Technology & ProductsResearch suggests data breaches will reach cost of $2.1 trillion by 2019

Research suggests data breaches will reach cost of $2.1 trillion by 2019

According to leading market analysts Juniper Research, the increase in digitisation of business records will lead to the cost of data breaches reaching $2.1 trillion by 2019 worldwide.

According to leading market analysts Juniper Research, the increase in digitisation of business records will lead to the cost of data breaches reaching $2.1 trillion by 2019 worldwide.

In the report called “The Future of Cybercrime & Security: Financial and Corporate Threats & Mitigation” James Moar predicts the data breach cost for 2019 to be four times the amount estimated for 2015. Alongside this, as more business infrastructures get connected, the average cost of a data breach in 2020 will exceed $150 million.

According to Juniper, 60% of anticipated data breaches in 2015 will occur in North America but this figure will decrease due to more and more countries becoming economically stable and progressing to digitisation.

Moar states that most breaches will come from traditional IT systems, despite the recent growth in threats from new technologies. Regardless of the ability to transfer data over a network without human-to-human or human-to-computer interaction, mobile and other devices within the Internet of Things (IoT) are at risk but only at a minimal rate in comparison to existing network infrastructure.

This year has seen a decline in casual activist hacks and according to the research, cybercrime is becoming more professional with the introduction of cybercrime products such as malware creation software which is now readily available to buy. Juniper predicts that in the future, hacks will be less frequent but there will be more successful ones.

Moar explains that there have not been many IoT or mobile malware recently because no money can be made from this type of hack. “The kind of threats we will see on these devices will be either ransomware, with consumers’ devices locked down until they pay the hackers to use their devices, or as part of botnets, where processing power is harnessed as part of a more lucrative hack. With the absence of a direct payout from IoT hacks, there is little motive for criminals to develop the required tools,” Moar said.

Related Articles

The PEPPOL Network: On the highway to Asian and Trans-Tasman markets

Asia Pacific The PEPPOL Network: On the highway to Asian and Trans-Tasman markets

2m Sponsored | Anna Bawol
Citi introduces cross-currency liquidity management solution

Cash & Liquidity Management Citi introduces cross-currency liquidity management solution

4m Jay Ashar
Treasury TV: Building a case for an improved financial system with blockchain

10 Minutes With The Treasury Treasury TV: Building a case for an improved financial system with blockchain

2y Victoria Beckett
2017's most read: Open API: unlocking innovative new services in banking

Automation 2017's most read: Open API: unlocking innovative new services in banking

2y Lu Zurawski
The rise of the digitally augmented CFO

Automation The rise of the digitally augmented CFO

2y Avik Dasgupta
10 weeks to PSD2 implementation: What you need to know

Banking 10 weeks to PSD2 implementation: What you need to know

2y Alex Hammond
Getting ready for real-time payments

Banking Getting ready for real-time payments

2y Alex Hammond
Axletree Solutions launches updated treasury management solution, Treasurytree

Technology & Products Axletree Solutions launches updated treasury management solution, Treasurytree

2y GTNews

Whitepapers & Resources

Transaction Banking Survey 2019

Transaction Banking Survey 2019

5m
TIS Sanction Screening Survey Report

Payments TIS Sanction Screening Survey Report

8m
Enhancing your strategic position: Digitalization in Treasury

Payments Enhancing your strategic position: Digitalization in Treasury

9m
Netting: An Immersive Guide to Global Reconciliation

Netting: An Immersive Guide to Global Reconciliation

1y