Risk & Vulnerability

Cost of Data Breach: 2025 Analysis

The global average cost of a data breach reached $4.44 million in 2025, down 9% from the previous year. Understanding true breach costs is essential for security leaders allocating resources effectively.

May 19, 2026
7 min read

Data breaches have evolved from isolated security incidents into systemic threats that can cripple organizations financially and operationally. Understanding the true cost of these breaches has become essential for security leaders, risk managers, and executives who must allocate resources effectively to protect their organizations.

Recent analysis reveals that while global breach costs have moderated, the financial impact varies dramatically across industries, geographies, and security maturity levels.

The global average cost of a data breach reached $4.44 million in 2025, down 9% from the previous year's $4.88 million. This decline marks the first reduction in five years and reflects improvements in breach identification and containment driven by AI-powered security tools.

Region

2025 Average Cost

2024 Average Cost

Year-Over-Year Change

United States

$10.22M

$9.36M

+9%

Middle East

$7.29M

$8.75M

-17%

Benelux

$6.24M

$5.90M

+6%

Canada

$4.84M

$4.66M

+4%

United Kingdom

$4.14M

$4.53M

-9%

Germany

$4.03M

$5.31M

-24%

France

$3.73M

$4.17M

-11%

Japan

$3.65M

$4.19M

-13%

Key Insights:

The United States stands as a dramatic outlier, with more than double the global average. Higher regulatory fines and increased detection costs drove this surge. The Middle East experienced the sharpest decline at 17%, potentially reflecting increased security investments in Saudi Arabia and the United Arab Emirates.

Germany's 24% decrease suggests European organizations are becoming more efficient at breach response despite stringent GDPR requirements. Organizations can no longer rely on global averages to assess their risk; regulatory environments and regional maturity levels create vastly different cost profiles.

Industry Breach Costs and Recovery Timelines

Different industries face vastly different breach cost profiles based on their regulatory environments, data types, and operational characteristics.

Industry

2025 Average Cost

2024 Average Cost

Change

Days to Identify & Contain

Healthcare

$7.42M

$9.77M

-24%

279 days

Financial Services

$5.56M

$6.08M

-9%

233 days

Industrial

$5.00M

$5.56M

-10%

272 days

Energy

$4.83M

$5.29M

-9%

268 days

Technology

$4.79M

$5.45M

-12%

251 days

Pharmaceuticals

$4.61M

$5.10M

-10%

247 days

Retail

$3.54M

$3.48M

+2%

229 days

Public Sector

$2.86M

$2.55M

+12%

263 days

Key Insights:

Healthcare breaches exceed the global average by 67%, despite a decline since 2024. The 279-day identification and containment timeline reveals why costs remain elevated and why healthcare organizations struggle with complex IT environments, legacy systems, and the challenge of securing medical devices without disrupting patient care.

Financial services organizations demonstrate the value of security maturity through a 233-day response time, reflecting investment in detection capabilities. Manufacturing and industrial organizations face unique pressures when integrating operational technology with IT systems, which can extend investigation timelines to 272 days.

Data Type Compromise Costs Reveal Attacker Priorities

The financial impact of breaches depends heavily on the type of data compromised. Understanding which data types are most costly helps organizations prioritize their data protection strategies.

Data Type

Percentage of Breaches

2025 Cost Per Record

2024 Cost Per Record

Year-Over-Year Change

Intellectual Property

33%

$178

$173

+3%

Employee PII

37%

$168

$189

-11%

Customer PII

53%

$160

$179

-11%

Other Corporate Data

34%

$154

$171

-10%

Anonymized Customer Data

28%

$115

$132

-13%

Key Insights:

Customer PII accounts for 53% of breaches, reflecting immediate monetization opportunities for attackers. Tax identification numbers, emails, and phone numbers enable identity theft and command premium prices on dark web marketplaces. Intellectual property has the highest per-record cost at $178, up notably year-over-year. This trend signals that organizations are recognizing the long-term competitive damage caused by IP theft.

Compromised source code and proprietary algorithms can undermine market positioning for years. The consistent decline in per-record costs across most categories suggests that organizations are improving breach-response efficiency by containing breaches more quickly.

Security Investment ROI and Cost Amplification Factors

Organizations implementing specific security measures consistently achieve lower breach costs. Conversely, certain risk factors dramatically amplify expenses.

Factor

Cost Impact

Implementation Level Comparison

Days Impact

AI & ML in Security

-$1.05M

$3.85M (high) vs $4.90M (low)

-80 days

DevSecOps Approach

-$1.13M

$3.89M (high) vs $5.02M (low)

-65 days

SIEM Platform

-$0.92M

$3.91M (high) vs $4.83M (low)

-45 days

Employee Training

-$0.95M

$4.15M (high) vs $5.10M (low)

-38 days

Security Skills Shortage

+$1.76M

$5.74M (high) vs $3.98M (low)

+52 days

Shadow AI

+$0.67M

$4.74M (high) vs $4.07M (low)

+6 days

Security System Complexity

+$0.74M

$4.78M (high) vs $4.04M (low)

+41 days

Supply Chain Breach

+$0.80M

$4.81M (yes) vs $4.01M (no)

+26 days

Key Insights:

AI and automation deliver the strongest ROI, with organizations using these technologies extensively saving $1.05 million and reducing timelines by 80 days. Organizations using AI in prevention workflows achieve even greater savings of $2.2 million. DevSecOps provides comparable value at $1.13 million by preventing vulnerabilities from reaching production.

The security skills shortage emerges as the most expensive risk amplifier, with added costs of $1.76 million, up 26.2% year over year. Shadow AI represents a growing threat — 97% of organizations experiencing AI-related breaches lacked proper access controls. Supply chain breaches add $800,000 and require the longest containment time at 267 days.

About ORDR

ORDR is the connected-device security platform that transforms exposure into proactive protection. While most cybersecurity tools stop at identifying threats, ORDR takes action to enforce protection without disrupting operations.

Security teams can see which devices are on their network and identify threats, but lack the tools to act safely without risking downtime. The average threat sits on a network for 270 days, not because it wasn't detected, but because teams couldn't act fast enough.

ORDR closes this gap by turning intelligence into enforcement. Using passive network analysis and behavior-based AI, ORDR continuously discovers every connected device across IT, IoT, OT, and IoMT environments. The platform translates this intelligence into safe, automated segmentation policies that contain exposure and prevent lateral movement.

Trusted by 500+ organizations globally, ORDR integrates with existing firewalls, network access control systems, and SIEM platforms to maximize current investments while closing critical security gaps.

Schedule a demo to see how ORDR delivers complete device visibility and turns it into safe, continuous enforcement.

ShareLinkedInX