The Numbers Behind the RiskAuto-Updated

Verified data from the industry's most authoritative sources. Updated daily at 00:00 GMT. Every statistic is cited — because precision demands evidence.

Sources: IBM 2025 · Verizon 2025
Last refresh: Loading...
Currency: ZAR

Average Cost of a Data Breach

Not all industries are equal when it comes to breach impact. These are actuarial averages — not worst-case scenarios.
Average Breach Cost by Industry
South African Rand equivalent — IBM 2025 data
Source: IBM Cost of a Data Breach Report 2025 · Ponemon Institute · Currency conversion at prevailing rate

The Numbers That Matter

Every stat carries its source. Because when we say "quantify your risk in currency, not traffic lights" — we mean it.

How a Breach Unfolds — and Where We Stop It

Most breaches follow a predictable pattern. Each phase is an opportunity to detect and contain — if you have the right controls in place.
Day 0
Initial Compromise
Phishing email bypasses basic filters. Employee clicks a credential-harvesting link. This is how 16% of breaches begin.
ITRS blocks: Email Security + Security Awareness
1
2
Day 1–7
Lateral Movement
Attacker uses stolen credentials to access shared drives, escalate privileges, and map the network. 22% of breaches involve compromised credentials.
ITRS blocks: Identity Management + Network Security
Day 7–30
Data Exfiltration
Sensitive data is copied to external servers. Customer PII is compromised in 53% of breaches. Average detection takes 241 days.
ITRS blocks: 24/7 Threat Monitoring + Data Protection
3
4
Day 30+
Ransomware Deployment
Systems encrypted. Operations halted. Ransomware is present in 44% of all breaches — and 88% of SMB breaches. Recovery averages 100+ days.
ITRS blocks: Endpoint Protection + Backup & Recovery

Initial Access Vectors

A single weak point is all an attacker needs. This is why comprehensive coverage across all twelve security disciplines matters.
12,195
Confirmed Breaches
Source: Verizon 2025 Data Breach Investigations Report · 22,052 incidents analysed across 139 countries

Every Number Has a Source

This pattern shows how existing website copy would look with proper footnote citations. Minimal disruption, maximum credibility.
A law firm breach averages R75.2M.1 Healthcare, R122.4M.1 Manufacturing downtime runs R82.5M per incident.1 These are actuarial averages, not worst-case scenarios. And ransomware is present in 44% of all breaches2 — rising to 88% for businesses with under 500 employees.2 Average time to detect a breach: 241 days.1
  1. IBM Cost of a Data Breach Report 2025 (Ponemon Institute). Global averages, currency converted at prevailing rate.
  2. Verizon 2025 Data Breach Investigations Report. 22,052 incidents across 139 countries.

Stat Cards with Built-In Sources

Each card carries its own attribution. Higher trust signal. Works well as standalone components throughout the site.

Data auto-refreshes daily at 00:00 GMT from IBM and Verizon research. Currency conversion uses live exchange rates. All components are production-ready for integration into the ITRS website.