{"id":32172,"date":"2022-08-29T09:00:00","date_gmt":"2022-08-29T14:00:00","guid":{"rendered":"https:\/\/thelogicgroup.com\/?p=32172"},"modified":"2022-05-23T15:31:44","modified_gmt":"2022-05-23T20:31:44","slug":"cost-of-a-data-breach","status":"publish","type":"post","link":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/","title":{"rendered":"What\u2019s the Actual Cost of a Data Breach?"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3j5hs8c-a912de0a58e08e9819f6c4e68fa856c4\">\n.avia-section.av-3j5hs8c-a912de0a58e08e9819f6c4e68fa856c4{\nbackground-color:#3187bc;\nbackground-image:unset;\n}\n<\/style>\n<div id='amg-diagonal-overlay'  class='avia-section av-3j5hs8c-a912de0a58e08e9819f6c4e68fa856c4 header_color avia-section-large avia-no-border-styling  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  avia-bg-style-scroll av-minimum-height av-minimum-height-25 av-height-25  container_wrap fullsize'   data-av_minimum_height_pc='25' data-av_min_height_opt='25'><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-32172'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2un38jw-3202d09371512dc6452830e93a2cf5db\">\n.flex_column.av-2un38jw-3202d09371512dc6452830e93a2cf5db{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2un38jw-3202d09371512dc6452830e93a2cf5db av_one_full  avia-builder-el-1  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2s1nu7a-e2187aca11fbba1d49cc4df107872f4b\">\n#top .av-special-heading.av-l2s1nu7a-e2187aca11fbba1d49cc4df107872f4b{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\n}\nbody .av-special-heading.av-l2s1nu7a-e2187aca11fbba1d49cc4df107872f4b .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2s1nu7a-e2187aca11fbba1d49cc4df107872f4b .av-subheading{\nfont-size:23px;\n}\n<\/style>\n<div  class='av-special-heading av-l2s1nu7a-e2187aca11fbba1d49cc4df107872f4b av-special-heading-h1 blockquote modern-quote modern-centered  avia-builder-el-2  avia-builder-el-no-sibling  av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >What\u2019s the Actual Cost of a Data Breach?<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-32172'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2oeve4s-a7a02a913153b09f792dbe81ca137397\">\n.flex_column.av-2oeve4s-a7a02a913153b09f792dbe81ca137397{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2oeve4s-a7a02a913153b09f792dbe81ca137397 av_one_full  avia-builder-el-3  el_after_av_section  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1wcn2vg-1308641238f624eb34927b2e9bb6cf9c\">\n.avia-image-container.av-1wcn2vg-1308641238f624eb34927b2e9bb6cf9c img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-1wcn2vg-1308641238f624eb34927b2e9bb6cf9c .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-1wcn2vg-1308641238f624eb34927b2e9bb6cf9c av-styling- avia-align-center  avia-builder-el-4  el_before_av_hr  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-32191 avia-img-lazy-loading-not-32191 avia_image ' src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_-1500x430.jpg\" alt='How much does a data breach really cost?' title='January Blog 1 - How much does a data breach really cost?'  height=\"430\" width=\"1500\"  itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1jyeoz0-28db2a8b0381022b95da5b632907a2f2\">\n#top .hr.hr-invisible.av-1jyeoz0-28db2a8b0381022b95da5b632907a2f2{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-1jyeoz0-28db2a8b0381022b95da5b632907a2f2 hr-invisible  avia-builder-el-5  el_after_av_image  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2s1p7uf-3372a32f6f6cd08b243b42531b76785a\">\n#top .av_textblock_section.av-l2s1p7uf-3372a32f6f6cd08b243b42531b76785a .avia_textblock{\nfont-size:20px;\n}\n<\/style>\n<section  class='av_textblock_section av-l2s1p7uf-3372a32f6f6cd08b243b42531b76785a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span style=\"font-weight: 400;\">When we think about cyberattacks, we tend to focus exclusively on the amount of damage they could cause to our networks. However, the <\/span><span style=\"font-weight: 400;\">impact of a data security breach<\/span><span style=\"font-weight: 400;\"> can be felt in more ways than one. A successful cyberattack could result in a company paying hefty sums for system recovery, regulatory fines, and even litigation. While that shouldn\u2019t come as a surprise, what may shock you is the actual <\/span><span style=\"font-weight: 400;\">cost of a data breach<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2s1pisa-ad1d245654f608cff1ffdf31efc182e9\">\n#top .av-special-heading.av-l2s1pisa-ad1d245654f608cff1ffdf31efc182e9{\npadding-bottom:10px;\ncolor:#4a4a4a;\n}\nbody .av-special-heading.av-l2s1pisa-ad1d245654f608cff1ffdf31efc182e9 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2s1pisa-ad1d245654f608cff1ffdf31efc182e9 .special-heading-inner-border{\nborder-color:#4a4a4a;\n}\n.av-special-heading.av-l2s1pisa-ad1d245654f608cff1ffdf31efc182e9 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2s1pisa-ad1d245654f608cff1ffdf31efc182e9 av-special-heading-h2 custom-color-heading blockquote modern-quote  avia-builder-el-7  el_after_av_textblock  el_before_av_textblock  amg-blog-heading av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >What\u2019s the Real Cost of a Data Breach?