The Cost of a Breach: 10 Terrifying Cybersecurity Stats Your Customers Need to Know

By Emily Matzelle

Mar 20, 2025

Share this post

As an MSP, you know cybersecurity is a big deal. For businesses of all sizes, a breach could mean extensive damage and cost, potentially causing businesses to close their doors permanently. Your customers—even the ones that didn’t heed your warnings—will look to you as their IT provider for answers and wonder if you could have done more to prevent the attack or mitigate the damage. It’s no secret that this lost trust will harm your customer relations and your brand, ultimately putting your MSP in jeopardy.

How can you tackle the cybersecurity conversation with your clients and convince them they need to be prepared?

The scary reality is, if your customers aren’t prepared for a cyberattack, they could lose everything—and ultimately, so could you. Here, we’ve compiled stats to help you illustrate the reality of the cybersecurity threat to your customers and spark action.

10. Cybersecurity should be top-of-mind for businesses. Everybody is a potential target.

GTIA Cyber Stats_1

The global cybersecurity market size was valued at USD 172.24 billion in 2023. The market is projected to grow from USD 193.73 billion in 2024 to USD 562.72 billion by 2032 according to Fortune Business Insights. And while that number is so large it’s hard to wrap your head around it, here’s another stat that might hit closer to home. According to the Verizon 2024 Data Breach Investigations Report, 76% of breaches are caused by human error, meaning they were likely preventable. Yes, you read that right. Would that catch your customer’s attention?

9. When a security breach occurs, companies have to hit pause, losing precious time and revenue. This hits small businesses especially hard.

GTIA Cyber Stats_2

The average cost of a data breach jumped to USD 4.88 million from USD 4.45 million in 2023. A rise in the cost of lost business, including operational downtime and lost customers, and the cost of post-breach responses, such as staffing customer service help desks and paying higher regulatory fines, drove this increase. Breaches involving stolen or compromised credentials took the longest to identify and contain (292 days) of any attack vector. Phishing attacks lasted an average of 261 days and social engineering attacks took an average of 257 days.

8. Depending on the type of information that was compromised, businesses may be on the hook for legal fees.

GTIA Cyber Stats_3

If a settlement is in the works, a small business could be in limbo for quite some time. It’s common for 3 to 5 years to pass between a breach and a settlement. During that time, the company is paying legal fees, expenses and filing costs—not to mention the cost of the actual settlement.

7. If a company has broken a cybersecurity law, they could also be subject to penalties and fines.

GTIA Cyber Stats_4

Violating cybersecurity laws is an expensive and disruptive process. To-date, Meta tops the list of big-ticket sanctions, hit with a $1.3 billion fine for unlawfully transferring personal data from the European Union to the United States. Do your customers know if they are in compliance with current regulations?

  • Health Insurance Portability and Accountability Act (HIPAA) fines are calculated based on the number of medical records exposed with fines ranging from $50 to $50,000 per record. 

  • Gramm-Leach-Bliley Act (GLBA) requires companies offering consumers financial products to explain their information-sharing practices and safeguard sensitive data. Fines can be as high as $100,000 for each violation, and the officers and directors of the organization may be fined up to $10,000 personally.

  • General Data Protection Regulation (GDPR) mandates the use of encryption and is especially punitive, with fines potentially totaling tens of millions of dollars.

  • Being in breach of Payment Card Industry Data Security Standards (PCI DDS) exposes organizations to minimum fines of $5,000 per month and maximum fines of $100,00 per month.  

6. If a company is found liable for the leaked information, victims could request compensation.

GTIA Cyber Stats_5

Perhaps the most sizable example is the Equifax breach that occurred in 2017. Two years later, Equifax agreed to pay nearly $700 million to settle federal and state investigations into how it handled a massive data breach that affected nearly 150 million people. The settlement included $425 million to directly help consumers affected by the breach. The restitution fund started with $300 million dedicated to consumer compensation, with an additional $125 million if the initial funds ran out.

5. When a company is dealing with a data breach, normal everyday business can fall through the cracks. Lost sales result in lost profits and a very lean bottom line.

GTIA Cyber Stats_6

According to a survey of 1,000 U.S. consumers from API and application protection platform ThreatX, 60% of respondents are less likely to work with a retailer or brand that has suffered a data breach. In addition, only 10% of respondents reported feeling protected by retailers and brands, and almost half (48%) said their personal data has been left vulnerable following a data breach due to an organization’s lack of protection. Nine in 10 of those respondents agreed they are concerned this lack of protection will negatively impact their lives.

