the aftermath. So there&#8217;s the precedent of estimation and cleaning up.<\/p>\n\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n<div style=\"padding-top: 57.14285714285714%;\" aria-hidden=\"true\"><\/div>\n<div style=\"opacity: 1; transition: opacity 500ms linear; object-fit: cover;\" aria-hidden=\"true\" data-placeholder-image=\"\"><\/div>\n<picture><source srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=750&amp;h=429&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1080&amp;h=617&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1366&amp;h=781&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp 1400w\" type=\"image\/webp\" sizes=\"100vw\" \/><img decoding=\"async\" style=\"object-fit: cover; opacity: 0;\" title=\"3 post-breach legal fees breakdown\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=png\" sizes=\"100vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=750&amp;h=429&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1080&amp;h=617&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1366&amp;h=781&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=png 1400w\" alt=\"3 post-breach legal fees breakdown\" width=\"1\" height=\"0.5714285714285714\" data-main-image=\"\" \/><\/picture><noscript><picture><source type=\"image\/webp\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=750&amp;h=429&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1080&amp;h=617&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1366&amp;h=781&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp 1400w\" sizes=\"100vw\"\/><img title=\"3 post-breach legal fees breakdown\" width=\"1\" height=\"0.5714285714285714\" data-main-image=\"\" style=\"object-fit:cover;opacity:0\" sizes=\"auto, 100vw\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=png\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=750&amp;h=429&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1080&amp;h=617&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1366&amp;h=781&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/7lJU3qywFZWWkRJn7gGQ0f\/27ea52d5b15c92d664c9b85de81d87a7\/3_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=png 1400w\" alt=\"3 post-breach legal fees breakdown\"\/><\/picture><\/noscript>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Additionally, depending on the data breach&#8217;s severity, the company may also be held responsible for the damage suffered by affected customers or clients. If there are lawsuits, this can quickly mount legal fees, including settlement costs. For smaller companies, that&#8217;s an instant endgame as they often just aren&#8217;t equipped to handle such expenses. For instance, it&#8217;s estimated that legal costs range from <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/magoo.medium.com\/how-to-estimate-legal-costs-from-a-data-breach-1b523c8b0d72\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">$50,000-$148 million, with a median of $1.6 million and a mean of $13 million<\/a>.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Reputational damage<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">A data breach leaves a permanent black mark on a company&#8217;s reputation. Companies will need to spend a lot of resources to repair their image and reassure the customers that they have learned from their mistakes and won&#8217;t happen again. This long process involves public statements and social media management and should be an aspect of long-term customer trust remediation.<\/p>\n\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n<div style=\"padding-top: 32.14285714285714%;\" aria-hidden=\"true\"><\/div>\n<div style=\"opacity: 1; transition: opacity 500ms linear; object-fit: cover;\" aria-hidden=\"true\" data-placeholder-image=\"\"><\/div>\n<picture><source srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=750&amp;h=241&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1080&amp;h=347&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1366&amp;h=439&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1400&amp;h=450&amp;q=50&amp;fm=webp 1400w\" type=\"image\/webp\" sizes=\"100vw\" \/><img decoding=\"async\" style=\"object-fit: cover; opacity: 0;\" title=\"4 cybersecurity reputational costs\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1400&amp;h=450&amp;q=50&amp;fm=png\" sizes=\"100vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=750&amp;h=241&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1080&amp;h=347&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1366&amp;h=439&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1400&amp;h=450&amp;q=50&amp;fm=png 1400w\" alt=\"4 cybersecurity reputational costs\" width=\"1\" height=\"0.3214285714285714\" data-main-image=\"\" \/><\/picture><noscript><picture><source type=\"image\/webp\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=750&amp;h=241&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1080&amp;h=347&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1366&amp;h=439&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1400&amp;h=450&amp;q=50&amp;fm=webp 1400w\" sizes=\"100vw\"\/><img title=\"4 cybersecurity reputational costs\" width=\"1\" height=\"0.3214285714285714\" data-main-image=\"\" style=\"object-fit:cover;opacity:0\" sizes=\"auto, 100vw\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1400&amp;h=450&amp;q=50&amp;fm=png\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=750&amp;h=241&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1080&amp;h=347&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1366&amp;h=439&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/49WyGZDQk3wgdwJ9Bu5A7e\/0e1a654cf26c0011286b74c8c9042382\/4_1400x800.png?w=1400&amp;h=450&amp;q=50&amp;fm=png 1400w\" alt=\"4 cybersecurity reputational costs\"\/><\/picture><\/noscript>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">According to various reports, the proportion of the total costs that can be attributed to reputational costs like abnormal customer turnover and loss of goodwill was <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.propertycasualty360.com\/2016\/03\/01\/cyber-attacks-a-growing-concern-around-the-world\/?slreturn=20230425050001\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">around $1.57 million<\/a>. Mind you that this is something that affects companies for a long time, provided that a company even makes a recovery from a data breach.