{"id":345043,"date":"2026-01-09T01:19:03","date_gmt":"2026-01-08T15:19:03","guid":{"rendered":"https:\/\/www.telecomstechnews.com\/?p=105532"},"modified":"2026-01-09T01:19:03","modified_gmt":"2026-01-08T15:19:03","slug":"average-cyberattack-cost-hits-2-5m-as-recovery-lags","status":"publish","type":"post","link":"https:\/\/www.vibewire.com.au\/?p=345043","title":{"rendered":"Average cyberattack cost hits $2.5M as recovery lags"},"content":{"rendered":"<p>Average recovery costs from a cyberattack are climbing, yet enterprise resilience plans appear to be going backward. Prolonged downtime is now stripping millions from revenue lines, with operational stability taking a direct hit. For years, the role of the Chief Information Security Officer (CISO) has focused on keeping intruders out. That role is changing. Security<a class=\"excerpt-read-more\" href=\"https:\/\/www.telecomstechnews.com\/news\/average-cyberattack-cost-hits-2-5m-as-recovery-lags\/\" title=\"ReadAverage cyberattack cost hits $2.5M as recovery lags\">&#8230; Read more &#187;<\/a><\/p>\n<p>The post <a href=\"https:\/\/www.telecomstechnews.com\/news\/average-cyberattack-cost-hits-2-5m-as-recovery-lags\/\">Average cyberattack cost hits $2.5M as recovery lags<\/a> appeared first on <a href=\"https:\/\/www.telecomstechnews.com\/\">Telecoms Tech News<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Average recovery costs from a cyberattack are climbing, yet enterprise resilience plans appear to be going backward. Prolonged downtime is now stripping millions from revenue lines, with operational stability taking a direct hit. For years, the role of&#8230;<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[17670,17663,19189,4697,5056,5042,5110,5083,15195,3333,1235,5044],"tags":[],"class_list":["post-345043","post","type-post","status-publish","format-standard","hentry","category-interviews-analysis","category-voices-analysis","category-ciso","category-cybersecurity","category-infosec","category-networks","category-report","category-research","category-resilience","category-security","category-study","category-telecoms"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=\/wp\/v2\/posts\/345043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=345043"}],"version-history":[{"count":1,"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=\/wp\/v2\/posts\/345043\/revisions"}],"predecessor-version":[{"id":345044,"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=\/wp\/v2\/posts\/345043\/revisions\/345044"}],"wp:attachment":[{"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=345043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=345043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=345043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}