HP Research: Cybercrime Costs Rise Nearly 40 Percent, Attack Frequency Doubles


Additional key findings include:

• Information theft and business disruption continue to represent the highest external costs. On an annual basis, information theft accounts for 44 percent of total external costs, up 4 percent from 2011. Disruption to business or lost productivity accounted for 30 percent of external costs, up 1 percent from 2011.

• Deploying advanced security intelligence solutions can mitigate the impact of cyber attacks. Organizations that deployed security information and event management (SIEM) solutions realized a cost savings of nearly $1.6 million per year. As a result, these organizations experienced a substantially lower cost of recovery, detection and containment than organizations that had not deployed SIEM solutions.

• Cyber attacks can be costly if not resolved quickly. The average time to resolve a cyber attack is 24 days, but it can take up to 50 days according to this year’s study. The average cost incurred during this 24-day period was $591,780, representing a 42 percent increase over last year’s estimated average cost of $415,748 during an 18-day average resolution period.

• Recovery and detection remain the most costly internal activities associated with cybercrime. On an annual basis, these activities account for almost half of the total internal cost, with operating expenses and labor representing the majority of the total.

“The purpose of this benchmark research is to quantify the economic impact of cyber attacks and observe cost trends over time,” said Dr. Larry Ponemon, chairman and founder, Ponemon Institute. “We believe a better understanding of the cost of cybercrime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.”

HP is changing the enterprise security landscape with the HP Security Intelligence platform, which uniquely leverages advanced threat research and powerful correlation of security events and vulnerabilities to deliver security intelligence spanning IT operations, applications and infrastructure.