Information security in loss figures
#1
Information 
Quote:
[Image: security-economics-2019.jpg]

To budget for information security, companies need to consider factors such as average potential losses, preferably by incident type, as well as other businesses’ average outlays on security. Precise data on such questions do not get published, and that’s one reason we conduct an annual survey of employees who make business decisions related to IT security for a variety of companies. And now we are ready to share results of our 2019 survey.

Financial implications

Compared with the results of last year’s survey, enterprise businesses’ losses have increased. Where previously an incident cost them an average of $1.23 million, now the average loss is $1.41 million. This growth is partly a result of companies now spending more on third-party experts and PR drives aimed at softening the blow to the firm’s image.

It is likely that spending on PR has increased because of an overall tightening of laws requiring companies to publicly report incidents. This is particularly relevant in the case of data leaks. Today, current and potential clients or partners are certain to find out about incidents, and they worry about their data potentially falling into cybercriminals’ hands. The issue is not limited to large companies: According to respondents, 36% of enterprises and 31% of small businesses ran into PR problems as a result of leaks.

Interestingly, the small business segment has experienced a reverse of that trend, with the average cost of an incident falling from $120,000 to $108,000, with outlays for compensation as well as security tools, both software and infrastructural, decreasing.

You’ll find a detailed breakdown of specific items of corporate financial loss as a result of cyberincidents in the full report, available for download below.

Incident causes

In the eyes of our respondents, irrespective of company size, the problem is most often rooted in employees’ misuse of IT resources, and infection of company devices with malware. Of course, those broad categories cover a great variety of cases, but, for example, the common situation of an employee clicking a link in an e-mail and installing malware fits both of the above.

The other incident scenarios that both SMBs and enterprises most often face are covered in the full report. In addition, it reveals how having (or not having) a full-time data protection officer (DPO) and an internal cyberincident response center can affect losses, plus lots of other interesting information.

To download the report, please fill out the form below.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
GFYI [Official] Revo Registry Cleaner P...
OPTION 2 Share feed...zevish — 06:51
NVIDIA’s new DLSS Transformer model requ...
NVIDIA DLSS 310.3....harlan4096 — 10:09
INTEL Arc Graphics 32.0.101.6913 driver
Highlights  Int...harlan4096 — 10:07
AppCheck Anti-Ransomware 3.1.42.3
Version 3.1.42.3 (...harlan4096 — 10:06
AdGuard Browser Extension 5.1.113 (MV3 s...
AdGuard Browser Ex...harlan4096 — 10:03

[-]
Birthdays
Today's Birthdays
avatar (42)uapedDow
avatar (46)suiscced
avatar (47)Angarpaf
avatar (40)clarissalo60
Upcoming Birthdays
avatar (46)dapedDow
avatar (48)TromPerl
avatar (45)RidgeDimb
avatar (36)ipumaqar
avatar (50)tanliorsPeri
avatar (42)lapedDow
avatar (48)rituabew
avatar (36)omyjul
avatar (40)papedDow
avatar (49)ArnoldFum
avatar (37)yfaza
avatar (48)Kevensi
avatar (47)ConradRoand
avatar (38)boineDon
avatar (50)spoofTum
avatar (49)WillieVot
avatar (39)Grompelbawn
avatar (40)vkseogaF
avatar (36)usogy
avatar (40)optsaZes
avatar (39)RaymondViata
avatar (39)ywixazok
avatar (37)ixoqe
avatar (55)Step 1
avatar (35)pa.OpenTran

[-]
Online Staff
There are no staff members currently online.

>