
Understanding Data Breach Notification Laws
What Is a Data Breach Notification? When personal data gets compromised, you don’t just have a security problem. You …

Learn what data breaches actually cost and what you can do to lower that number.
• Where you operate matters more than the global headline number. US companies pay over double the worldwide average, hitting a new record in 2025
• Shadow AI added $670,000 to breach costs when employees used AI tools without security oversight. One in five breaches now involves unsanctioned AI use
• Companies using security AI and automation cut their breach lifecycle by 80 days and saved $1.9 million. The gap between AI-equipped and unequipped teams is widening
• Stolen credentials remain one of the most expensive attack vectors because they take the longest to detect. Monitoring for leaked employee passwords closes that detection gap
According to IBM’s 2025 Cost of a Data Breach Report, the global average dropped to $4.44 million. But if you’re a US company, you’re now paying $10.22 million on average, a record high.
Where you operate and how fast you detect the breach change the final number. So does whether you’re using AI in your security stack.
Below, we break down what drives data breach costs up and what brings them down. Plus what you can do right now to reduce your exposure.
The global average cost of a data breach dropped to $4.44 million in 2025, down from $4.88 million the prior year. IBM calculates this across hundreds of real breaches each year, covering everything from detection and investigation to notification and legal costs, plus lost business. That sounds like good news until you look at the regional breakdown.
US companies now pay $10.22 million per breach on average, a 9% increase and a new record. The Middle East remains the second most expensive region. The gap between the US and the rest of the world continues to widen.
The cost per compromised record tells a similar story. Intellectual property records cost $178 each when breached. Customer personally identifiable information (PII) was involved in 53% of all incidents, making it the most commonly exposed data type.
Here’s how the global average has trended over recent years:
The 2025 drop stands out, but it doesn’t mean breaches are getting cheaper everywhere. The decline is driven partly by improvements in AI-assisted detection and partly by regional variations. Companies in the US and the healthcare industry are still paying more than ever. Financial services costs are up as well.
IBM splits breach costs into four categories. Detection and escalation covers finding and investigating the breach. Notification covers telling affected parties. Post-breach response includes remediation and legal costs. Lost business captures customer churn and system downtime. Lost business and detection typically make up the largest portions.
The average time from compromise to containment hit 241 days, the shortest in nine years. Catching breaches sooner directly translates to lower costs.
Not all breaches cost the same. The attack vector and how long it takes to detect both change the final number.
Attack vectors with the highest costs:
Shadow AI is a new cost driver. This term started showing up in IBM’s 2025 report for the first time. If you haven’t heard it yet, you will.
Shadow AI is when employees use AI tools that haven’t been approved or secured by your IT team. They paste sensitive data into chatbots and code assistants that lack enterprise security controls. Your security team can’t monitor what they can’t see, and that creates exposure points you don’t know about.
Shadow AI added $670,000 to breach costs in 2025, and it caused about one in five breaches. Employees paste customer data or internal documents into AI tools without encryption or access controls, and that data ends up somewhere your security team can’t protect.
Stolen credentials still take the longest to contain. Breaches that start with compromised passwords have the longest detection-to-containment window. Attackers who log in with valid credentials look like legitimate users, which is why these breaches go undetected for months. The longer they have access, the more data they exfiltrate and the higher the final cost. Credentials typically leak through infostealer malware and third-party breaches. Phishing is another common source. The Verizon 2025 DBIR confirms that stolen credentials remain the top initial access method across all breach types.
Operational disruption hits hard. 86% of breached companies reported serious operational disruption. Lost business and system downtime make up the largest share of total breach expenses. After a breach, 45% of companies raise prices to offset the costs, passing the expense to customers.
Customer PII is the most targeted data type. Customer personally identifiable information appeared in 53% of breaches. When customer data gets exposed, you’re paying more in fines and notification. You lose customers on top of that. That’s why PII breaches end up costing more than other data types.
For a deeper look at what happens after a breach beyond the financial costs, see our breakdown of data breach consequences.
The same IBM report identifies the factors that cut breach costs the most. The biggest one by far is security AI and automation.
AI and automation save $1.9 million per breach. Companies with AI integrated into their security operations contain breaches 80 days faster than those without. That time difference is the primary reason for the cost savings. The faster you find and stop a breach, the less data gets exposed. The gap between AI-equipped and unequipped security teams has widened every year since IBM started tracking this metric.
Speed matters because every extra day an attacker has access drives costs higher. That’s why IBM tracks the breach lifecycle as a core metric.
Breach lifecycle is the total time from initial compromise to full containment. It includes two phases: mean time to identify (MTTI) and mean time to contain (MTTC). In 2025, the average lifecycle dropped to 241 days, the shortest in nine years. Shorter lifecycles mean lower breach costs.
How the breach gets detected matters. When your internal team finds the breach, costs are much lower than when the attacker tells you about it. Internal detection means you caught it earlier and likely contained the damage. Attacker disclosure (common in ransomware) usually means they’ve already exfiltrated everything they wanted.
Third-party detection falls somewhere in between. A vendor or security researcher notifying you about a breach is better than learning about it from the attacker, but it still means your own tools missed it. Your best bet is detecting breaches with your own tools.
For practical steps on building a detection capability, see our guide on data breach detection.
