 {"id":470174,"date":"2024-05-07T16:29:23","date_gmt":"2024-05-07T23:29:23","guid":{"rendered":"https:\/\/jorgep.com\/blog\/?p=470174"},"modified":"2026-02-18T13:02:14","modified_gmt":"2026-02-18T20:02:14","slug":"the-cost-of-a-security-breach-government","status":"publish","type":"post","link":"https:\/\/jorgep.com\/blog\/the-cost-of-a-security-breach-government\/","title":{"rendered":"The Cost of a Security Breach (Government)"},"content":{"rendered":"\n<div style=\"font-family: Verdana, Geneva, sans-serif; font-size: 11px;\"><b>Disclaimer<\/b>: \u00a0I work for <a href=\"https:\/\/www.dell.com\/en-us\/work\/learn\/by-service-type-deployment\">Dell Technology Services<\/a> as a Workforce Transformation Solutions Principal.\u00a0 \u00a0 It is my passion to help guide organizations\u00a0through the current technology transition specifically as it relates to <a href=\"https:\/\/www.delltechnologies.com\/en-us\/what-we-do\/workforce-transformation.htm\">Workforce Transformation<\/a>.\u00a0 Visit <a href=\"https:\/\/www.delltechnologies.com\/en-us\/index.htm\">Dell Technologies<\/a>\u00a0site for more information.\u00a0 Opinions are my own and not the views of my employer.<\/div>\n<div><\/div><br>\n\n\n\n<p class=\"has-theme-palette-8-background-color has-background\">Note:  Some of the research on this page has been done using <a href=\"https:\/\/copilot.microsoft.com\/\">Microsoft Copilot<\/a> and <a href=\"https:\/\/claude.ai\/\">Claude<\/a><\/p>\n\n\n\n<p>Cybersecurity breaches in government cities are a critical concern, and they can have significant consequences.<\/p>\n\n\n\n<p>See also a <a href=\"https:\/\/jorgep.com\/blog\/list-of-cyberattacks\/\" data-type=\"page\" data-id=\"470193\">searchable list of reported cybersecurity Breaches<\/a><\/p>\n\n\n\n<p>A cyber incident will directly consume a company\u2019s resources, leading to an increased cost of doing business. In 2022, the global average cost of a data breach reached <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">$4.35 million, while the number is more than double in the U.S.,<\/a> averaging $9.44 million. These expenses can include everything from ransom payments and lost revenues to business downtime, remediation, legal fees, and audit fees. For example, the audit fees for companies following data breaches can be about <a href=\"https:\/\/fardapaper.ir\/mohavaha\/uploads\/2019\/01\/Fardapaper-The-impact-of-audit-firms%E2%80%99-characteristics-on-audit-fees-following-information-security-breaches.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">13.5% higher<\/a> than those for firms without breaches. While millions of dollars in losses can bankrupt a small company but not have much of an effect on a public company, the attackers are generally \u201csmart\u201d enough to cause more problems for the bigger companies. For example, ransomware attacks had a much bigger financial impact on the health care sector, with over <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/ransomware-attacks-hospitals-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">$7.8 billion<\/a> lost due to downtime alone in 2021.<\/p>\n\n\n\n<p>Calculating the cost of a cybersecurity breach involves several factors. Let\u2019s explore them:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Nature of the Breach<\/strong>: The type of data breach directly correlates with the ensuing costs. For instance, a breach involving sensitive customer information might have more significant financial implications than a less critical incident.<\/li>\n\n\n\n<li><strong>Reputational Damage<\/strong>: The impact on an organization\u2019s reputation can be a formidable cost driver. Data breaches can erode trust and confidence among customers, partners, and stakeholders, leading to long-term financial consequences.<\/li>\n\n\n\n<li><strong>Business Downtime<\/strong>: Severe business downtime following a breach can have cascading financial effects. Disruptions in operations, loss of productivity, and missed revenue opportunities contribute to the overall cost.<\/li>\n\n\n\n<li><strong>Regulation and Litigation<\/strong>: Compliance with data protection regulations and legal obligations can result in substantial expenses. Organizations may face fines, legal fees, and settlements due to non-compliance or negligence.<\/li>\n\n\n\n<li><strong>Cyber Insurance Challenges<\/strong>: While cyber insurance can mitigate some costs, policy terms, deductibles, and coverage limitations impact the overall financial burden.<\/li>\n\n\n\n<li><strong>Ransom Payments<\/strong>: In cases of ransomware attacks, paying the ransom (if chosen) adds to the breach cost. Balancing the decision between paying or not paying can be complex.