
From a financial standpoint, while the global average cost of a data breach fell to $4.44 million, the average U.S. cost of a breach increased, reaching a record $10.22 million. Larger regulatory fines and higher detection and escalation costs in the U.S. contributed to this surge, IBM stated.
From an industry perspective, healthcare breaches remain the most expensive for the 14th consecutive year, costing an average of $7.42 million.
“Attackers continue to value and target the industry’s patient personal identification information (PII), which can be used for identity theft, insurance fraud and other financial crimes,” IBM stated. “Healthcare breaches took the longest to identify and contain at 279 days. That’s more than five weeks longer than the global average.”
Other interesting findings from the study include:
- The effect of storage location: “30% of all breaches involved data distributed across multiple environments, down from 40% last year. Meanwhile, breaches involving data stored on premises increased sharply to 28% from 20% last year. However, costs for each category differed. Data breaches involving multiple environments cost an average $5.05 million, while data breached on premises cost an average $4.01 million,” IBM stated.
- Phishing dominates among initial attack vectors: “Phishing replaced stolen credentials this year as the most common initial vector (16%) attackers used to gain access to systems. At an average $4.8 million per breach, it was also one of the costliest. Meanwhile, supply chain compromise surged to become the second most prevalent attack vector (15%), and second costliest ($4.91 million) after malicious insider threats ($4.91 million).”
- The cost of shadow AI: 20% of respondents said they suffered a breach due to security incidents involving shadow AI. “For organizations with high levels of shadow AI, those breaches added $670,000 to the average breach price tag compared to those that had low levels of shadow AI or none. These incidents also resulted in more personal identifiable information (65%) and intellectual property (40%) data being compromised. And that data was most often stored across multiple environments, revealing just one unmonitored AI system can lead to widespread exposure. The swift rise of shadow AI has displaced security skills shortages as one of the top three costly breach factors tracked by this report,” IBM stated.
- Time to identify and contain a breach decreased: “The mean time organizations took to identify and contain a breach fell to 241 days, reaching a nine-year low and continuing a downward trend that started after a 287-day peak in 2021,” IBM stated. “As noted in last year’s report, security teams continue to improve their mean time to identify (MTTI) and mean time to contain (MTTC) with the help of AI-driven and automation-driven defenses.”
In terms of recommendations, IBM emphasized identity and access management (IAM):
“Fortifying identity security with the help of AI and automation can improve IAM without overburdening chronically understaffed security teams. And as AI agents begin to play a larger role in organizational operations, the same rigor must be applied to protecting agent identities as to protecting human identities. Just like human users, AI agents increasingly rely on credentials to access systems and perform tasks. So, it’s essential to implement strong operational controls, or services that can help you do so, and maintain visibility into all non-human identity (NHI) activity. Organizations must be able to distinguish between NHIs using managed (vaulted) credentials and those using unmanaged credentials.”