Law enforcement involvement helps in ransomware cases. Companies that brought in law enforcement during ransomware incidents paid less overall. Law enforcement agencies often have decryption keys from prior investigations or can put pressure on attackers through takedowns and arrests.
The trend away from paying ransoms is also helping. 63% of ransomware victims now refuse to pay, up from 59% the prior year. Full recovery rates improved to 35%, up from just 12% the year before. Better backup strategies and tested response playbooks are making it easier to recover without paying.
Incident response planning pays off. Having a tested response plan in place before a breach happens is one of the most cost-effective investments you can make. Companies with mature IR processes pay less per breach. For a step-by-step framework, see our data breach response guide.
Healthcare remains the most expensive industry for data breaches, though the gap is narrowing.
Healthcare’s drop is worth noting. Better security investments and regulatory compliance efforts are starting to pay off, though the industry still pays nearly double the global average. Medical records are sensitive and HIPAA requirements are strict, both of which push costs higher. For a detailed breakdown of what healthcare breaches look like, see our analysis of data breach consequences in healthcare.
Financial services companies face a different cost profile. Regulatory fines from agencies like the SEC and OCC can add millions to the total. These companies also deal with direct financial theft during breaches, not just data exposure. The regulatory reporting requirements alone drive up legal and compliance costs.
Small business impact: The average cost figures are skewed toward large enterprises. But small businesses get hit harder relative to their size because they have less revenue to absorb the cost. A $1-2 million breach can threaten a small company’s survival.
The average cost of a data breach for small businesses is harder to pin down in aggregate, but the per-record costs are comparable. The difference is that small businesses often lack the insurance coverage and cash reserves to recover. Smaller security teams also mean longer detection times and higher per-incident costs relative to revenue.
The data points to a clear pattern: speed and preparation cut costs the most. Here’s where to focus.
Invest in AI-powered detection. The savings gap between companies with and without security AI is too large to ignore. AI-assisted tools catch anomalies faster than manual monitoring and shorten the time from compromise to containment. This doesn’t require replacing your entire security stack. Start by adding AI-powered analysis to your existing SIEM or endpoint detection tools.
Build and test your incident response plan. Having a plan isn’t enough. You need to run tabletop exercises and simulate real scenarios. Companies that test their IR plans regularly pay less when a real breach happens. At minimum, run a tabletop exercise quarterly and update your response playbooks after every real incident.
Monitor for leaked credentials. Stolen credentials are one of the most common initial access vectors and take the longest to detect. The window between when a password appears in a breach dump and when an attacker uses it is your opportunity to act. Credential monitoring closes that gap by alerting you when employee or customer passwords show up in stealer logs and third-party breaches. Automated password resets triggered by credential exposure can cut your response time from days to minutes.
Enforce multi-factor authentication everywhere. MFA won’t prevent credential theft, but it makes stolen passwords much harder to exploit. Even when an attacker has a valid username and password, MFA adds a barrier that buys your team time to detect and respond.
Control shadow AI. With one in five breaches now involving unsanctioned AI tools, you need to know what AI services your employees are using and what data they’re feeding into them. Create an approved list of AI tools with enterprise security controls and block unapproved services at the network level.
The global average data breach cost dropped in 2025, but the real number depends on your industry and location. US companies pay more than double the global average. Healthcare and financial services pay the most.
The clearest way to reduce your exposure is catching breaches sooner. Companies using security AI respond faster and save millions. Monitoring for leaked credentials catches one of the most common and slowest-to-detect attack vectors before it turns into a full breach.
Breachsense monitors for compromised credentials and leaked data across dark web markets and ransomware leak sites, plus stealer logs. When your data shows up, you get alerted so you can act before attackers exploit it.
Start with a free dark web scan to see what’s already exposed.
The global average cost of a data breach is $4.44 million according to IBM’s 2025 report. However, this number varies dramatically by country. US companies pay more than double the global figure. The cost per compromised record averages $178 for intellectual property records.
The US has the highest average data breach cost at $10.22 million, up 9% year over year. Several factors drive this: higher regulatory penalties and more expensive legal proceedings. The concentration of high-value targets in financial services and technology plays a role. US companies also face more class-action lawsuits after breaches.
Healthcare has the highest data breach costs at $7.42 million per incident, though this dropped from $9.77 million the prior year. Financial services and technology follow. Healthcare’s higher costs come from the sensitivity of medical records and strict HIPAA regulations. Operational disruption to patient care systems adds to the total.
Faster detection directly lowers costs. The average breach lifecycle is 241 days from compromise to containment. Companies using security AI and automation contain breaches 80 days faster and save $1.9 million compared to those without. See our guide on data breach detection for practical steps.
Yes, but it cuts both ways. Companies using AI in their security operations save millions per breach and contain incidents weeks faster. On the other hand, shadow AI (employees using AI tools without security oversight) adds $670,000 to breach costs. One in five breaches now involves unsanctioned AI use.
Start with the highest-impact, lowest-cost measures: build and test an incident response plan and enforce multi-factor authentication. Monitor for leaked employee credentials. Small businesses can’t absorb a multi-million dollar breach the way large enterprises can, so prevention and fast detection matter even more. At a minimum, basic credential monitoring catches stolen passwords before attackers can use them.

What Is a Data Breach Notification? When personal data gets compromised, you don’t just have a security problem. You …

How Much Does a Data Breach Cost? The financial consequences of a data breach go far beyond the initial incident …