<\/li>\n<\/ol>\n\n\n\n<p>Additionally, specific cost components include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Direct Costs<\/strong>: These are expenses related to dealing with a detected breach. They include forensic activities, information security investigations, fines, and compensating affected parties.<\/li>\n\n\n\n<li><strong>Indirect Costs<\/strong>: These are connected to the time, effort, and other resources necessary to cover losses resulting from the breach. Examples include reputational damage, lost business opportunities, and recovery efforts.<\/li>\n<\/ul>\n\n\n\n<p>To fully understand the impact of data breaches and create models for predicting future expenses, organizations must consider both direct and indirect costs <\/p>\n\n\n\n<p>Here are <strong>several examples<\/strong> of recent local government cybersecurity breaches, along with some relevant information:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>City<\/th><th>Impact<\/th><th>Cost<\/th><th>Details<\/th><\/tr><\/thead><tbody><tr><td>Atlanta, Georgia<\/td><td>Ransomware attack<\/td><td>$15 million<\/td><td>In 2018, Atlanta faced a costly ransomware attack that significantly impacted city services.<br><br><a href=\"https:\/\/icma.org\/articles\/pm-magazine\/look-local-government-cybersecurity-2020\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Atlanta, Georgia (2018)<\/strong>: A ransomware attack cost the city $15 million<\/a>.<\/td><\/tr><tr><td>Baltimore, Maryland<\/td><td>Ransomware attack<\/td><td>$18 million<\/td><td>Baltimore also fell victim to a ransomware attack, resulting in substantial financial losses.<br><a href=\"https:\/\/icma.org\/articles\/pm-magazine\/look-local-government-cybersecurity-2020\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Baltimore, Maryland (2019)<\/strong>: Another ransomware attack resulted in an $18 million expense for the city<\/a>.<\/td><\/tr><tr><td>City of Dallas, TX<\/td><td>Ransomware Attack<\/td><td>$8.5 Million<\/td><td><a href=\"https:\/\/abc7.com\/san-bernardino-cyberattack-ransom-paid-hackers\/13215833\/\"><a href=\"https:\/\/www.securityweek.com\/city-of-dallas-details-ransomware-attack-impact-costs\/\">City of Dallas Details Ransomware Attack Impact, Costs\u00a0 &#8211; SecurityWeek<\/a><\/a><\/td><\/tr><tr><td>San Bernandino County, CA<\/td><td>Ransomware attack<\/td><td>$2M<\/td><td><a href=\"https:\/\/abc7.com\/san-bernardino-cyberattack-ransom-paid-hackers\/13215833\/\">San Bernardino County pays $1.1M ransom after cyberattack disrupts Sheriff&#8217;s Department systems<\/a><\/td><\/tr><tr><td>Greenville, NC<\/td><td>Cyber incidents<\/td><td>N\/A<\/td><td>Greenville reported cybersecurity incidents in both 2019 and 2020.<br><a href=\"https:\/\/icma.org\/articles\/pm-magazine\/look-local-government-cybersecurity-2020\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Greenville, North Carolina<\/strong>: Reported cyberattacks in 2019 and 2020<\/a><\/td><\/tr><tr><td>Torrance, CA<\/td><td>Cyberattacks<\/td><td>N\/A<\/td><td>Torrance, California, experienced cyberattacks during the same period.<br><a href=\"https:\/\/icma.org\/articles\/pm-magazine\/look-local-government-cybersecurity-2020\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Torrance, California<\/strong>: Also reported cyberattacks during the same period<\/a><\/td><\/tr><tr><td>New Orleans, LA<\/td><td>Cyber incidents<\/td><td>N\/A<\/td><td>New Orleans faced various cyber incidents.<br><a href=\"https:\/\/icma.org\/articles\/pm-magazine\/look-local-government-cybersecurity-2020\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>New Orleans, Louisiana<\/strong>: Experienced cyber incidents<\/a><\/td><\/tr><tr><td>Texas (22 cities)<\/td><td>Targeted by attacks<\/td><td>N\/A<\/td><td>Multiple local government organizations in Texas were targeted.<br><a href=\"https:\/\/icma.org\/articles\/pm-magazine\/look-local-government-cybersecurity-2020\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Texas (22 cities)<\/strong>: Various local government organizations in Texas were targeted<\/a><\/td><\/tr><tr><td>Miller County, AR<\/td><td>Compromised mainframe<\/td><td>N\/A<\/td><td>A compromised government mainframe led to malware spreading across the state.<br><a href=\"https:\/\/www.govpilot.com\/blog\/government-data-breach-prevention-and-examples\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Miller County, Arkansas<\/strong>: A compromised government mainframe led to malware spreading across the state<\/a><\/td><\/tr><tr><td>Fresno, CA<\/td><td>Phishing scam<\/td><td>$400,000<\/td><td>Fresno lost over $400,000 due to a successful phishing scam.