Welcome!

@CloudExpo Authors: Yeshim Deniz, Dana Gardner, Zakia Bouachraoui, Pat Romanski, Gopala Krishna Behara

Blog Feed Post

Data Breach Virgins Completely Underestimate The Costs Of Failed Security, Reveals Faronics Survey

Organisations fail to realise implications of a data breach; estimate recovery costs to be a third less than they actually are

LONDON - 13th November, 2012 - Faronics, a global leader in securing multi-user PC environments, today announced the results of a survey that explores how UK organisations think about information security and what motivates them to invest in data defences. The research, conducted by Ponemon Institute[1], revealed that 54 percent of respondents have experienced at least one data breach in the last year, with nearly a fifth (19 percent) experiencing more than four. Perhaps more worryingly, those that have so far avoided a data breach demonstrated a real lack of awareness of the financial and long-term damage that a breach can have on a company.

Of those who have suffered a data breach, nearly half (48 percent) stated that it damaged their reputation, while close to a third (30 percent) were forced to downsize due to a loss of customers. However, when asking those that have not suffered a breach, 58 percent believe brand reputation would be untarnished should they fall victim, while the majority (70 percent) do not think that the cost of customer acquisition would increase. In fact, the research shows that on average the cost of customer acquisition rose by £91,985 after a breach.

"Despite growing awareness of cybercrime in general, it seems that organisations are still oblivious to the full financial and reputational costs data breaches can bring," said Dmitry Shesterin, VP of product management at Faronics. "As these results indicate, there is a serious discrepancy between what organisations perceive to be the real repercussions of failed security and what they actually are. While it's no secret that organisations are becoming more concerned about the possibility of a data breach, it seems they are actually not as prepared as they should be. Existing business contracts are not the only thing at stake - so too are future revenue opportunities, shifting it from a short-term to a potentially long-term problem. What is also worrying is that a growing number of organisations are not just experiencing one data breach, they are experiencing three, four or even more, indicating that they are either failing to learn from past mistakes or are simply not taking the necessary steps to adequately protect the data that they have been entrusted with."

The study also concluded that organisations are underestimating the long-term financial costs and time it takes to recover from a breach by up to a half, with those that have not suffered a data breach estimating a cost of just under £95,000 and a recovery period of four months. In reality, the research found that it is costing businesses £138,700 and taking over twice as long (9.3 months) to get back to normal.

"There really is no room for nonchalance when it comes to security strategies and it is completely irresponsible to assume the repercussions will be anything less than they are," continued Shesterin. "Organisations need to know exactly what is at stake in order to readdress existing security practices and ensure they are as well protected as they can be. Businesses are without doubt more vulnerable than ever, and with figures such as these, it's not surprising that many are unable to absorb the eye-watering cost and reputational damage that so often follows a breach."

In terms of the threats keeping security teams awake at night, nearly two thirds of those surveyed (62 percent) consider BYOD to be the most serious threat to security, followed by a lack of data protection across devices (56 percent), insecure third parties and cloud providers (53 percent), and the proliferation of unstructured data (44 percent), indicating that although they are becoming essential to business development, new technology trends pose a growing cause for concern for many organisations. Perhaps a little surprising, widely publicised threats are still a relatively low priority, with only eight percent stating it is very likely that their organizations would be affected by cyber espionage and just 17 percent very likely to see APTs as a potential danger.

"With today's complex security landscape, any organisation is a potential target," continued Shesterin. "You only need to take a look at the high profile security incidents, such as those at HSBC, LinkedIn and Yahoo, to realise that no one is safe. As well as raising awareness of cybercriminal tactics, organisations must consider a more holistic approach to security. They cannot afford to become absent-minded and rely solely on traditional perimeter solutions, such as anti-virus, as today's threats are just too sophisticated. Instead, organisations must consider a layered security approach involving application control and system restore methods, which offers a safety net should any malware make its way onto the network."

[1] 544 individuals in organisations with between 50 and 3,000 employees were surveyed by The Ponemon Institute on behalf of Faronics in October 2012.

The full report findings can be found here: http://www.faronics.com/assets/UK-Faronics-FINAL-1.pdf

About Faronics
With a well-established record of helping businesses manage, simplify, and secure their IT infrastructure, Faronics makes it possible to do more with less by maximising the value of existing technology. Faronics is the ONLY endpoint security software vendor to offer a comprehensive layered security solution consisting of anti-virus, application whitelisting, and instant system restore protection. Incorporated in 1996, Faronics has offices in the USA, Canada and the UK, as well as a global network of channel partners. Our solutions are deployed in over 150 countries worldwide, and we are helping more than 30,000 organisations.

For more information visit www.faronics.com

Press contacts:
Hannah Townsend or Richard Scarlett
Johnson King
T: +44 (0)20 7401 7968
E: [email protected]

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

CloudEXPO Stories
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by sharing information within the building and with outside city infrastructure via real time shared cloud capabilities.
JETRO showcased Japan Digital Transformation Pavilion at SYS-CON's 21st International Cloud Expo® at the Santa Clara Convention Center in Santa Clara, CA. The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading these essential tips, please take a moment and watch this brief video from Sandy Carter.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a member of the Society of Information Management (SIM) Atlanta Chapter. She received a Business and Economics degree with a minor in Computer Science from St. Andrews Presbyterian University (Laurinburg, North Carolina). She resides in metro-Atlanta (Georgia).
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure using the Kublr platform, and how Kubernetes objects, such as persistent volumes, ingress rules, and services, can be used to abstract from the infrastructure.