4. Identifying the breach is one thing, but remediating the situation is an entirely different animal—and the less prepared your customer, the more expensive it will be.

GTIA Cyber Stats_7

Remind your customers that the best defense is often a good offense. The cost of remediation can skyrocket as a companies:

  • Document the attack
  • Quarantine compromised hardware and software
  • Contain and eliminate the threat
  • Analyze activity logs
  • Fix the vulnerability that caused the breach
  • Repair or replace infected systems
  • Implement security improvements 

3. And when operations are subpar, your client starts to lose customers.

GTIA Cyber Stats_8

  • Organizations with between 1,001 and 5,000 employees tend to have the most extensive collection of PII. But these companies face dual challenges: A larger data corpus from a more diverse range of data sources and less robust processes or staffing to manage it. Do any of your customers fall into this category?
  •  

2. A breach can damage your customer’s reputation—and it can take years to recover.

GTIA Cyber Stats_9

The biggest cost of a cyberattack is reputation. When a major data breach occurs, customers and clients may feel less secure with your company, causing them to pick up and leave. And when a company’s internal systems are down for an extended period, the stock price can drop, which is exactly what happened in the recent CrowdStrike outage. Deloitte determined that up to 90% of the total costs in a cyberattack occur beneath the surface. Hidden costs, like damaged credibility, can affect a business for years after a breach. What’s more, loss of trust in the business, diminished brand reputation and increased costs concerning debt financing are not covered by insurance. 

1. In a worst-case scenario, your customer can lose their entire business.

GTIA Cyber Stats_10

If everything listed above happens, it can be hard to keep a business afloat. This is especially true for small businesses and why 60% of small businesses that are victims of a cyberattack go out of business within six months.  

These statistics tell a story—and it’s a pretty scary one. One (or more) of these situations can easily happen to your customers if they aren’t prepared. But they can also happen to your MSP if you’re not practicing what you preach—creating a scenario that not only puts your business in jeopardy, but likely exposes sensitive customer data to cybercriminals, which can exponentially compound the negative impacts of a breach. Look no further than the Kaseya ransomware attack that impacted the MSP community in 2021.

At the end of the day, being the example of a security-focused MSP not only protects your business, but it also adds an additional layer of protection to your customers and encourages them to take the cybersecurity steps you recommend.

Engage in an ISAO for Support

A recent survey of MSPs found that 77% struggle with juggling multiple cybersecurity solutions. Fortunately, you have access to real-time support. To help MSPs accelerate their cyber resilience, the GTIA Information Sharing and Analysis Organization (ISAO) tailors proactive cyber threat intelligence and actionable analysis to meet the needs of MSPs, solution providers, technology vendors and their customers. You also gain access to a trusted community of peers where you can share cybersecurity information and best practices.

You can’t be proactive if you don’t know the potential for a problem exists. You can’t take preventative measures if you don’t know what’s happening in the threat landscape. Engaging with the ISAO keeps you informed and prepared, making it a cornerstone of a technology company’s strong cybersecurity practice.

Check out GTIA Cybersecurity Programs for more information.

Follow GTIA on LinkedIn! #WeAreGTIA

 

 

 

 

Related Posts:

From documentation to transparency, check out these useful tips for MSPs to being a trusted advisor to clients.
By Ashley Watters / Mar 28, 2024

8 Tips for Building Trust Between MSPs and Clients

MSPs rely on excellent cybersecurity practices and positive client relationships to ensure future growth. A critical factor in that growth involves building long-term trust with clients. In fact, GTIA’s State of Cybersecurity 2024 report found that “risk management is the driving force behind cybersecurity.” Since cybersecurity remains among the top priorities for organizations and they are consistently looking to providers to help them manage their risk levels, it’s essential that MSPs be prepared to build a trust relationship with clients.
Making security an integral part of your organization is the only way to achieve true resilience.
By Ashley Watters / Dec 5, 2023

How to Encourage Incident Reporting with Employees

Cyberattacks are attempted once every 39 seconds, according to University of Maryland report—they are pervasive and growing in complexity, sophistication and frequency. Even the most prepared MSPs can’t protect against every threat. That’s why it’s so important that employees report incidents, suspicious activity and errors immediately.