Annual Study Reveals Average Cost of Cyber Crime per Organization Escalates to

Oct 6, 2015 • Press Release

HP Partners With Ponemon Institute for Sixth Annual Study; Results Identify Most Costly Crimes, Supports Need for Shift in Security Strategy to Protect Interactions Among Users, Applications and Data

PALO ALTO, CA--(Marketwired - Oct 6, 2015) - HP (NYSE: HPQ) today unveiled the results from its sixth annual study in partnership with the Ponemon Institute detailing the economic impact of cyber attacks across both the private and public sectors. The findings reveal a dramatic increase in the overall cost of cyber crime, while providing insight to the most costly cyber crimes and the approaches organizations can take to minimize the impact.

Conducted by the Ponemon Institute and sponsored by HP Enterprise Security, the 2015 Cost of Cyber Crime Study quantifies the annual cost of cyber crime for companies across seven countries including the U.S., U.K., Japan, Germany, Australia, Brazil and the Russian Federation.

In the U.S. study, researchers found the average annualized cost of cyber crime incurred by a benchmark sample of U.S. organizations was $15 million,1 representing a nearly 20 percent increase year over year and an 82 percent increase since the study's inception six years ago.2 The results also revealed the average time it takes to resolve a cyber attack -- 46 days -- has increased by nearly 30 percent during this same six-year period, with the average cost incurred to resolve a single attack totaling more than $1.9 million.1

The U.S. study also revealed that some organizations are addressing the significant costs associated with detection and recovery by making investments in security intelligence, which has been shown to reduce response costs and provide a significant return on investment.1

"As organizations increasingly invest in new technologies like mobile, cloud, and the Internet of Things, the attack surface for more sophisticated adversaries continues to expand," said Sue Barsamian (@suebarsamian), senior vice president and general manager, Enterprise Security Products, HP. "To address this challenging dynamic, we must first understand the threats that pose the most risk and then prioritize the security strategies that can make a difference in minimizing the impact."

As organizations strive to embrace new technologies while protecting their expanded environments, there is a need to shift security strategies from traditional network control and perimeter management to an advanced focus on protecting interactions among users, applications and data. The 2015 Cost of Cyber Crime Study demonstrates this shift; reporting organizations are now committing 20 percent of their security budgets to the application layer1, up 33 percent in just two years.2

Key findings from 2015 U.S. Cost of Cyber Crime Study


  • Cyber crimes continue to be very costly: The average annualized cost of cyber crime incurred was $15 million, with a range from $1.9 million to $65 million each year per company1. The net increase in the cost of cyber crime over the six year span of the study was 82 percent.2
  • Cyber crime costs vary by organizational size: Results revealed a positive relationship between organizational size (as measured by enterprise seats) and annualized cost. However, based on enterprise seats, results showed that small organizations incurred a significantly higher per capita cost than larger organizations.1
  • Cost to resolve cyber attack escalates: The average time to resolve a cyber attack was 46 days, with an average cost to participating organizations of more than $1.9 million during this 46-day period.1 This represents a 22 percent increase from last year's estimated average cost of approximately $1.5 million, which was based upon a similar 45-day resolution period.2


To be forewarned is to be forearmed
Understanding the cyber threats that pose the biggest risk and have the most economic impact to organizations can help enterprises better plan their security approach and investments.


  • The most costly cyber crimes are caused by denial of service, malicious insiders and malicious code. These accounted for more than 50 percent of all cyber crime costs per organization on an annual basis.1 Results also showed that malicious insider attacks can take longer to address, with an average of approximately 63 days to contain.1
  • Information theft represented the highest external cost, followed by the costs associated with business disruption. On an annual basis, information theft accounted for 42 percent of total external costs, while costs associated with disruption to business or lost productivity accounted for 36 percent of external costs (up 4 percent from the six-year average).2
  • Recovery and detection were the most costly internal activities, accounting for 55 percent of the total annual internal activity cost, with cash outlays and direct labor representing the majority of these costs.1


Organizations investing in and using security intelligence technologies and governance practices to address the crimes that proved most costly were more efficient in detecting and containing cyber attacks, thereby reducing costs otherwise incurred.1


