Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

Ethereum (ETH) Stalls at $3200, but Investors Back GeeFi’s (GEE) Upcoming Expansion With $300K Raised in 24H

2026-01-24

Cardano (ADA) Climbs 9%, but Experts Predict Investors Could Earn Millions from GeeFi’s (GEE) Upcoming Ecosystem Expansion

2026-01-24

GeeFi’s (GEE) Phase 3 Hits 90% as New App and Roadmap Update Highlights Stronger Privacy Focus Than Tron (TRX)

2026-01-24
Facebook X (Twitter) Instagram
Trending
  • Ethereum (ETH) Stalls at $3200, but Investors Back GeeFi’s (GEE) Upcoming Expansion With $300K Raised in 24H
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»Breaking News»Expensive security breache: cyber espionage
Breaking News

Expensive security breache: cyber espionage

Gugu LourieBy Gugu Lourie2015-09-15No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

 

A global survey of more than 5,500 companies in 26 countries, including South Africa, conducted by Kaspersky Lab in cooperation with B2B International in 2015 showed that the most expensive types of security breaches are employee fraud, cyber espionage, network intrusion and the failure of third party suppliers.  By Staff Writer


The average budget required to recover from a security breach is $551,000 for enterprises and $38,000 for small and medium businesses.

Averaging the variety:

A serious breach of IT security systems leads to many business issues. With damage being so diverse, it’s sometimes hard for the victims themselves to estimate the total cost of a breach. The methods used for this survey relied on data from previous years to pinpoint areas where companies have to spend money following a breach, or lose money as a result of a breach.

Typically businesses have to spend more on professional services (such as external IT experts, lawyers, consultants, etc.), and earn less due to lost business opportunities and downtime.

The probability of each separate consequence also varies and this, along with the size of a company has to be taken into account. A similar method was used to estimate indirect spend: the budget businesses allocate after the recovery, but is still connected to a security breach. So, on top of the aforementioned figures, businesses typically pay from $8,000 (SMBs) to $69,000 (enterprises) on staffing, training and infrastructure upgrades.

An average breached enterprise bill:

  • Professional services (IT, risk management, lawyers): up to $84K with a probability of 88%
  • Lost business opportunities: up to $203K, 29%
  • Downtime: up to $1,4M, 30%
  • Total average: $551,000
  • Indirect spend: up to $69K
  • Including reputation damage: up to $204,750
Top three major consequences of a breach
Top three major consequences of a breach

SMBs and enterprises: different ways to suffer

Nine out of ten companies that took part in our survey reported at least one security incident. However, not all incidents are serious and/or lead to the loss of sensitive data. Most frequently a serious security breach is the result of a malware attack, phishing, leaks of data by employees and exploited vulnerable software. Cost estimation provides a new look at the severity of IT security incidents and the outlook for SMBs and enterprises is slightly different.

Large companies pay significantly more when a security breach is the result of a trusted third party failure. Other expensive types of breaches include fraud by employees, cyber espionage and network intrusion. SMBs tend to lose a significant amount of money on almost all types of breach, paying a similar high price on recovering from acts of espionage as well as DDoS and phishing attacks.

“We have not seen too many reports on the consequences of IT security breaches, estimating a loss in real money. It is hard to come up with a reliable method of producing an average, but we understood that we had to do it, to bridge the theory of the corporate threat landscape with business practice. As a result, we have a list of corporate threats that caused the most significant damage – the ones we believe businesses should pay the utmost attention to,” said Brian Burke, head of market Intelligence Team, Kaspersky Lab.

  • Email TechFinancials.co.za at [email protected]

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Gugu Lourie
Gugu Lourie

Related Posts

Chery SA to Buy Nissan Rosslyn Plant, Save Jobs

2026-01-23

Directing The Dual Workforce In The Age of AI Agents

2026-01-22

Huawei Says The Next Wave Of Infrastructure Investment Must Include People, Not Only Platforms

2026-01-21

South Africa: Best Starting Point In Years, With 3 Clear Priorities Ahead

2026-01-12

How SA’s Largest Wholesale Network is Paving the Way for a Connected, Agile Future

2025-12-02

Oni-Tel Launches Inter-Data Centre Fibre Network With Digital Parks Africa As First Point Of Presence

2025-11-27

Vodacom Announces Multi-Year Strategic Collaboration With Google Cloud to Boost Africa’s AI Advancement

2025-11-25

Telkom Consumer Fuels Growth With Prepaid, Data Strategy

2025-11-18

Digital Public Infrastructure: The Need for Leadership And Sovereignty In South Africa’s Digital Future

2025-11-03

No Comments

  1. Pingback: Range Reports 2015 Earnings, Announces 2016 Capital Plans

  2. Pingback: Cyber Espionage Terrorism War Archive | Internet Crime Fighters Organization

Leave A Reply Cancel Reply

DON'T MISS
Breaking News

Chery SA to Buy Nissan Rosslyn Plant, Save Jobs

In a major development for South Africa’s automotive industry, Nissan and Chery SA have reached…

Directing The Dual Workforce In The Age of AI Agents

2026-01-22

Huawei Says The Next Wave Of Infrastructure Investment Must Include People, Not Only Platforms

2026-01-21

South Africa: Best Starting Point In Years, With 3 Clear Priorities Ahead

2026-01-12
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

The EX60 Cross Country: Built For The “Go Anywhere” Attitude

2026-01-23

Why Legal Businesses Must Lead Digital Transformation Rather Than Chase It

2026-01-23

Mettus Launches Splendi App To Help Young South Africans Manage Their Credit Health

2026-01-22

Over R270M In Phuthuma Nathi Dividends Remain Unclaimed

2025-11-27

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

Ethereum (ETH) Stalls at $3200, but Investors Back GeeFi’s (GEE) Upcoming Expansion With $300K Raised in 24H

2026-01-24

Cardano (ADA) Climbs 9%, but Experts Predict Investors Could Earn Millions from GeeFi’s (GEE) Upcoming Ecosystem Expansion

2026-01-24

GeeFi’s (GEE) Phase 3 Hits 90% as New App and Roadmap Update Highlights Stronger Privacy Focus Than Tron (TRX)

2026-01-24
Recent Posts
  • Ethereum (ETH) Stalls at $3200, but Investors Back GeeFi’s (GEE) Upcoming Expansion With $300K Raised in 24H
  • Cardano (ADA) Climbs 9%, but Experts Predict Investors Could Earn Millions from GeeFi’s (GEE) Upcoming Ecosystem Expansion
  • GeeFi’s (GEE) Phase 3 Hits 90% as New App and Roadmap Update Highlights Stronger Privacy Focus Than Tron (TRX)
  • AI Girlfriend Applications Tested for Context Awareness and Personalization
  • Why more and more investors are no longer “waiting for the market” and choosing daily income from crypto
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • Privacy Policy
  • About
© 2026 TechFinancials. Designed by TFS Media. TechFinancials brings you trusted, around-the-clock news on African tech, crypto, and finance. Our goal is to keep you informed in this fast-moving digital world. Now, the serious part (please read this): Trading is Risky: Buying and selling things like cryptocurrencies and CFDs is very risky. Because of leverage, you can lose your money much faster than you might expect. We Are Not Advisors: We are a news website. We do not provide investment, legal, or financial advice. Our content is for information and education only. Do Your Own Research: Never rely on a single source. Always conduct your own research before making any financial decision. A link to another company is not our stamp of approval. You Are Responsible: Your investments are your own. You could lose some or all of your money. Past performance does not predict future results. In short: We report the news. You make the decisions, and you take the risks. Please be careful.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.