{"id":3736,"date":"2020-10-17T20:55:00","date_gmt":"2020-10-17T20:55:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=3736"},"modified":"2026-01-25T07:59:41","modified_gmt":"2026-01-25T07:59:41","slug":"how-much-could-you-lose-over-a-data-breach","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach","title":{"rendered":"How Much Could You Lose Over a Data Breach?"},"content":{"rendered":"\n<p>Regardless of whether your business is big, small, or somewhere in between; in the health, technology, hospitality or transportation sector \u2013 if you get hit with a data breach, it\u2019s going to cost you money.<\/p>\n\n\n\n<p>And with businesses worldwide being affected by the economic fallout accompanying the Covid-19 pandemic, the last thing any organization needs is a costly data breach.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Data Breach Basics<\/h2>\n\n\n\n<p>A data breach is a security incident in which an organization\u2019s sensitive or confidential information is accessed, viewed or exfiltrated by an unauthorized individual.<\/p>\n\n\n\n<p>Data breaches are always going to cost money to investigate, remediate and recover from \u2013 but just how much money are we talking?<\/p>\n\n\n\n<p><a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">IBM\u2019s 2020 annual Cost of a Data Breach Report<\/a>&nbsp;delves into the details.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Stats Summed Up<\/h2>\n\n\n\n<p>Here are a few of the findings at a glance:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The average total cost of a data breach for 2020 was $3.86 million USD.<\/strong>&nbsp;Although this is a slight decrease from 2019 (%3.92 million), the total average has increased by 10% since 2014, from $3.50 million.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/Screenshots%20from%20IBM%20Report-01(1).png\" alt=\"\"\/><\/figure>\n\n\n\n<p><em><a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">IBM Cost of a Data Breach Report 2020<\/a>&nbsp;\u2013 Figure 2<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The average total cost of a data breach at companies with more than 25,000 employees was $5.52 million USD.&nbsp;<\/strong>The average total cost for these large enterprises was almost $3 million higher than the $2.64 million average total cost for organizations with fewer than 500 employees.<\/li>\n\n\n\n<li><strong>The average time to identify and contain a data breach is 280 days.&nbsp;<\/strong>Companies on average required 207 days to identify the breach and a further 73 days to contain it.<\/li>\n\n\n\n<li><strong>52% of breaches were a result of a malicious attack.<\/strong>&nbsp;Of these malicious attacks, 53% of breaches were caused by financially motivated cyber criminals, 13% each were hacktivists and state-sponsored hackers, and 21% remained unknown, with the average total cost of malicious attacks sitting at $4.27 million.<\/li>\n\n\n\n<li><strong>The costliest malicious breaches were caused by state-sponsored attackers.<\/strong>&nbsp;Breaches by nation state actors had an average total cost of $4.43 million USD, versus $4.23 million for breaches caused by financially motivated hackers.<\/li>\n\n\n\n<li><strong>Remote working is expected to increase the time to identify and contain a data breach by 76%.&nbsp;<\/strong>Of the companies that required remote work in response to Covid-19, 76% believed it would increase the time taken to identify and contain a data breach.<\/li>\n\n\n\n<li><strong>Remote working is expected to take the average total cost of a data breach up to $4 million USD.&nbsp;<\/strong>Of the companies that required remote work in response to Covid-19, 70% believed it would increase the total cot of a data breach. In addition, having a remote workforce was found to increase the average total cost of a data breach by almost $137,000.<\/li>\n\n\n\n<li><strong>Stolen or compromised credentials were the most expensive cause of malicious data breaches.&nbsp;<\/strong>19% of companies that suffered a malicious data breach were infiltrated due to lost or stolen credentials, taking the average total cost for these countries up by almost $1 million, to $4.77 million.<\/li>\n\n\n\n<li><strong>12 out of 16 countries showed an increase in total cost from 2019 to 2020.&nbsp;<\/strong>The United States experienced the highest average total data breach costs in the world, at $8.64 million.<\/li>\n\n\n\n<li><strong>The largest contributing cost factor to the total cost of a data breach was loss of business, at 40%.&nbsp;<\/strong>Including increased customer turnover, lost revenue due to system downtime and the increasing cost of acquiring new business due to diminished reputation, loss of business accounted for $1.52 million of the average total cost of a data breach in the 2020 study, compared to $1.42 million in 2019.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/Screenshots%20from%20IBM%20Report-02.