The Lasting Damages of a Data Breach

Data Breach Damages

Data breaches make an organization’s representatives painfully aware of the common phrase, “Time is money.” They scramble to recover lost information and limit the reach hackers have.

It’s undoubtedly important to take those immediate actions, but affected parties must also come to terms with the potential long-term effects of data breaches.

Breaches Make Customer Engagement Suffer

In today’s society, people who stay abreast of cybersecurity news could become aware of several high-profile breaches per month. Plus, when well-known brands like Equifax and Macy’s have cybersecurity troubles, non-tech-savvy individuals find out too because the headlines of major newspapers keep them informed.

Research shows that people don’t just brush off their newly acquired knowledge and continue shopping with brands affected by data breaches. A Ping Identity study that polled more than 3,000 adults from several Western countries found that 78 percent them would cease their online engagement with companies associated with data breach events.

Plus, the study indicated that breaches could restrict new customers from engaging since 49 percent of respondents said they would not use or sign up for a service that had recently reported a data breach.

These findings illustrate the possible damage that could cause people to steer clear of brands that don’t stay well protected against cyber attacks.

There’s a Long-Term, Detrimental Effect on Stock Prices

Corporations know how vital it is to perform well in the stock market. Failing to do so could erode investor confidence and lead to other signs of poor performance. Recent findings indicate that breaches have prolonged effects on companies’ stock market competitiveness.

The research looked at more than two dozen companies listed on the New York Stock Exchange that publicly disclosed breaches of at least 1 million records. LinkedIn, eBay and Apple were some of the names evaluated. It found that after breaches happened, entities underperformed on the stock market, sometimes up to three years after the event occurred.

Not surprisingly, when companies lost especially sensitive information like social security numbers and credit card numbers, the overall drops in performance were worse than if the entities didn’t have such data stolen. The worst effects were typically seen two weeks after breaches occurred.

The Many Kinds of Financial Costs Associated With Data Breaches

It’s not always easy to pinpoint the total costs of a data breach, especially because numerous expenses could result from them. For example, a company that gets hit with a data breach could lose profits immediately afterward if productivity plummets while they try to resolve the problem. Moreover, it’s also been reported that 38 percent of breached companies loose more than a fifth of their revenue due to those events.

Also, the financial damage goes up depending on the number of records lost during a breach. A 2018 study found that each record lost during a data breach costs an average of $148. The study also found that the cost is significantly more — over 0 per instance — for records associated with the health care sector.

Affected companies could also rack up expenses related to legal fees and court orders. When Target dealt with a Black Friday data breach that compromised more than 110 million records, it had to pay an $18.5 million settlement split among all the affected U.S. states.

Besides requiring the retail brand to pay the amount, the court ruled that Target had to tighten up its security and encryption programs and put forth the money needed to maintain the enhanced protection. So although those improvements likely led to the prevention of future attacks, they still represent costs that impacted the company’s finances.

The Adverse Impact on Human Resources

It’s important for employees to take pride in their workplaces and feel secure being part of the team, and a data breach could ruin those positive emotions. According to a study from Carbonite, 24 percent of data-breached companies said employee morale suffered after those instances, and a quarter of respondents reported poor effects on work-life balance. Moreover, 11 percent of organizations said employees quit after breaches.

Facebook has had a rough year due to the Cambridge Analytica scandal that caused public outrage over the breach of at least 50 million profiles. After the incident, people questioned whether they could trust the social media company to handle their data responsibly, and many deleted their profiles. A recent internal poll shows that employees are feeling the effects of being in the spotlight too.

Just over half of the almost 29,000 Facebook workers who participated in the survey said they felt optimistic about the company’s future, representing a 32-point drop from the previous year. Additionally, although 53 percent said they believed Facebook was making the world a better place, that statistic was also 19 points lower than last year.

When companies go through data breaches, they have to address more than just the concerns, low moods and fears of their employees. They also need to repair the reputational damage that could make it more difficult for human resources team members to hire for open positions. If people think society has a generally poor view of a company and they have doubts too, they may not want to work for the organization.

It’s Impossible to Get a Complete Picture

Since each data breach could have various long-term costs associated with it, it’s not possible for companies to measure the ramifications that may occur if they’re among the future victims of data breaches or have already experienced such issues.

Although this piece focuses on external attacks, it’s crucial for company leaders to remember that breaches can also happen due to employee errors or lack of information, making training essential.

Furthermore, organizations must take a proactive approach to breach prevention, realizing that reacting to the events only after they happen may exacerbate the damage.

By Kayla Matthews

Mark Greenlaw
Free Cloud Migrations are Expensive The cloud is becoming the primary place where work gets done. By 2025, Gartner estimates that enterprise spending on public cloud computing will overtake traditional IT hardware. Why? One reason ...
Get Smarter
Higher Education A big challenge for professionals of all ages is time. Balancing the responsibilities of work and life leave little time for self-improvement in the form of education. But ongoing education is more than ...
Tosin Vaithilingam
Amid economic uncertainty lies opportunities Lately, it seems that each day brings news of more economic uncertainty. Companies that have been navigating the pandemic for the past two and a half years have been suddenly ...
Frank Suglia
Migrating Microsoft Office 2013 As of April 11, 2023, Microsoft will stop supporting Office 2013. The decision to end support for Office 2013 should come as no surprise. Over the past several years, Microsoft has ...
Gary Bernstein
Common DevOps Misconceptions 86% of businesses say it’s important for their company to develop and produce new software fast to win market share and beat the competition, Harvard Business Review reveals. Yet, just 10% of businesses ...
Louis
More CISOs will have to deliver revenue growth to protect their budgets and grow their careers in 2023 and beyond, and a core part of that will be getting multicloud security right. It’s the most common infrastructure strategy for ...
Steve Prentice
The Era of Microlearning Becoming employable and then staying employable requires ongoing, up to date knowledge, and this can become something of a dilemma. Many of us grew up with a traditional understanding of the ...
Mark Ardito
OPEX is the new battleground I recently wrote in CloudTweaks about how cloud is forcing CIOs to work more closely with their C-suite colleagues to sell the benefits and its role as a business driver ...
David Fletcher Blown Image
It’s Magic
The Manuscript.png
Growing Up.png

PLURALSITE

Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization. 

(ISC)²

(ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees.

CYBRARY

CYBRARY Open source Cyber Security learning. The world's largest cyber security community. Cybrary provides free IT training certificates. Courses for beginners, intermediates, and advanced users are available.