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2s1qh94-0ee89b9d41d3b31044f7cb311569de82 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">Between its own information and the personal information of your customers, your company possesses a lot of data. As a result, cybercriminals see your network as an enticing target just waiting to be invaded. Regardless of your industry, your organization has an obligation to protect the data of your clients as well as your business. With the high prevalence of cybercrime these days, it\u2019s never been more important to be aware of the <\/span><span style=\"font-weight: 400;\">consequences of a data breach<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Part of being aware of the consequences is understanding the real <\/span><span style=\"font-weight: 400;\">cost of a data breach<\/span><span style=\"font-weight: 400;\">. In their most recent report, <\/span><a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">IBM<\/span><\/a><span style=\"font-weight: 400;\"> and the <\/span><span style=\"font-weight: 400;\">Ponemon Institute<\/span><span style=\"font-weight: 400;\"> found that the <\/span><span style=\"font-weight: 400;\">average cost<\/span><span style=\"font-weight: 400;\"> of a cyberattack reached $<\/span><span style=\"font-weight: 400;\">4.24 million<\/span><span style=\"font-weight: 400;\"> in 2021. That\u2019s a 10% increase from the $<\/span><span style=\"font-weight: 400;\">3.86 million<\/span><span style=\"font-weight: 400;\"> reported back in 2019. Furthermore, the global cost of cyberattacks is expected to hit $6 trillion.<\/span><\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><\/p><\/div><div  class='flex_column av-3vijv0-8cb1b0b782329da2eb0416394b523da2 av_one_full  avia-builder-el-9  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2s1rbnn-e588e3c087116bf4bac9b8d7ddda63bd\">\n#top .av-special-heading.av-l2s1rbnn-e588e3c087116bf4bac9b8d7ddda63bd{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2s1rbnn-e588e3c087116bf4bac9b8d7ddda63bd .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2s1rbnn-e588e3c087116bf4bac9b8d7ddda63bd .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2s1rbnn-e588e3c087116bf4bac9b8d7ddda63bd .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2s1rbnn-e588e3c087116bf4bac9b8d7ddda63bd av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-10  el_before_av_textblock  avia-builder-el-first  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >What Are These Estimates Based On?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2s1rl32-b6afcbdbfee303315d09893f16422b5f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">After a cyberattack, there are several expenses a company may have to pay for. The joint report from IBM and the <\/span><span style=\"font-weight: 400;\">Ponemon Institute<\/span><span style=\"font-weight: 400;\"> takes into account hundreds of cost factors that range from regulatory fines to customer turnover and much more. The findings are based on 537 breaches in 17 countries that cover 17 industries.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2s1rzkd-d1035d465946c1191699f3175de0418f\">\n#top .av-special-heading.av-l2s1rzkd-d1035d465946c1191699f3175de0418f{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2s1rzkd-d1035d465946c1191699f3175de0418f .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2s1rzkd-d1035d465946c1191699f3175de0418f .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2s1rzkd-d1035d465946c1191699f3175de0418f .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2s1rzkd-d1035d465946c1191699f3175de0418f av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-12  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >What\u2019s Driving These Attacks?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2s1sti3-f43ca695cb6d05f662abf6470d60ea74 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">In 2021, cybercrime was up across the board, from zero-day exploits to server query language (SQL) injections. Some of the more notable types of attacks include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Web Application Attacks:<\/b><span style=\"font-weight: 400;\"> Web applications are cloud-based productivity tools. One of the most popular web applications is Google Suite. These programs make it easy for employees to share files and collaborate. Hackers target these services because of their easy access and reliance on user input.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Malicious Network Traffic:<\/b><span style=\"font-weight: 400;\"> Malicious traffic is any suspicious link, file, or connection that\u2019s created or received on a network. When opened, the threat can compromise a computer by creating a pathway for more malware.