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><em><a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">IBM Cost of a Data Breach Report 2020&nbsp;<\/a>\u2013 Figure 7<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Putting the Data into Perspective<\/h2>\n\n\n\n<p>If your organization suffers a data breach, you probably won\u2019t know about it for over 200 days \u2013 by which point, the damage that\u2019s going to cost you will be well and truly done.<\/p>\n\n\n\n<p>The cost of such a breach will more than likely set you back upwards of 3 million dollars (or closer to 5 million if your company has more than 25,000 employees), predominantly due to business lost while trying to recover from an attack.<\/p>\n\n\n\n<p>Although a slight decrease from last year, the total cost shows a considerable increase in the past 6 years, with Covid-induced remote working (something that isn\u2019t going anywhere any time soon) sending both the likelihood of a breach and the total cost soaring.<\/p>\n\n\n\n<p>Malicious attacks are making up more than half of data breaches, with the costliest of these coming from well-equipped, state-sponsored hackers; and of these malicious attacks, the most expensive cause is lost or stolen credentials.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">It\u2019s Not What you Know, It\u2019s How you Act<\/h2>\n\n\n\n<p>Knowing the statistics of how much a data breach is likely to set you back by is a useful thing.<\/p>\n\n\n\n<p>But knowing how to prevent such a data breach in the first place and save your organization millions of dollars is considerably more useful.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Malicious attacks from both financially motivated cyber criminals and highly trained, well-equipped, state-sponsored hackers are a big contributor to the data breach problem.<\/li>\n<\/ul>\n\n\n\n<p>So, to effectively avoid a data breach and the cost that comes with it, you need to ensure that no hacker, regardless of their intention, can gain access to your organization\u2019s wider IT environment and sensitive data.<\/p>\n\n\n\n<p>The best way to do that is by protecting your privileged user accounts.<\/p>\n\n\n\n<p>The higher the privileges of a user account, the more valuable that account is to malicious hackers.<\/p>\n\n\n\n<p>This is because privileged user accounts enable those who have access to them to do things that can affect other users and the entire computer network, meaning they give attackers a much wider reach to view, copy and steal sensitive data within an organization\u2019s network.<\/p>\n\n\n\n<p>For that exact reason, bad actors often seek to compromise a network via local administrator accounts, or attempt to gain elevated privileges from a regular user account (a technique called privilege escalation).<\/p>\n\n\n\n<p>Stop malicious attackers from doing this and you might just prevent a $3 million dollar data breach.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><s>Easier Said than<\/s>&nbsp;Done.<\/h2>\n\n\n\n<p>With\u00a0<a rel=\"noreferrer noopener\" href=\"\/en\/\" target=\"_blank\">Admin By Request<\/a>, preventing data breaches is gloriously\u00a0<a href=\"\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple\" target=\"_blank\" rel=\"noreferrer noopener\">simple<\/a>\u00a0\u2013 even for enterprises of 25,000+ employees.<\/p>\n\n\n\n<p>Combining a&nbsp;<strong>Privileged Access Management<\/strong>&nbsp;(<strong>PAM<\/strong>) solution with a&nbsp;<a href=\"https:\/\/www.opswat.com\/products\/metadefender\/cloud\" target=\"_blank\" rel=\"noreferrer noopener\">comprehensive anti-malware Cloud API<\/a>, Admin By Request effectively closes the doorway that is the end user.<\/p>\n\n\n\n<p><strong>PAM<\/strong>&nbsp;software allows an organization to manage, monitor, control and audit privileged user access.<\/p>\n\n\n\n<p>It effectively protects the network from data breaches by using&nbsp;<strong>Just-in-time<\/strong>&nbsp;elevation (<strong>JIT<\/strong>) and the&nbsp;<strong>Principle of Least Privilege<\/strong>&nbsp;(<strong>POLP<\/strong>) to ensure users are only able to gain elevated privileges on their machines when absolutely necessary; they otherwise operate with the least privileges required to do their jobs.<\/p>\n\n\n\n<p>Admin By Request implements&nbsp;<strong>JIT<\/strong>&nbsp;and&nbsp;<strong>POLP<\/strong>&nbsp;by revoking local administrator rights, requiring user\u2019s to instead&nbsp;<a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/local-admin-rights-elevation-served-three-ways\" target=\"_blank\" rel=\"noreferrer noopener\">make a request<\/a>&nbsp;to a company IT admin when they need to operate with elevated privileges.