<\/p>\n\n<h2 id=\"benefits-of-cybersecurity-spending\" class=\"Heading Heading-h2 text-dark-blue\">Benefits of cybersecurity spending<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity spending can minimize various risks associated with revenue, reputation, or legal fees. While this is a solid argument advocating for cybersecurity solutions, this is far from the only benefit. Having a functioning infrastructure with a cybersecurity-focused mindset also generates a positive outcome for organizations. Let&#8217;s look at some of the indirect benefits of cybersecurity spending.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Better compliance alignment<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Many compliance regulations, like General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA), require organizations to implement specific security measures to protect sensitive data. Therefore, investments in cybersecurity help to achieve two goals simultaneously:<\/p>\n\n<ul class=\"list\">\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The risk profile is contained, and the organization is more resistant to cyberattacks.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The organization ensures that it has all the necessary technologies and policies in place to meet compliance requirements.<\/p>\n<\/li>\n<\/ul>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Reports confirm that achieving substantial <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/static.fortra.com\/globalscape\/pdfs\/guides\/gs-true-cost-of-compliance-data-protection-regulations-gd.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">compliance goals require holistic and integrated security solutions, ensuring that every aspect of an organization is covered<\/a>. For this alone, cybersecurity investments should be at the top of the business manager&#8217;s list.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Increased productivity<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity matters can often be a catalyst for workplace modernization. While this may not always be a seamless transition, the change often allows the work to be performed more efficiently and securely. A good example of this is the remote and hybrid work trend, which became very popular after the global pandemic.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">In fact, securing identities and endpoint devices enables users to do their work <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/09\/18\/how-modern-cybersecurity-helps-you-stay-productive-and-resilient\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">quickly and securely from anywhere<\/a>. Nowadays, there are many ways of working, and cybersecurity can be a good contributor to breaking the cycle of outdated tech and enabling all ways of working.<\/p>\n\n<h2 id=\"how-to-apply-costbenefit-analysis-for-your-organization\" class=\"Heading Heading-h2 text-dark-blue\">How to apply cost-benefit analysis for your organization<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Our rough estimates demonstrate that data breach costs outweigh cybersecurity expenses. While this is a valid statement, this doesn&#8217;t provide clear guidelines on what actionable steps should be taken when considering cybersecurity spending. Businesses have finite resources, and cybersecurity is just one area that needs to be addressed. Thankfully, there are some models that we can use as a basis to evaluate cybersecurity costs and benefits.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Let&#8217;s start by looking at one of the most widely used schemes: <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP.04162018.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">the National Institute of Standards and Technology (NIST) Cybersecurity Framework<\/a>. This is a helpful document consisting of standards, guidelines, and best practices to manage cybersecurity risks. It\u2019s especially useful because it&#8217;s applicable to companies from all industries.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The problem with it is that while it recognizes that management of cybersecurity risks is always organization-specific, which will also shape how the final cost-benefit evaluation will look, it doesn&#8217;t outline how the cost-benefit analysis should be provided. For this reason, some researchers suggest integrating <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/6\/1\/tyaa005\/5813544\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">mathematical models Lawrence A. Gordon and Martin P. Loeb<\/a> developed into the NIST Cybersecurity Framework. The model calculates an optimal investment in cybersecurity based on <strong>the cost of an attack, the expected probability, and the effectiveness of the security measures<\/strong> put in place.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The basic premise of the Gordon-Loeb model is that there is <strong>a tradeoff between the cost of an attack and the cost of investing in cybersecurity<\/strong>. Organizations want to minimize the total cost, including the cost of an attack and the security investment. The model assumes that the cost of an attack is proportional to the value of the information assets that could be compromised.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The model also considers the probability of an attack occurring, which is a function of the number of potential attackers, the likelihood that they will attempt an attack, and the effectiveness of the security measures. The effectiveness of security measures is assumed to be proportional to the level of investment in cybersecurity.