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Trojans:<\/b><span style=\"font-weight: 400;\"> A Trojan horse, or simply Trojan, is a type of malware that disguises itself as legitimate software. Once it\u2019s on your device, it creates holes in your security.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spyware:<\/b><span style=\"font-weight: 400;\"> Designed to steal your sensitive information, spyware hides in the background of your operating system and spies on what you do.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Botnets:<\/b><span style=\"font-weight: 400;\"> A botnet is a network of infected computers that work together to carry out other attacks online. Simply put, your computer becomes a zombie under the control of the attacker. One of the most dangerous botnets in history, dubbed Emotet, was actually taken down in 2021.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A development that fueled this problem was the switch to full remote or hybrid work environments. Remote workers don\u2019t have access to the same level of cybersecurity as office workers, making them more vulnerable to attack. However, 2021 was undoubtedly the year of ransomware and phishing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since the start of the pandemic, phishing has skyrocketed as opportunists attempted to capitalize on the global health scare. This tactic uses social engineering to trick the victim into performing an action or revealing sensitive information. Phishing scams only ramped up further as we made our way through 2021.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The rise of ransomware can be attributed to geopolitical, behavioral, and cybersecurity issues. From the cybersecurity perspective, a lot of companies failed to implement strong cybersecurity solutions. After getting attacked, these victims responded by paying the ransom, which only encouraged more attacks. The geopolitical aspect involves the rise of ransomware gangs. These gangs operate around the world and either carry out attacks on their own or sell their ransomware programs to interested buyers.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2s1twny-7cc4a205d7c159e7f45b59ea96a7b330\">\n#top .av-special-heading.av-l2s1twny-7cc4a205d7c159e7f45b59ea96a7b330{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2s1twny-7cc4a205d7c159e7f45b59ea96a7b330 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2s1twny-7cc4a205d7c159e7f45b59ea96a7b330 .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2s1twny-7cc4a205d7c159e7f45b59ea96a7b330 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2s1twny-7cc4a205d7c159e7f45b59ea96a7b330 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-14  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >How To Avoid Paying Cybersecurity Costs<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2s1ui12-7892c429f9e42807c736f89d871121cf '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">The only way to avoid paying the <\/span><span style=\"font-weight: 400;\">cost for a data breach<\/span><span style=\"font-weight: 400;\"> is to prevent the cyberattack from happening in the first place. You can do this by taking steps to strengthen your security posture, including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Educate Your Employees:<\/b><span style=\"font-weight: 400;\"> Take the time to educate your staff on the dangers of ransomware and other cyberthreats. This can involve online courses, ongoing emails with cybersecurity tips, and more. The more your team understands the risks, the less likely they are to fall victim to an attack.\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Train Your Employees:<\/b><span style=\"font-weight: 400;\"> In addition to education, you should train your workforce on how to spot suspicious activity. If you partner with a managed service provider (MSP), they can simulate cyberattacks that allow your employees to put what they\u2019ve learned to the test.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Implement Cybersecurity Tools:<\/b><span style=\"font-weight: 400;\"> An MSP can provide your network with enterprise-level cybersecurity tools capable of thwarting a variety of cyberattacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Maintain Communication:<\/b><span style=\"font-weight: 400;\"> Maintain ongoing communication about cybersecurity with your staff.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Configure Your Filters:<\/b><span style=\"font-weight: 400;\"> Configure your anti-spam filters to flag file types commonly used to hide ransomware like .exe and .vbs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Create Backups:<\/b><span> Frequently back up crucial files and systems so they can be recovered if a <\/span><span>ransomware attack<\/span><span> occurs.