<\/p>\n\n\n\n<p>Requests can be approved or denied, and files installed when a user request is approved are scanned by&nbsp;<a href=\"https:\/\/www.opswat.com\/products\/metadefender\/cloud\" target=\"_blank\" rel=\"noreferrer noopener\">OPSWAT MetaDefender\u2019s 30+ anti-malware engines<\/a>&nbsp;to ensure no malware can make itself at home on your system \u2013 for an average of 280 days before detection and containment is achieved,&nbsp;<a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">according to the Report<\/a>.<\/p>\n\n\n\n<p>To successfully breach an organization\u2019s network protected by Admin By Request, hackers must first successfully escalate from a non-privileged user account undetected: an essentially impossible task with the&nbsp;<strong>PAM<\/strong>&nbsp;software\u2019s audit trail logging every action taken by a user&nbsp;<a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/local-admin-rights-elevation-served-three-ways\" target=\"_blank\" rel=\"noreferrer noopener\">operating with temporary escalated privileges<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Pre-Emptive Strike<\/h2>\n\n\n\n<p>The price of preventative cyber security software doesn\u2019t even come close to the cost of recovery if you fail to implement security measures and suffer a costly data breach.<\/p>\n\n\n\n<p>With Admin By Request, you can close the door on all manner of malicious attacks and avoid having your organization become part of the increasingly alarming data breach statistics. <a href=\"\/en\/freeplandownload\">Download the Free Plan<\/a> today to get started.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 2020 IBM Cost of a Data Breach Report reveals some alarming figures about data breaches. Take the right steps now to avoid your organization suffering a breach and becoming part of the statistics.<\/p>\n","protected":false},"author":2,"featured_media":1230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[134,224,90,129,148,38,223,149,91],"ppma_author":[10],"class_list":["post-3736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-attack","tag-compromise","tag-cyber-criminal","tag-cyberattack","tag-cybersecurity","tag-data","tag-data-breach","tag-hacked","tag-hacker","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"The 2020 IBM Cost of a Data Breach Report reveals some alarming figures about data breaches. Take the right steps now to avoid your organization suffering a breach and becoming part of the statistics.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"attack,compromise,cyber criminal,cyberattack,cybersecurity,data,data breach,hacked,hacker\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"How Much Could You Lose Over a Data Breach? \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"The 2020 IBM Cost of a Data Breach Report reveals some alarming figures about data breaches. Take the right steps now to avoid your organization suffering a breach and becoming part of the statistics.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2020-10-17T20:55:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T07:59:41+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"How Much Could You Lose Over a Data Breach? \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"The 2020 IBM Cost of a Data Breach Report reveals some alarming figures about data breaches. Take the right steps now to avoid your organization suffering a breach and becoming part of the statistics.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach#blogposting\",\"name\":\"How Much Could You Lose Over a Data Breach? \\u00bb Admin By Request\",\"headline\":\"How Much Could You Lose Over a Data Breach?\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/OktaBanner-1.png\",\"width\":1982,\"height\":1313,\"caption\":\"A hacker typing on their computer as their access get denied.\"},\"datePublished\":\"2020-10-17T20:55:00+00:00\",\"dateModified\":\"2026-01-25T07:59:41+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach#webpage\"},\"articleSection\":\"Blogs, Attack, Compromise, Cyber Criminal, Cyberattack, Cybersecurity, Data, Data Breach, Hacked, Hacker, Steve Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach#listItem\",\"name\":\"How Much Could You Lose Over a Data Breach?\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach#listItem\",\"position\":3,\"name\":\"How Much Could You Lose Over a Data Breach?\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach\",\"name\":\"How Much Could You Lose Over a Data Breach? \\u00bb Admin By Request\",\"description\":\"The 2020 IBM Cost of a Data Breach Report reveals some alarming figures about data breaches. Take the right steps now to avoid your organization suffering a breach and becoming part of the statistics.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/OktaBanner-1.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach\\\/#mainImage\",\"width\":1982,\"height\":1313,\"caption\":\"A hacker typing on their computer as their access get denied.