48AF3A60-914C-4C95-B1E0-3397FF00C1E9 Created with sketchtool.
Calculator
All regions, All industries, 4 999 employees
7E919FA3-84AA-4530-B42D-91BADB226992 Created with sketchtool.
  • All
  • APAC & Japan
  • Europe
  • LATAM
  • META
  • North America
  • Russia
7E919FA3-84AA-4530-B42D-91BADB226992 Created with sketchtool.
  • All
  • Finance
  • Government
  • Healthcare
  • Industrial/Manufacturing
  • IT & Telecoms
  • Retail & Wholesale
$
Calculate
Calculate your company's security profile

This is the ultimate guide to the cost of IT security. Select the details that match your company to see the average budgets your industry peers spend on IT security (by region, industry, size), what security measures they take, the major threat vectors they encounter, how much money they lose as a result, and what you can do to avoid being compromised. The Calculator has been created as an adjustable tool. The data presented can be updated and/or added to over time based on insights from customers and Kaspersky.

IT security budget in 2019
Data provided by 881 respondents*
All regions, All industries, 4 999 employees
IT Security budget makes up 25% of the total IT spend
View analytics for previous years
average
$ 7 952 497
average
$ 7 952 497
max
$ 101 250 000
2019
2022
Expected change to IT security budget in three years
+ 11 %
year
2019
2022
YoY Dynamics
Threats experienced in the last 12 months
Data provided by 1 042 respondents*
All regions, All industries, 4 999 employees
60%
Viruses & malware
56%
Physical loss of devices or media
52%
Data breach
50%
Inappropriate IT resource use by employees
46%
Inappropriate sharing of data via mobile devices
43%
Targeted attacks
41%
Cryptomalware/ransomware
41%
DDoS attacks
41%
Incidents affecting third party cloud services used by the business
40%
Incidents involving non-computing connected devices
40%
Incidents affecting virtualized environments
39%
Incidents affecting IT Infrastructure hosted by a third party
39%
Electronic leakage of data from internal systems
37%
Incidents affecting suppliers that the business shares data with
36%
Cryptomining attacks
9%
Phishing / social engineering attacks on accounts
4%
Attacks on point-of-sale (POS) systems
4%
Attacks on online banking services
4%
Financial losses due to attacks on ATM
4%
Attacks on core transactional / back office systems
80%
Any cyberthreat
$ 946 436
Average cost of one incident
Security measures in place
Data provided by 1 042 respondents*
All regions, All industries, 4 999 employees
Recommendations

With more than 20 years' experience of observing malware as it has evolved from hacktivism to advanced threats, we believe that the security platform of the future is not just about prevention. While your security strategy should be built upon the firm foundation of a multi-layered defense solution, it is important to have a holistic approach - detection, response and prediction. Complex threats are detected by a stack of technologies – collecting data from the network and all types of endpoints, and then processing it with sandbox analysis, event correlation, anomaly detection etc. Threat intelligence is crucial for a modern enterprise security strategy. It is very important to gather as much data as you can. That's why Machine Readable Threat Intelligence is essential to enrich your Security Operation Center.

Want to see more statistics?
Fill out this form to download the «IT security economics in 2019: How businesses are losing money and saving costs amid cyberattacks» report
Download report
Need help with IT security?
Fill out this form and Kaspersky experts will get in touch
Contact me
*These statistics are based on results from an online survey of 4,474 business representatives from companies with up to 4,999 employees around the world, conducted in 2019 by Kaspersky and B2B International. Statistics based on less than 30 respondents should be used with caution, due to this being a low base.

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information

Accept and Close