• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Companies Paying Even More to Resolve Cyber Attacks

Businesses are having to work harder and spend more time trying to effectively contain and then resolve cyber-attacks, and that effort is starting to take a toll on their bottom lines.

On average this year it’s taken companies 31 days to contain a cyber-attack.  They’ve spent an estimated $639,462 during that 31-day period while they worked to get things back on track. When you crunch the numbers that comes out to a cost of $20,758 per day being spent on containment and resolution. That’s according to research by the Ponemon Institute, a privacy, data protection and information security policy research organization.

The overall trend isn’t looking good. In fact, the 2014 numbers are up 23% from where things stood last year. The 2013 study found companies spent $509,665 and 27 days to isolate and remedy damage done during cyber attacks. That came out to roughly $18,876 being spent each day.

Keep in mind that 31-day figure is just an average. There are some types of cyber attacks which have a much longer recovery time associated with them, while others can be more easily corrected.

The study found that the issues which organizations spent the longest time trying to resolve included:

  • Attacks involving malicious insiders took 58.5 days to resolve     
  • Malicious code-based attacks took 46.2 days to sort out
  • Web-based attacks could take 31.9 days to fix.

It’s a safe bet that $20,758 a day is an unexpected expense few if any companies would be really excited to see added to their books for any amount of time.

So it’s certainly in a company’s best interest to stay far out in front of potential issues rather than have to deal with playing catch-up once the impact of a problem has already been felt. Manage 365+ from Arraya Solutions can help your company do just that. This managed infrastructure service provides round-the-clock, 24/7 monitoring for supported devices to ensure they’re healthy, available and performing at the highest level possible.

If a problem is detected, Manage 365+ will automatically generate a service desk ticket which will then be validated and remediated by Arraya’s service team. Customers will also be able to check the status of these tickets so they’re in the loop at all times.

Manage 365+ can also increase the efficiency of your existing IT staff. Besides service desk tickets, it can oversee and approve scheduled maintenance as well as regular updates. By removing these lower-level tasks from IT’s plate, it frees them up to focus on higher priority deliverables. This can keep IT budgets in check while still taking some of the pressure off swamped IT pros.

To find out more about Manage 365+, in addition to the other ways that partnering with Arraya can eliminate some of IT’s long-standing hurdles and expenses, please visit www.ArrayaSolutions.com. While you’re there, be sure to check out Arraya’s blog series celebrating National Cyber Security Awareness Month, which features tips on keeping your company safe from some of today’s biggest online threats.

Arraya’s previous National Cyber Security Awareness Month posts include:

Cyber Security Month: 4 Email Best Practices

Dropbox False Alarm: 5 Tips for More Secure Passwords

Poodle Vulnerability Leads to More Digital Worries

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}