<\/span><\/li>\n<\/ul>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><\/p><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-t1fpxo-d8abb437f9536f5f5e44eb1b0b65993e\">\n.flex_column.av-t1fpxo-d8abb437f9536f5f5e44eb1b0b65993e{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-t1fpxo-d8abb437f9536f5f5e44eb1b0b65993e av_one_full  avia-builder-el-16  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2s1uu5b-5623ba94843f7497472a35ca5c866a40\">\n#top .av-special-heading.av-l2s1uu5b-5623ba94843f7497472a35ca5c866a40{\npadding-bottom:10px;\ncolor:#4a4a4a;\n}\nbody .av-special-heading.av-l2s1uu5b-5623ba94843f7497472a35ca5c866a40 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2s1uu5b-5623ba94843f7497472a35ca5c866a40 .special-heading-inner-border{\nborder-color:#4a4a4a;\n}\n.av-special-heading.av-l2s1uu5b-5623ba94843f7497472a35ca5c866a40 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2s1uu5b-5623ba94843f7497472a35ca5c866a40 av-special-heading-h2 custom-color-heading blockquote modern-quote  avia-builder-el-17  el_before_av_textblock  avia-builder-el-first  amg-blog-heading av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Protect Your Business With The Logic Group<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2s1v4av-d7a51d43b55500c7293e494bf049d658 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">The worst way to learn about the <\/span><span style=\"font-weight: 400;\">cost of a data breach<\/span><span style=\"font-weight: 400;\"> is to experience it firsthand. Let the experts at The Logic Group help you boost your cybersecurity posture. With our monitoring services, we can identify suspicious activity in your network and provide the correct <\/span><span style=\"font-weight: 400;\">data breach response<\/span><span style=\"font-weight: 400;\"> to protect your information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Contact us today to learn more.<\/span><\/p>\n<\/div>\n<\/div><\/section><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":32191,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[93,91,94,95,92],"class_list":["post-32172","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-consequences-of-a-data-breach","tag-cost-of-a-data-breach","tag-cybersecurity-costs","tag-data-breach-response","tag-impact-of-a-data-security-breach"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What\u2019s the Real Cost of a Data Breach? | The Logic Group<\/title>\n<meta name=\"description\" content=\"It\u2019s no secret that cyberattacks can affect companies financially, but you may be surprised to find out what the actual cost of a data breach is.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s the Real Cost of a Data Breach? | The Logic Group\" \/>\n<meta property=\"og:description\" content=\"It\u2019s no secret that cyberattacks can affect companies financially, but you may be surprised to find out what the actual cost of a data breach is.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"The Logic Group\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-29T14:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wpengine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"wpengine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/\"},\"author\":{\"name\":\"wpengine\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93\"},\"headline\":\"What\u2019s the Actual Cost of a Data Breach?\",\"datePublished\":\"2022-08-29T14:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/\"},\"wordCount\":2350,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_.jpg\",\"keywords\":[\"consequences of a data breach\",\"Cost of a Data Breach\",\"Cybersecurity Costs\",\"data breach response\",\"impact of a data security breach\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/\",\"url\":\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/\",\"name\":\"What\u2019s the Real Cost of a Data Breach? | The Logic Group\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_.jpg\",\"datePublished\":\"2022-08-29T14:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93\"},\"description\":\"It\u2019s no secret that cyberattacks can affect companies financially, but you may be surprised to find out what the actual cost of a data breach is.\",\"breadcrumb\":{\"@id\":\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#primaryimage\",\"url\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_.jpg\",\"contentUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_.jpg\",\"width\":2000,\"height\":1250,\"caption\":\"How much does a data breach really cost?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thelogicgroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What\u2019s the Actual Cost of a Data Breach?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thelogicgroup.com\/#website\",\"url\":\"https:\/\/thelogicgroup.com\/\",\"name\":\"The Logic Group\",\"description\":\"Turn to The Logic Group for all your Philadelphia managed IT services.