All Posts
Cyber Threat Intelligence
1
min read

Data Breach Costs: Scare Tactic No More

Companies utilizing threat intelligence are thought to better address cyber threats, and analyst firms such as Gartner, Forrester, IDC, ESG, & 451, agree.
Published on
May 23, 2019
Table of Contents

We now know more than we’ve ever known about the true cost of a data breach. In addition to survey-based research, costs are discussed openly in quarterly reporting calls, made available via court documents, reported in the news, and apparent in stock values. The available information has taught us that data breach cost totals are staggering.

So, just what is the real cost of a data breach? To help answer this question, here is a look at several recent and past headline-making incidents.

May 13, 2019, SC Magazine: Equifax data breach recovery costs pass $1 billion. According to the story:

In Equifax’s latest Security and Exchange Commission filing the company is estimating it has spent about $1.4 billion recovering from its 2017 data breach that exposed the PII of 148 million customers, according to a published report.

May 15, 2019, Info Security Magazine: Companies' Stock Value Dropped 7.5% after Data Breaches. This is a story about a study of how breaches impacted Marriott, Equifax, and Yahoo! According to the news:

Publicly traded companies suffered an average drop of 7.5% in their stock values and a mean market cap loss of $5.4 billion per company, and it reportedly took 46 days, on average, for those stock prices to return to their pre-breach levels. To date, the stock price of Equifax has not yet recovered.

March 29, 2018, CNBC: Under Armour says data breach affected about 150 million MyFitnessPal accounts. According to this story:

Shares of Under Armour dropped 3.8 percent, before paring losses, after the active-wear company informed users of its online fitness and nutrition website their data had been compromised.

March 19, 2018, The Verge: Facebook stock tanks after data breach report, shaving billions off the company’s market value. According to the news:

Facebook’s stock has tanked after revelations that the company had shared the data of up to 50 million users with the political data analytics company Cambridge Analytica. By noon ET on Monday, it’s dropped by nearly 7 percent — the most that Facebook has fallen in a single day in over five years.

Scare Tactic, Hardly

There was a time when pointing out the negative economic factors driven by data breaches was considered to be a “scare tactic” used by some vendors. The negative economic factors that follow a breach are no longer the subject of speculation though. As the aforementioned shows, data breach costs are now indisputable monetary facts. They exist regardless of how frightening they may or may not be. The truth about them is something that no organization can afford to disregard.

Avoiding the High Cost of a Breach

The only way to reduce the risk of being impacted by a data breach is to either stop doing business on the internet or to take steps to defend against threats. The former isn’t likely to happen at your company anytime soon (even if it did, you’d still have that “air gap” thing to contend with).

To protect your organization against cyber threats, you will have to take a multi-layered approach, which includes the use of traditional technologies and newer innovations. No single vendor has a security silver bullet.

How Anomali Helps

It is becoming widely accepted that enterprises which utilize threat intelligence as part of their security stacks are better able to address cyber threats. The value threat intelligence provides has prompted leading analyst firms such as Gartner, Forrester, IDC, ESG, and 451 to write about it extensively.

The Anomali Threat Platform automates all processes for collecting, managing and integrating threat intelligence from multiple sources. This gives security analysts the tools and resources needed to quickly respond to active threats and attacks. With the help of Anomali, organizations are detecting their adversaries, understanding who they are, and quickly responding to them. To learn more about the Anomali platform, get the Managing Threat Intelligence Playbook.

FEATURED RESOURCES

January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
Explore All