Subscribe to Email Updates

Latest Blog Post

5 Reasons to Assess Your Security Right Now

Travis Abrams
by Travis Abrams on Nov 8, 2016 9:00:00 AM

Security threats seem to scale in proportion with security solutions. These facts about security breaches are a reason to assess the current state of your IT security and consider how cloud-based solutions can provide added defense against data breaches.

It Takes a Long Time to Find Out Data is Missing

Data breaches target critical information such as healthcare records, customer credit cards, accounting data, and employee information. On average, it takes 150 to 180 days to spot a data breach. In this scenario, data is being accessed and sometimes sold for six months before internal IT staff recognize the intrusion.

The Bigger the Organization, The More Daily Incidents Reported

Organizations experience up to 20 incidents per day, sometimes more. A single undetected incident can give attackers access to a treasure trove of critical data.

Breaches Are Expensive
The average cost of a data breach is largely unknown, with most organizations reporting a cost-per-record of $80 to $400. However, the cost of a breach extends far beyond the compromised records. A report by Deloitte on the hidden cost of breaches shows that:

  • Organizations face increased insurance premiums after a breach.AdobeStock_70975417-771992-edited.jpeg
  • There is a strong association between data breaches and brand devaluation.
  • Many organizations face a loss of intellectual property, limiting future income streams.
  • Business-to-business relationships suffer, especially when it comes to partnerships and contracts.
  • Consumers impacted by the data breach lose confidence and ultimately may look to competitors for similar products and services.

Employees Are the Biggest Point of Breach
A majority of data breaches originate within the organization. In 2015, an estimated 59% of reported security breaches involved employee fault (this includes employees, contractors, and third-party suppliers). Employees who have unnecessarily high level access, accidental malware downloads, and compromised credentials make employee access points the most common point of origin for data breaches.

Roughly half of employee related breaches are accidental and the other half intentional.

No Data is Left Untouched
Once a malicious actor has access to critical data, the most valuable data is exfiltrated first. Since it can take months to realize a breach has occurred, many actors can obtain access to multiple levels of critical information.

The Intel sponsored cyber threat report, Grand Theft Data, finds:

  • Intentional internal breaches take employee records (33%) followed by customer information (27%).
  • External actors take customer information (32%) and employee information (28%).

This suggests that credit card data, social security numbers, telephone numbers, and addresses are the most valuable targets for internal and external breachers. 

The Promise of Cloud Based Security
A 2016 SANS survey showed that cloud data breaches were down to 9% when compared to traditional, on premise IT security systems. Data breaches remain the top priority for organizations, making cloud-based security the best solutions architecture for organizations that need flexible, responsive data protection options.

DG Technology can assist you in moving your existing security infrastructure to a secure, cloud-based security systems architecture.

Leave a comment

Travis Abrams
Written by Travis Abrams
Results-driven, information security professional with a proven record of success in researching, planning and implementing innovative technical solutions that meet business needs while managing risk. Specialties: Intrusion Prevention and Detection, Data Loss Prevention, Vulnerability Management, Malware (APT) defense and Security Program Development. CISSP CISM
Written by Author

Related posts

To Increase Security, Lock Down User Privileges

There is incredible value in taking a ‘back to basics’ approach to endpoint security. Focusing efforts on the fundamental...

Travis Abrams
By Travis Abrams - May 23, 2017
The Importance of Data Backup and Recovery in Any Security Strategy

It cannot be overstated: a “back to basics” approach to system security can reduce the number of administrative tasks and...

Travis Abrams
By Travis Abrams - May 18, 2017
Why You Need a Back to Basics Approach for Network Security

With the abundance of cybersecurity threats and vulnerabilities today, it can be tempting to see purchasing the latest security...

Travis Abrams
By Travis Abrams - May 15, 2017