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">To calculate the optimal investment in cybersecurity, a balance needs to be found between the level of investment and the expected total cost. This relies on the relation between the expected cost of an attack and the cost of the security investment. This leaves us with a four-step approach:<\/p>\n\n<ol class=\"list\">\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The value of protected information should be estimated as it represents the potential loss (L)<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The probability of the information being breached should be estimated (v)<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">These first two values should be combined to derive the expected loss (vL)<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity investments should be allocated to the information based on the productivity and cost of the investments, so an optimal investment level (z)<\/p>\n<\/li>\n<\/ol>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Putting this data in the graph gives us some perspective on the diminishing returns. If the values of v and L are small, for instance, when v equals 0.1, and L equals $1M, extensive investments in cybersecurity aren\u2019t optimal, as the expenses are higher than the benefits.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">However, as the values of v and L increase, the optimal investment amount (z) and the expected loss resulting from a cybersecurity breach (vL) increase in this scenario.<\/p>\n\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n<div style=\"padding-top: 57.14285714285714%;\" aria-hidden=\"true\"><\/div>\n<div style=\"opacity: 1; transition: opacity 500ms linear; object-fit: cover;\" aria-hidden=\"true\" data-placeholder-image=\"\"><\/div>\n<picture><source srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=750&amp;h=429&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1080&amp;h=617&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1366&amp;h=781&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp 1400w\" type=\"image\/webp\" sizes=\"100vw\" \/><img decoding=\"async\" style=\"object-fit: cover; opacity: 0;\" title=\"5 graph showing optimal cybersecurity spending\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=png\" sizes=\"100vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=750&amp;h=429&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1080&amp;h=617&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1366&amp;h=781&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=png 1400w\" alt=\"5 graph showing optimal cybersecurity spending\" width=\"1\" height=\"0.5714285714285714\" data-main-image=\"\" \/><\/picture><noscript><picture><source type=\"image\/webp\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=750&amp;h=429&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1080&amp;h=617&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1366&amp;h=781&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp 1400w\" sizes=\"100vw\"\/><img title=\"5 graph showing optimal cybersecurity spending\" width=\"1\" height=\"0.5714285714285714\" data-main-image=\"\" style=\"object-fit:cover;opacity:0\" sizes=\"auto, 100vw\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=png\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=750&amp;h=429&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1080&amp;h=617&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1366&amp;h=781&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/3sUiOE8wE50b9DeBN7aQSa\/afef968104bc81048a286601b915a13c\/5_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=png 1400w\" alt=\"5 graph showing optimal cybersecurity spending\"\/><\/picture><\/noscript>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">In other words, the more valuable data an organization has, the more it has to lose. Once that threshold is met, not investing in cybersecurity is sitting on a powder keg. It&#8217;s a simple exercise to go through to better evaluate your organization&#8217;s standing in terms of cybersecurity. As a rule of thumb, the authors of the study suggest that organizations should generally <strong>invest less than 37% of the expected loss from a cybersecurity breach<\/strong>. The actual number will then need to be individually calculated based on your organization\u2019s specifics.<\/p>\n\n<h2 id=\"how-to-improve-your-cybersecurity-with-nordlayer\" class=\"Heading Heading-h2 text-dark-blue\">How to improve your cybersecurity with NordLayer?<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity is unavoidable in the current business environment because cyber threats aren&#8217;t going anywhere. This also has associated costs: solutions, services, personnel, and trainings. Organizations aren&#8217;t left alone without help, so for those willing to team up with cybersecurity providers \u2014 the market offers numerous opportunities that could make your company more resistant to cyber threats.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">When it comes to the price, though, there are numerous factors that can also affect cybersecurity costs, like industry and size. As most cyberattacks are financially motivated, the companies with the most sensitive data are the prime targets. Although, it&#8217;s always fair to assume that <strong>no matter the industry or size, no one is immune to them<\/strong>.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">That is why organizations need modern cybersecurity solutions that adapt to changing complexities of today\u2019s working environments. All organizations have information that needs protecting, so all communication channels are interesting to hackers.