  • Deploying a security information and event management (SIEM) solution led to an average cost savings of $3.7 million per year, compared to companies not deploying similar security solutions.
  • A sufficient budget can save an average of $2.8 million in attack response and management costs.
  • Employment of certified/expert security personnel can save $2.1 million.
  • The appointment of a high-level security leader can reduce costs by $2 million.1
  • The percentage of participating organizations realizing cost savings from the full deployment of enabling security technologies to guard against adverse data loss included: encryption technologies at 57 percent, access governance tools at 45 percent, data loss prevention tools at 38 percent and policy management tools at 36 percent.1


"With cyber attacks growing in both frequency and severity, understanding of the financial impact can help organizations determine the appropriate amount of investment and resources needed to prevent or mitigate the consequences of an attack," said Dr. Larry Ponemon (@ponemon), chairman and founder, Ponemon Institute (@PonemonPrivacy)."As seen in this year's study, the return on investment for organizations deploying security intelligence systems, such as SIEM, realized an average annual cost savings of nearly $4 million -- showcasing the ability to minimize impact by more efficiently detecting and containing cyber attacks."

The state of cyber security in local, state and federal government
To better understand the challenges IT and IT security practitioners face in keeping government agencies secure, HP also recently unveiled the results from a new study conducted in partnership with the Ponemon Institute. The 2015 State of Cybersecurity in Local, State & Federal Government Study shares findings including the frequency of attacks across local, state and federal sectors, the difficulty in sourcing adequate security expertise, and the information assets most at risk.

About HP Security

HP enables organizations to take a proactive approach to enterprise security, disrupting the life cycle of an attack through prevention and real-time threat detection. With market-leading products, services and innovative security research, HP Security brings a global network of security operations centers and more than 5,000 IT security experts to help customers strengthen their security posture to minimize risk and incident impact.

To learn more about HP Enterprise Security products and services on Twitter, please follow @HPSecurity 

About HP
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society.With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world.More information about HP is available at

1 "2015 Cost of Cyber Crime Study: United States," Ponemon Institute, October 2015.
2 Based on internal analysis of the results from the 2015 "Cost of Cyber Crime Study: United States" report compared to prior-year reports from Ponemon Institute.
3 "2015 State of Cybersecurity in Local, State & Federal Government," Ponemon Institute, October 2015.

2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

This press release contains forward-looking statements that involve risks, uncertainties and assumptions. If such risks or uncertainties materialize or such assumptions prove incorrect, the results of HP and its consolidated subsidiaries could differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements, including but not limited to statements of the plans, strategies and objectives of HP for future operations, including the separation transaction; the future performance of Hewlett-Packard Enterprise and HP Inc. if the separation is completed; any statements concerning expected development, performance, market share or competitive performance relating to products and services; any statements regarding anticipated operational and financial results; any statements of expectation or belief; and any statements of assumptions underlying any of the foregoing. Risks, uncertainties and assumptions include the need to address the many challenges facing HP's businesses; the competitive pressures faced by HP's businesses; risks associated with executing HP's strategy, including the planned separation transaction, and plans for future operations and investments; the impact of macroeconomic and geopolitical trends and events; the need to manage third-party suppliers and the distribution of HP's products and services effectively; the protection of HP's intellectual property assets, including intellectual property licensed from third parties; risks associated with HP's international operations; the development and transition of new products and services and the enhancement of existing products and services to meet customer needs and respond to emerging technological trends; the execution and performance of contracts by HP and its suppliers, customers, clients and partners; the hiring and retention of key employees; integration and other risks associated with business combination and investment transactions; the execution, timing and results of restructuring plans, including estimates and assumptions related to the cost and the anticipated benefits of implementing those plans; the execution, timing and results of the separation transaction or restructuring plans, including estimates and assumptions related to the cost (including any possible disruption of HP's business) and the anticipated benefits of implementing the separation transaction and restructuring plans; the resolution of pending investigations, claims and disputes; and other risks that are described in HP's Annual Report on Form 10-K for the fiscal year ended October 31, 2015, and HP's other filings with the Securities and Exchange Commission. HP assumes no obligation and does not intend to update these forward-looking statements.


Top 5 things you shouldnt miss from the new Living Progress Report

Blog Post

Highlights from HPEs First Quarter Earnings Results

Blog Post

After all the hard work, why do security gaps still exist?

Blog Post