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/how-much-could-you-lose-over-a-data-breach#mainImage\"},\"datePublished\":\"2020-10-17T20:55:00+00:00\",\"dateModified\":\"2026-01-25T07:59:41+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>How Much Could You Lose Over a Data Breach? \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"How Much Could You Lose Over a Data Breach? \u00bb Admin By Request","description":"The 2020 IBM Cost of a Data Breach Report reveals some alarming figures about data breaches. Take the right steps now to avoid your organization suffering a breach and becoming part of the statistics.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"attack,compromise,cyber criminal,cyberattack,cybersecurity,data,data breach,hacked,hacker","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach#blogposting","name":"How Much Could You Lose Over a Data Breach? \u00bb Admin By Request","headline":"How Much Could You Lose Over a Data Breach?","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/OktaBanner-1.png","width":1982,"height":1313,"caption":"A hacker typing on their computer as their access get denied."},"datePublished":"2020-10-17T20:55:00+00:00","dateModified":"2026-01-25T07:59:41+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach#webpage"},"articleSection":"Blogs, Attack, Compromise, Cyber Criminal, Cyberattack, Cybersecurity, Data, Data Breach, Hacked, Hacker, Steve Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach#listItem","name":"How Much Could You Lose Over a Data Breach?"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach#listItem","position":3,"name":"How Much Could You Lose Over a Data Breach?","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach","name":"How Much Could You Lose Over a Data Breach? \u00bb Admin By Request","description":"The 2020 IBM Cost of a Data Breach Report reveals some alarming figures about data breaches. Take the right steps now to avoid your organization suffering a breach and becoming part of the statistics.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/OktaBanner-1.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach\/#mainImage","width":1982,"height":1313,"caption":"A hacker typing on their computer as their access get denied."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach#mainImage"},"datePublished":"2020-10-17T20:55:00+00:00","dateModified":"2026-01-25T07:59:41+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"How Much Could You Lose Over a Data Breach? \u00bb Admin By Request","og:description":"The 2020 IBM Cost of a Data Breach Report reveals some alarming figures about data breaches. Take the right steps now to avoid your organization suffering a breach and becoming part of the statistics.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2020-10-17T20:55:00+00:00","article:modified_time":"2026-01-25T07:59:41+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"How Much Could You Lose Over a Data Breach? \u00bb Admin By Request","twitter:description":"The 2020 IBM Cost of a Data Breach Report reveals some alarming figures about data breaches. Take the right steps now to avoid your organization suffering a breach and becoming part of the statistics.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"3736","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":null,"og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":null,"robots_max_videopreview":null,"robots_max_imagepreview":"large","priority":null,"frequency":null,"local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:20:14","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2023-05-22 21:57:14","updated":"2026-01-25 08:20:14"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tHow Much Could You Lose Over a Data Breach?\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"How Much Could You Lose Over a Data Breach?","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/how-much-could-you-lose-over-a-data-breach"}],"authors":[{"term_id":10,"user_id":0,"is_guest":1,"slug":"steve-dodson","display_name":"Steve Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"Steve","job_title":"","description":"Steve provides research, analysis, insight and commentary on topical issues and events. He lives in New Zealand and has been working at FastTrack Software for 12 years as a cyber security analyst and technical writer."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=3736"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3736\/revisions"}],"predecessor-version":[{"id":11292,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3736\/revisions\/11292"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/1230"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=3736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=3736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=3736"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=3736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}