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">With NordLayer\u2019s solutions, organizations can secure access to sensitive information and prevent reputational, legal, and financial damage. No matter what industry, NordLayer can be a reliable ally to help you stay secure. <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/contact-sales\/\">Contact us<\/a>, and let\u2019s discuss your cybersecurity journey together.<\/p>\n\n<\/article><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As new data breaches are making the headlines, cybersec [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1075,1130,61],"tags":[974,1076,1132],"class_list":["post-67307","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-year2023","category-nordlayer","category-press-release","tag-nord-security","tag-1076","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cost-benefit analysis of cybersecurity spending - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cost-benefit analysis of cybersecurity spending - Version 2\" \/>\n<meta property=\"og:description\" content=\"As new data breaches are making the headlines, cybersec [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-25T09:16:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-25T09:18:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1jvaAoafcCMB0Rm8nrqmVh\/9060e1147e662d7f9f388d8a23bc1b43\/Cost-benefit_analysis_of_cybersecurity_spending_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/05\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Cost-benefit analysis of cybersecurity spending\",\"datePublished\":\"2023-05-25T09:16:09+00:00\",\"dateModified\":\"2023-05-25T09:18:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/05\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/\"},\"wordCount\":3631,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/1jvaAoafcCMB0Rm8nrqmVh\\\/9060e1147e662d7f9f388d8a23bc1b43\\\/Cost-benefit_analysis_of_cybersecurity_spending_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"2023\",\"NordLayer\"],\"articleSection\":[\"Nord Security\",\"2023\",\"NordLayer\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/05\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/\",\"name\":\"Cost-benefit analysis of cybersecurity spending - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/1jvaAoafcCMB0Rm8nrqmVh\\\/9060e1147e662d7f9f388d8a23bc1b43\\\/Cost-benefit_analysis_of_cybersecurity_spending_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"datePublished\":\"2023-05-25T09:16:09+00:00\",\"dateModified\":\"2023-05-25T09:18:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/1jvaAoafcCMB0Rm8nrqmVh\\\/9060e1147e662d7f9f388d8a23bc1b43\\\/Cost-benefit_analysis_of_cybersecurity_spending_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/1jvaAoafcCMB0Rm8nrqmVh\\\/9060e1147e662d7f9f388d8a23bc1b43\\\/Cost-benefit_analysis_of_cybersecurity_spending_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/cost-benefit-analysis-of-cybersecurity-spending\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cost-benefit analysis of cybersecurity spending\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cost-benefit analysis of cybersecurity spending - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/","og_locale":"zh_HK","og_type":"article","og_title":"Cost-benefit analysis of cybersecurity spending - Version 2","og_description":"As new data breaches are making the headlines, cybersec [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/","og_site_name":"Version 2","article_published_time":"2023-05-25T09:16:09+00:00","article_modified_time":"2023-05-25T09:18:05+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/1jvaAoafcCMB0Rm8nrqmVh\/9060e1147e662d7f9f388d8a23bc1b43\/Cost-benefit_analysis_of_cybersecurity_spending_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"11 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/05\/cost-benefit-analysis-of-cybersecurity-spending\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Cost-benefit analysis of cybersecurity spending","datePublished":"2023-05-25T09:16:09+00:00","dateModified":"2023-05-25T09:18:05+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/05\/cost-benefit-analysis-of-cybersecurity-spending\/"},"wordCount":3631,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/1jvaAoafcCMB0Rm8nrqmVh\/9060e1147e662d7f9f388d8a23bc1b43\/Cost-benefit_analysis_of_cybersecurity_spending_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","keywords":["Nord Security","2023","NordLayer"],"articleSection":["Nord Security","2023","NordLayer","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/05\/cost-benefit-analysis-of-cybersecurity-spending\/","url":"https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/","name":"Cost-benefit analysis of cybersecurity spending - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/1jvaAoafcCMB0Rm8nrqmVh\/9060e1147e662d7f9f388d8a23bc1b43\/Cost-benefit_analysis_of_cybersecurity_spending_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","datePublished":"2023-05-25T09:16:09+00:00","dateModified":"2023-05-25T09:18:05+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/1jvaAoafcCMB0Rm8nrqmVh\/9060e1147e662d7f9f388d8a23bc1b43\/Cost-benefit_analysis_of_cybersecurity_spending_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/1jvaAoafcCMB0Rm8nrqmVh\/9060e1147e662d7f9f388d8a23bc1b43\/Cost-benefit_analysis_of_cybersecurity_spending_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/cost-benefit-analysis-of-cybersecurity-spending\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Cost-benefit analysis of cybersecurity spending"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hvB","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/67307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=67307"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/67307\/revisions"}],"predecessor-version":[{"id":67311,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/67307\/revisions\/67311"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=67307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=67307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=67307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}