IBM has released its annual Cost of a Data Breach Report, which has revealed AI adoption is greatly outpacing AI security and governance. While the overall number of organisations experiencing an AI-related breach is a small representation of the researched population, this is the first time security, governance and access controls for AI have been studied in this report, which suggests AI is already an easy, high value target.
13% of organisations reported breaches of AI models or applications, while 8% of organisations reported not knowing if they had been compromised in this way. Of those compromised, 97% report not having AI access controls in place. As a result, 60% of the AI-related security incidents led to compromised data and 31% led to operational disruption.
This year’s results show that organisations are bypassing security and governance for AI in favour of do-it-now AI adoption. Ungoverned systems are more likely to be breached, and more costly when they are.
“The data shows that a gap between AI adoption and oversight already exists, and threat actors are starting to exploit it,” said Suja Viswesan, VP, Security and Runtime Products, IBM. “The report revealed a lack of basic access controls for AI systems, leaving highly sensitive data exposed, and models vulnerable to manipulation. As AI becomes more deeply embedded across business operations, AI security must be treated as foundational. The cost of inaction isn’t just financial, it’s the loss of trust, transparency and control.”
However, the report did reveal that organisations using AI and automation extensively throughout their security operations saved an average $1.9 million in breach costs and reduced the breach lifecycle by an average of 80 days.
63% of breached organisations either don’t have an AI governance policy or are still developing a policy. Of the organisations that have AI governance policies in place, only 34% perform regular audits for unsanctioned AI.
One in five organisations reported a breach due to shadow AI, and only 37% have policies to manage AI or detect shadow AI. Organisations that used high levels of shadow AI observed an average of $670,000 in higher breach costs than those with a low level or no shadow AI. Security incidents involving shadow AI led to more personally identifiable information (65%) and intellectual property (40%) being compromised compared to the global average (53% and 33% respectively).
16% of breaches studied involved attackers using AI tools, most often for phishing or deepfake impersonation attacks.
The global average cost of a data breach fell to $4.44 million, the first decline in five years, while the average U.S. cost of a breach reached a record $10.22 million.
The global average breach lifecycle (the mean time to identify and contain a breach, including restore services) dropped to 241 days, a 17-day reduction from the year prior, as more studied organisations detected the breach internally. Those organisations who detected the breach internally also observed a $900,000 savings on breach costs compared to those disclosed by an attacker.
Averaging $7.42 million, healthcare breaches remained the most expensive across all studied industries, even as this sector saw a $2.35 million reduction in costs compared to 2024. Breaches across this sector take the longest to identify and contain at 279 days, that’s more than 5 weeks longer than the global average of 241 days.
Last year, organisations pushed back against ransom demands, with more opting not to pay (63%) compared to the year prior (59%). As more organisations refuse to pay ransoms, the average cost of an extortion or ransomware incident remains high, particularly when disclosed by an attacker ($5.08 million).
There was a significant reduction in the number of organisations that said they plan to invest in security following a breach, 49% in 2025 compared to 63% in 2024. Less than half of those that plan to invest in security post-breach will focus on AI-driven security solutions or services.
According to the report, nearly all organisations studied suffered operational disruption following a data breach. This level of disruption is taking a toll on recovery timelines. Among organisations that reported recovery, most took more than 100 days on average to do so.
However, the consequences of a breach continue to extend beyond containment. While down compared to the year prior, nearly half of all organisations reported that they planned to raise the price of goods or services because of the breach, and nearly one-third reported price increases of 15% or more.
"*" indicates required fields
Software Asset Management is a business practice that involves managing and optimising the life cycle of software within an organisation.
Software asset management is relevant to many facets of a business - take a look at some of the roles that it can form part of the focus of.
Software vendors come in all shape and sizes - all with their own set of licensing models and rules. We take a look at just a few of them.
As a constantly evolving subject, SAM is not without its challenges. We take a look at some of the most common ones.
Wondering what an investment in SAM could do for your business? Fill out a few details and find out what return you could get!
Answer a few questions about your SAM infrastructure & experience, and we'll put together a personalised recommendation for the future.
A simple health check of what's being used across your Office 365 estate in this FREE, Microsoft backed and easy to setup review.
Just like you would with your vehicle each year, get an annual check up of your software asset management programme.
Overwhelmed by the task of documenting the steps for a successful SAM programme? Get the experts in to help!
Concerned your SAM tools aren't covering your whole estate? Or on the look out for an entirely new tool? Get us in to assist.
Not content with covering all things SAM related, we've teamed up with Capital to provide a comprehensive hardware asset management review.
A simple, one-time reconciliation of the software you have deployed versus the licence entitlement you own.
A regularly scheduled analysis of your organisation's estate, specifically adapted to your needs and budget.
A full appraisal of your Microsoft 365 setup and how best to optimise it through automated recommendations.
An add-on to our SAMplicity One, MOT and Plus offerings, quickly diagnose your ability to migrate your resources to the cloud.
In collaboration with law firm Addleshaw Goddard, ensure the legality of your SAM programme and get assistance with any contract disputes.
Available as standard with SAMplicity Plus, ensure you're compliant if you're unexpectedly audited by a vendor.
We've teamed up with some of the forefront experts in licensing knowledge so you can teach yourself to be an expert too.
Stumped by the continually evolving complexities of SAM? Join us for one of our comprehensive courses, either in-person or online.
It’s chock full of useful advice, exclusive events and interesting articles. Don’t miss out!