<br><a href=\"https:\/\/icma.org\/articles\/pm-magazine\/look-local-government-cybersecurity-2020\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Fresno, California<\/strong>: Lost over $400,000 due to a phishing scam<\/a><\/td><\/tr><tr><td>California DMV<\/td><td>Data Breach<\/td><td>N\/A<\/td><td>Data Breach Feb 2021<\/td><\/tr><tr><td>Various US cities<\/td><td>Ransomware attacks<\/td><td>N\/A<\/td><td>In 2021-2022, 106 local governments faced ransomware attacks.<br><a href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/physical-impact-of-cyberattacks-on-cities\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Various US cities (2021-2022)<\/strong>: 106 local governments faced ransomware attacks<\/a><\/td><\/tr><tr><td>Public safety call centers<\/td><td>Targeted<\/td><td>N\/A<\/td><td>Over the last two years, 180 public safety call centers were targeted.<br><a href=\"https:\/\/icma.org\/articles\/pm-magazine\/look-local-government-cybersecurity-2020\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>180 public safety call centers<\/strong>: Targeted in the last two years<\/a>.<br><\/td><\/tr><tr><td>Federal, state, and local governments<\/td><td>Ransomware attacks<\/td><td>N\/A<\/td><td>Various government entities were hit by ransomware attacks in 2020.<br><br><a href=\"https:\/\/icma.org\/articles\/pm-magazine\/look-local-government-cybersecurity-2020\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Federal, state, and local governments (2020)<\/strong>: Hit by ransomware attacks<\/a>.<br><\/td><\/tr><tr><td>U.S. government organizations<\/td><td>Ransomware attacks<\/td><td>$18.88 billion<\/td><td>Comparitech research estimated significant costs due to ransomware attacks in 2020.<br> 79 ransomware attacks against U.S. <a href=\"https:\/\/icma.org\/articles\/pm-magazine\/look-local-government-cybersecurity-2020\" target=\"_blank\" rel=\"noreferrer noopener\">government organizations in 2020, costing an estimated $18.88 billion in downtime and recovery<\/a>.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>These examples highlight the urgent need for robust cybersecurity measures in local government entities.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2023\/volume-1\/the-true-cost-of-a-data-breach\">The True Cost of a Data Breach (isaca.org)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blog.securelayer7.net\/data-breach-costs\/\">Understanding the Cost and Impact of Data Breaches <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">Cost of a data breach 2023 | IBM<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.statista.com\/statistics\/273575\/us-average-cost-incurred-by-a-data-breach\/\">Cost of a data breach in the U.S. 2023 | Statista<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/securityintelligence.com\/articles\/cost-data-breach-government-agencies\/\">The Cost of a Data Breach for Government Agencies (securityintelligence.com)<\/a><\/li>\n\n\n\n<li><a is=\"cib-link\" href=\"https:\/\/icma.org\/articles\/pm-magazine\/look-local-government-cybersecurity-2020\" target=\"_blank\" rel=\"noreferrer noopener\">A Look at Local Government Cybersecurity in 2020<\/a><\/li>\n\n\n\n<li><a is=\"cib-link\" href=\"https:\/\/www.govpilot.com\/blog\/government-data-breach-prevention-and-examples\" target=\"_blank\" rel=\"noreferrer noopener\">Government Data Breach Prevention 2023<\/a><\/li>\n\n\n\n<li><a is=\"cib-link\" href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/physical-impact-of-cyberattacks-on-cities\" target=\"_blank\" rel=\"noreferrer noopener\">The Physical Impact of Cyberattacks on Cities<\/a><\/li>\n\n\n\n<li><a is=\"cib-link\" href=\"https:\/\/www.weforum.org\/agenda\/2019\/09\/our-cities-are-increasingly-vulnerable-to-cyberattacks-heres-how-they-can-fight-back\/\" target=\"_blank\" rel=\"noreferrer noopener\">Our cities are under cyberattack. Here\u2019s why &#8211; and what to do about it<\/a><\/li>\n\n\n\n<li><a is=\"cib-link\" href=\"https:\/\/www.americancityandcounty.com\/2022\/02\/16\/state-and-local-governments-will-be-prime-cyber-targets-in-2022-how-to-stay-protected\/\" target=\"_blank\" rel=\"noreferrer noopener\">State and local governments will be prime cyber targets in 2022<\/a><\/li>\n\n\n\n<li><\/li>\n\n\n\n<li>Cyber Attacks list: \n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/heimdalsecurity.com\/blog\/companies-affected-by-ransomware\/\">Recent Ransomware Attacks: Ransoms, Consequences, and More (heimdalsecurity.com)<\/a> December 2023\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.cm-alliance.com\/cybersecurity-blog\/major-cyber-attacks-data-breaches-ransomware-attacks-in-april-2024\">Major Cyber Attacks, Data Breaches &amp; Ransomware Attacks in April 2024 (cm-alliance.com)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudsecuretech.com\/the-complete-list-of-cyber-security-breaches-around-the-world\/#government\"><\/a><a href=\"https:\/\/www.cloudsecuretech.com\/the-complete-list-of-cyber-security-breaches-around-the-world\/#government\">The Complete List of Cyber Security Breaches Around the World (cloudsecuretech.com)<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><\/li>\n<\/ul>\n\n\n\n<p>Stay vigilant!