Security threats seem to scale in proportion with security solutions. These facts about security breaches are a reason to assess the current state of your IT security and consider how cloud-based solutions can provide added defense against data breaches.
It Takes a Long Time to Find Out Data is MissingData breaches target critical information such as healthcare records, customer credit cards, accounting data, and employee information. On average, it takes 150 to 180 days to spot a data breach. In this scenario, data is being accessed and sometimes sold for six months before internal IT staff recognize the intrusion.
The Bigger the Organization, The More Daily Incidents Reported
Organizations experience up to 20 incidents per day, sometimes more. A single undetected incident can give attackers access to a treasure trove of critical data.
Breaches Are Expensive
The average cost of a data breach is largely unknown, with most organizations reporting a cost-per-record of $80 to $400. However, the cost of a breach extends far beyond the compromised records. A report by Deloitte on the hidden cost of breaches shows that:
- Organizations face increased insurance premiums after a breach.
- There is a strong association between data breaches and brand devaluation.
- Many organizations face a loss of intellectual property, limiting future income streams.
- Business-to-business relationships suffer, especially when it comes to partnerships and contracts.
- Consumers impacted by the data breach lose confidence and ultimately may look to competitors for similar products and services.
Employees Are the Biggest Point of Breach
A majority of data breaches originate within the organization. In 2015, an estimated 59% of reported security breaches involved employee fault (this includes employees, contractors, and third-party suppliers). Employees who have unnecessarily high level access, accidental malware downloads, and compromised credentials make employee access points the most common point of origin for data breaches.
Roughly half of employee related breaches are accidental and the other half intentional.
No Data is Left Untouched
Once a malicious actor has access to critical data, the most valuable data is exfiltrated first. Since it can take months to realize a breach has occurred, many actors can obtain access to multiple levels of critical information.
The Intel sponsored cyber threat report, Grand Theft Data, finds:
- Intentional internal breaches take employee records (33%) followed by customer information (27%).
- External actors take customer information (32%) and employee information (28%).
This suggests that credit card data, social security numbers, telephone numbers, and addresses are the most valuable targets for internal and external breachers.
The Promise of Cloud Based Security
A 2016 SANS survey showed that cloud data breaches were down to 9% when compared to traditional, on premise IT security systems. Data breaches remain the top priority for organizations, making cloud-based security the best solutions architecture for organizations that need flexible, responsive data protection options.
DG Technology can assist you in moving your existing security infrastructure to a secure, cloud-based security systems architecture.