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thelogicgroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93\",\"name\":\"wpengine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g\",\"caption\":\"wpengine\"},\"description\":\"This is the \\\"wpengine\\\" admin user that our staff uses to gain access to your admin area to provide support and troubleshooting. It can only be accessed by a button in our secure log that auto generates a password and dumps that password after the staff member has logged in. We have taken extreme measures to ensure that our own user is not going to be misused to harm any of our clients sites.\",\"sameAs\":[\"http:\/\/wpengine.com\"],\"url\":\"https:\/\/thelogicgroup.com\/author\/wpengine\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s the Real Cost of a Data Breach? | The Logic Group","description":"It\u2019s no secret that cyberattacks can affect companies financially, but you may be surprised to find out what the actual cost of a data breach is.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"What\u2019s the Real Cost of a Data Breach? | The Logic Group","og_description":"It\u2019s no secret that cyberattacks can affect companies financially, but you may be surprised to find out what the actual cost of a data breach is.","og_url":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/","og_site_name":"The Logic Group","article_published_time":"2022-08-29T14:00:00+00:00","og_image":[{"width":2000,"height":1250,"url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_.jpg","type":"image\/jpeg"}],"author":"wpengine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"wpengine","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#article","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/"},"author":{"name":"wpengine","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93"},"headline":"What\u2019s the Actual Cost of a Data Breach?","datePublished":"2022-08-29T14:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/"},"wordCount":2350,"commentCount":0,"image":{"@id":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_.jpg","keywords":["consequences of a data breach","Cost of a Data Breach","Cybersecurity Costs","data breach response","impact of a data security breach"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/","url":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/","name":"What\u2019s the Real Cost of a Data Breach? | The Logic Group","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_.jpg","datePublished":"2022-08-29T14:00:00+00:00","author":{"@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93"},"description":"It\u2019s no secret that cyberattacks can affect companies financially, but you may be surprised to find out what the actual cost of a data breach is.","breadcrumb":{"@id":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#primaryimage","url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_.jpg","contentUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/08\/Whats-the-Actual-Cost-of-a-Data-Breach_.jpg","width":2000,"height":1250,"caption":"How much does a data breach really cost?"},{"@type":"BreadcrumbList","@id":"https:\/\/thelogicgroup.com\/cost-of-a-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thelogicgroup.com\/"},{"@type":"ListItem","position":2,"name":"What\u2019s the Actual Cost of a Data Breach?"}]},{"@type":"WebSite","@id":"https:\/\/thelogicgroup.com\/#website","url":"https:\/\/thelogicgroup.com\/","name":"The Logic Group","description":"Turn to The Logic Group for all your Philadelphia managed IT services.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thelogicgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93","name":"wpengine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g","caption":"wpengine"},"description":"This is the \"wpengine\" admin user that our staff uses to gain access to your admin area to provide support and troubleshooting. It can only be accessed by a button in our secure log that auto generates a password and dumps that password after the staff member has logged in. We have taken extreme measures to ensure that our own user is not going to be misused to harm any of our clients sites.","sameAs":["http:\/\/wpengine.com"],"url":"https:\/\/thelogicgroup.com\/author\/wpengine\/"}]}},"_links":{"self":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts\/32172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/comments?post=32172"}],"version-history":[{"count":0,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts\/32172\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media\/32191"}],"wp:attachment":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media?parent=32172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/categories?post=32172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/tags?post=32172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}