May 1, 2018 By Shane Schick 2 min read

The mean cost of a cybersecurity breach involving employees or others within an organization is $8.7 million, according to a global study of insider threats.

Based on interviews with IT security professionals across more than 700 organizations, the “2018 Cost of Insider Threats: Global Organizations” report, conducted by the Ponemon Institute, benchmarked the common causes of insider incidents over a 12-month period.

While the mean cost of an insider threat is $8.7 million, the survey tallied the maximum cost at nearly $26.5 million. The minimum cost, meanwhile, is still significant at $489,100.

Insiders Cost Organizations Millions

Sixty-four percent of the attacks covered in the survey traced back to the negligent behavior of a staff member or contractor, and the number of such incidents increased to 13.4 from 10.5 two years ago. The average cost of an insider threat is $283,281, according to the report, but this figure can more than double to $648,845 if the incident involves the theft of credentials by an impostor.

Of course, the financial consequences of a cybersecurity breach largely depend on how quickly an organization can discover it and shut down whatever vulnerabilities were exploited. This is an area of weakness across the board: The report revealed that it took organizations an average of 73 days to contain an insider-related incident. Only 16 percent managed to get the threat under control within a month.

The Cost of an Insider Threat Varies by Size, Industry

While insider threats can be an issue anywhere, the study noted several differences depending on the size of the organization and the market in which it operates. Not surprisingly, the financial services sector tends to be hit hardest, with an average cost of $12.05 million. Manufacturing firms, meanwhile, lose an average of $8.86 million per incident.

The larger the firm, the worse it gets: Organizations with 1,001 to 5,000 employees lost an average of $5.79 million to insider threats. Even those with less than 500 employees incurred $1.8 million in such costs.

Negligent behavior is not the only factor contributing to insider threats. The report showed that 23 percent of attacks were deliberately malicious, while 13 percent involved user credential theft.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today