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sources:<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/teams.microsoft.com\/l\/message\/19:meeting_M2FmZGNmMWMtMjdjZi00ZTcwLTgwMzMtMDBkNzQ0YmUzMDRj@thread.v2\/1715029593714?context=%7B%22contextType%22%3A%22chat%22%7D\"><\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cybersecurity-breaches\"><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Note: Some of the research on this page has been done using Microsoft Copilot and Claude Cybersecurity breaches in government cities are a critical concern, and they can have significant consequences. See also a searchable list of reported cybersecurity Breaches A cyber incident will directly consume a company\u2019s resources, leading to an increased cost of&#8230;<\/p>\n","protected":false},"author":2,"featured_media":470206,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","ngg_post_thumbnail":0,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[681,441],"tags":[700,742,757,758,920],"class_list":["post-470174","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-moderneuc2","category-tech-talk","tag-cybersecurity","tag-moderneuc1","tag-ransomware","tag-reference","tag-security-breaches"],"taxonomy_info":{"category":[{"value":681,"label":"ModernEUC"},{"value":441,"label":"Tech Talk"}],"post_tag":[{"value":700,"label":"Cybersecurity"},{"value":742,"label":"ModernEUC"},{"value":757,"label":"ransomware"},{"value":758,"label":"reference"},{"value":920,"label":"Security Breaches"}]},"featured_image_src_large":["https:\/\/jorgep.com\/blog\/wp-content\/uploads\/Featured-CostOf_SecurityBreach-Gov01.jpg",740,321,false],"author_info":{"display_name":"Jorge Pereira","author_link":"https:\/\/jorgep.com\/blog\/author\/jorge\/"},"comment_info":0,"category_info":[{"term_id":681,"name":"ModernEUC","slug":"moderneuc2","term_group":0,"term_taxonomy_id":691,"taxonomy":"category","description":"","parent":0,"count":261,"filter":"raw","cat_ID":681,"category_count":261,"category_description":"","cat_name":"ModernEUC","category_nicename":"moderneuc2","category_parent":0},{"term_id":441,"name":"Tech Talk","slug":"tech-talk","term_group":0,"term_taxonomy_id":451,"taxonomy":"category","description":"","parent":0,"count":671,"filter":"raw","cat_ID":441,"category_count":671,"category_description":"","cat_name":"Tech Talk","category_nicename":"tech-talk","category_parent":0}],"tag_info":[{"term_id":700,"name":"Cybersecurity","slug":"cybersecurity","term_group":0,"term_taxonomy_id":710,"taxonomy":"post_tag","description":"","parent":0,"count":29,"filter":"raw"},{"term_id":742,"name":"ModernEUC","slug":"moderneuc1","term_group":0,"term_taxonomy_id":752,"taxonomy":"post_tag","description":"","parent":0,"count":284,"filter":"raw"},{"term_id":757,"name":"ransomware","slug":"ransomware","term_group":0,"term_taxonomy_id":767,"taxonomy":"post_tag","description":"","parent":0,"count":4,"filter":"raw"},{"term_id":758,"name":"reference","slug":"reference","term_group":0,"term_taxonomy_id":768,"taxonomy":"post_tag","description":"","parent":0,"count":4,"filter":"raw"},{"term_id":920,"name":"Security Breaches","slug":"security-breaches","term_group":0,"term_taxonomy_id":930,"taxonomy":"post_tag","description":"","parent":0,"count":4,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/470174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/comments?post=470174"}],"version-history":[{"count":1,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/470174\/revisions"}],"predecessor-version":[{"id":518739,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/470174\/revisions\/518739"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/media\/470206"}],"wp:attachment":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/media?parent=470174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/categories?post=470174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/tags?post=470174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}