|
|
|
|
|
|
|
|
|
| |
Data Breach Cost Calculator
|
|
|
|
|
|
|
|
|
|
| |
Number Of Comprimised Records
|
|
|
Total Cost Of The Data Breach
|
|
|
|
|
|
|
|
|
|
|
| |
Select Industry
|
|
|
Reason For Breach
|
|
|
|
|
|
|
|
|
|
|
| |
Select All Applicable Factors
|
| |
Lost or stolen devices that contained data
|
|
|
CISO on staff
|
|
|
| |
Rush to notify impacted individuals
|
|
|
Employee training (pre-breach)
|
|
|
| |
Consultants engaged (post breach)
|
|
|
Extensive use of encryption
|
|
|
| |
Cyber insurance protection
|
|
|
Incident response team (pre-breach)
|
|
|
| |
Board-level involvement (post breach)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|