Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

FBI Warns of North Korean QR Phishing Campaigns

January 9, 2026

Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government

January 9, 2026

Fifth of Breaches Take Two Weeks to Recover From

January 9, 2026
Facebook X (Twitter) Instagram
Friday, January 9
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Fifth of Breaches Take Two Weeks to Recover From
News

Fifth of Breaches Take Two Weeks to Recover From

Team-CWDBy Team-CWDJanuary 9, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Endpoint disruption following a serious security breach can take up to two weeks to recover from and cost millions for most (87%) US and UK organizations, a new report has revealed.

Absolute Security polled 750 CISOs on both sides of the Atlantic to compile the first in a new e-book series, The Resilient CISO: The State of Enterprise Resilience.

It revealed that, over the past 12 months, more than half (55%) of respondents had suffered a cyber-attack, ransomware infection, compromise or data breach that took mobile, remote or hybrid endpoint devices out of action.

A majority (57%) claimed their organization took 3-6 days for full endpoint remediation and recovery following an incident, with a fifth (19%) revealing these efforts lasted 7-14 days.

The report also revealed that the vast majority (98%) of responding organizations spent between $1 and $5m to recover from these incidents, with the average cost per incident standing at $2.5m.

Read more on cyber resilience: UK Government Finally Introduces Cyber Security and Resilience Bill

“There is simply no way to avoid the inevitable – at some point every organization will face the reality of an attack or IT incident that takes down the business. Organizations that aren’t prepared to bounce back quickly face an almost existential crisis, as prolonged downtime can literally crush a business,” said Christy Wyatt, president and CEO of Absolute Security.

“As security and risk leaders, we need to expand our focus beyond just traditional security to also include being the driving force behind ensuring business operations run consistently and without disruption.” 

Resilience Wanes

However, enterprises appear to be moving in the wrong direction. This year, some 68% of respondents claimed that their organization has a cyber-resilience strategy in place, while a similar share (65%) agreed that their company prioritizes cyber-resilience over traditional prevention, detection and response. 

This marks a major decline from the figures of a year ago, which were 90% and 83% respectively.

It is CISOs that are likely to be held responsible for perceived cyber-resilience failings. Some 72% of respondents agreed that their role now includes leading recovery efforts following a serious security breach which stops business operations.

Over half (59%) said they are concerned that a security or IT incident causing major downtime could lead to job losses, personal liability and legal penalties. 

Last year’s ransomware attacks on Marks & Spencer and Jaguar Land Rover are prime examples of the potentially devastating impact that breaches can have on operations.

The latter had an estimated economic impact of £1.9bn ($2.6bn), while M&S estimated costs at around £300m ($400m).



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleKimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks
Next Article Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
Team-CWD
  • Website

Related Posts

News

FBI Warns of North Korean QR Phishing Campaigns

January 9, 2026
News

Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government

January 9, 2026
News

Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks

January 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

It’s all fun and games until someone gets hacked

September 26, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

How chatbots can help spread scams

October 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.