Data Breach Cost Statistics 2025: What a Breach Really Costs and How Prevention Compares
IBM's 2024 Cost of a Data Breach Report — the industry's definitive annual study, now in its 19th year — found that the global average cost of a data breach reached $4.88 million, a 10% increase over 2023 and the highest figure ever recorded. Healthcare remained the most expensive sector at $10.93 million per breach, a position it has held for 14 consecutive years. In the UK, the average breach cost reached £3.4 million. The average time to identify a breach: 194 days. The average time to contain it: another 64 days. That is 258 days of exposure — nearly nine months.
$4.88M: average global cost of a data breach in 2024 — IBM.
Breaking Down the $4.88 Million
IBM's figure encompasses four cost categories, each reflecting a different dimension of breach impact. Detection and escalation costs — forensic investigation, crisis management, audit services — averaged $1.63 million. Notification costs — regulatory filings, individual notifications, credit monitoring services — averaged $0.37 million. Post-breach response costs — help desk, legal fees, regulatory fines, identity protection — averaged $1.55 million. Lost business costs — customer churn, revenue loss during downtime, reputational damage — averaged $1.33 million. The lost business category has historically been the most variable: organisations that suffer high-profile public exposure of customer data face significantly higher churn than those that contain the disclosure.
Cost by Industry
The variation across industries is dramatic, driven by the sensitivity of the data held, the regulatory landscape, and the competitive dynamics of the sector:
- Healthcare: $10.93M — the most expensive for 14 consecutive years. HIPAA penalties, patient lawsuits, and the extreme sensitivity of medical records drive costs
- Financial services: $6.08M — heavily regulated, with mandatory breach notifications and significant customer churn when trust is broken
- Pharmaceuticals: $5.01M — intellectual property theft (drug formulations, clinical trial data) adds costs beyond personal data exposure
- Technology: $4.97M — source code theft, customer data, and supply chain implications amplify costs
- Energy: $4.72M — critical infrastructure designation triggers additional regulatory obligations and national security considerations
- UK average across all sectors: £3.4M ($4.2M) — driven by GDPR enforcement, ICO fines, and the UK's litigious breach response environment
The 194-Day Detection Gap
IBM found that the average time to identify a data breach was 194 days — more than six months of attacker activity before detection. Once identified, the average containment time added another 64 days. During this 258-day window, attackers exfiltrate data, establish persistence, move laterally through the network, and potentially compromise backup systems. Every additional day of dwell time increases the cost of the breach. Organisations that identified and contained breaches in fewer than 200 days saved an average of $1.02 million compared to those that exceeded 200 days. This finding underscores why prevention — stopping data from leaving in the first place — is fundamentally more cost-effective than detection and response.
The Cost Multipliers
Several factors significantly amplified breach costs beyond the baseline average. Understanding these multipliers helps organisations prioritise investment:
- Stolen or compromised credentials as the initial vector: +$4.81M average total cost (the most expensive attack vector)
- Non-compliance with regulations: +$1.25M average cost uplift versus compliant organisations
- Cloud environment breaches: +$0.41M when the breach involved data stored in public cloud
- Third-party involvement (supply chain): +$370K average cost when a vendor or partner was the entry point
- Skills shortage: organisations citing security staffing shortages paid $1.76M more on average
- Remote work as a factor: breaches involving remote work cost $173K more and took 58 days longer to identify
The Cost Reducers: What Actually Saves Money
IBM also identified the controls that most significantly reduced breach costs, providing a clear investment roadmap. Organisations with extensive use of security AI and automation saved an average of $2.22 million per breach — the single largest cost reducer. DevSecOps adoption saved $1.68 million. Employee security training saved $1.49 million. Incident response planning and testing saved $1.49 million. Encryption of data at rest and in transit saved $1.02 million. Data loss prevention and anti-exfiltration tools provided significant cost reduction by preventing the breach from progressing to full data exposure — the most expensive phase of any incident.
Prevention vs Response: The Economic Case for ADX
The economics of breach prevention versus breach response are asymmetric. The annual cost of deploying BlackFog's Anti Data Exfiltration across an organisation of 500 endpoints is a fraction of the $4.88 million average breach cost — and vastly less than the $10.93 million average in healthcare. IBM's data confirms that the most expensive breaches are those where data is exfiltrated and exposed: they trigger regulatory action, customer notification, credit monitoring, legal costs, and reputational damage. Preventing exfiltration at the device level eliminates the most expensive consequences. The question is not whether your organisation can afford ADX — it is whether it can afford not to have it.
Frequently Asked Questions
What is the average cost of a data breach in 2025?
IBM's 2024 Cost of a Data Breach Report (the most recent comprehensive study) found the global average cost reached $4.88 million, a 10% increase year-over-year. This is the highest figure in the report's 19-year history.
How much does a data breach cost in the UK?
The average data breach cost in the UK is £3.4 million (approximately $4.2 million). UK costs are driven by GDPR enforcement by the ICO, mandatory breach notifications, and the UK's increasingly litigious environment for data breaches.
Which industry has the highest data breach costs?
Healthcare, at $10.93 million per breach — a position it has held for 14 consecutive years. The combination of extremely sensitive data (medical records, insurance details), strict regulatory requirements (HIPAA), and high patient litigation rates drives the premium.
How long does it take to detect a data breach?
The average time to identify a data breach is 194 days, according to IBM. Containment takes an additional 64 days on average. Organisations that detect and contain breaches in under 200 days save an average of $1.02 million compared to those that take longer.
What reduces the cost of a data breach the most?
Security AI and automation had the largest cost-reducing impact, saving an average of $2.22 million per breach. DevSecOps adoption ($1.68M savings), employee training ($1.49M), and incident response planning ($1.49M) were also highly effective.
Does cyber insurance cover the full cost of a data breach?
Rarely. Cyber insurance typically covers direct costs (forensics, notification, legal defence) but may exclude regulatory fines, long-term reputational damage, and business interruption beyond defined periods. Policy sublimits and exclusions mean organisations frequently absorb 30-50% of total breach costs despite having coverage.
How does the cost of prevention compare to the cost of a breach?
Enterprise anti-exfiltration deployment costs a fraction of the $4.88M average breach. IBM's data shows that organisations with comprehensive security tooling — including data loss prevention and exfiltration controls — pay significantly less when breaches occur, because the most expensive cost components (regulatory fines, customer notification, lost business) are driven by data exposure, which prevention eliminates.
Calculate your exfiltration prevention ROI
Kyanite Blue is an authorised BlackFog partner. We deploy, manage, and support ADX for organisations across every sector.
Get in touchReady to stop data exfiltration?
Start with a free 30-day BlackFog assessment — 25 devices, no obligation.