Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Big Data
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Report: Human Error, System Problems  Cause Most Breaches
Report: Human Error, System Problems Cause Most Breaches

By Jennifer LeClaire
June 7, 2013 10:58AM

Bookmark and Share
"While external attackers and their evolving methods pose a great threat to companies, the dangers associated with the insider threat can be equally destructive and insidious," said Larry Ponemon, chairman of the Ponemon Institute. "Eight years of research on data breach costs has shown employee behavior to be one of the most pressing issues facing organizations today."
 


Human errors and system problems caused two-thirds of data breaches in 2012 and pushed the global average to $136 per record. So says a new study from Symantec Corp. and the Ponemon Institute called "2013 Cost of Data Breach Study: Global Analysis."

The companies point to issues like employee mishandling of confidential data, lack of system controls, and violations of industry and government regulations. Heavily regulated fields including healthcare, finance and pharmaceutical-incurred breach costs 70 percent higher than other industries.

"While external attackers and their evolving methods pose a great threat to companies, the dangers associated with the insider threat can be equally destructive and insidious," said Larry Ponemon, chairman of the Ponemon Institute. "Eight years of research on data breach costs has shown employee behavior to be one of the most pressing issues facing organizations today, up 22 percent since the first survey."

Malicious Attacks Most Costly

Overall, the global cost per compromised customer record was up over last year. But the United States total cost per data breach incident was down slightly at $5.4 million. That decline, the report suggested, is thanks to the appointment of chief information security officers (CISOs) with enterprise-wide responsibilities, comprehensive incident response plans, and stronger overall security programs.

"Given organizations with strong security postures and incident response plans experienced breach costs 20 percent less than others, the importance of a well-coordinated, holistic approach is clear," said Anil Chakravarthy, executive vice president of the Information Security Group at Symantec. "Companies must protect their customers' sensitive information no matter where it resides, be it on a PC, mobile device, corporate network or data center."

According to the report, and not surprisingly, malicious and criminal attacks are the most costly everywhere. Consolidated findings show that malicious or criminal attacks cause 37 percent of data breaches and are the most costly data breach incidents in all nine countries. U.S. and German companies experience the most expensive data breach incidents caused by malicious or criminal attackers at $277 and $214 per compromised records, respectively.

Getting to the Root

We caught up with Jim Butterworth, chief security officer at HBGary, to get his take on the findings. He told us by conducting a forensic investigation to determine the root cause of an incident, a victim is able to determine the extent and breadth of an intrusion.

"In years past, folks would essentially 'overreport,' meaning if a database was accessed, the assumption was made that it was copied. However, there are digital artifacts present that can play a huge role in risk mitigation, regulatory compliance and satisfy the due diligence aspects of any liability," Butterworth said. "By collecting and analyzing these artifacts as part of its overall incident response program, a victim can significantly reduce the financial impact and civil liability typically associated with these breaches."

Symantec recommends the four best practices to prevent a data breach and reduce costs in the event of one: educate employees and train them on how to handle confidential information; use data loss prevention technology to find sensitive data and protect it from leaving your organization; deploy encryption and strong authentication solutions; and prepare an incident response plan, including proper steps for customer notification.
 

Tell Us What You Think
Comment:

Name:

Sean:

Posted: 2013-06-25 @ 3:55am PT
Given the lack of repect big companies especially give to their staff, it is not surprising that company loyalty is becoming less and less. All the preventative measures described in this article are about training users / employees, but how about training senior management in the companies to treat their staff better and make people less inclined to cause breaches?

Maureen Robinson:

Posted: 2013-06-20 @ 1:34am PT
The fact that human errors and system problems caused two-thirds of data breaches in 2012 shows that we still have a lot to work to better manage application security. And although industries including healthcare, finance and pharmaceutical are heavily regulated, the fact that breach costs 70% higher than other industries shows that they are not yet enough regulated. We also wrote a blog article explaining the threats banking applications are exposed to and some steps which might help addressing and improving the overall security posture. The article is available here: http://blog.securityinnovation.com/blog/2013/01/hardening-your-banking-applications-from-attack.html



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Big Data
1.   Mark Hurd's 5 Keys to Market Success
2.   Data Compilers Peg Consumers
3.   Fast Seagate 6 TB Drive for Data Center
4.   Teradata Intros QueryGrid Analytics
5.   Police Keep Quiet About Cell Tracking


advertisement
Data Compilers Peg Consumers
Sizing up with scores -- fairly or not.
Average Rating:
Fast Seagate 6 TB Drive for Data Center
Can use 12 Gb/s SAS interface.
Average Rating:
Police Keep Quiet About Cell Tracking
Tool called Stingray remains a mystery.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Michaels Says Nearly 3M Credit, Debit Cards Breached
Arts and crafts retail giant Michaels Stores has confirmed that a data breach at its POS terminals from May 2013 to Jan. 2014 may have exposed nearly 3 million customer credit and debit cards.
 
Heartbleed Could Cost Millions, Could Have Been Prevented
Early estimates of Heartbleed’s cost to enterprises are running in the millions. The reason: revoking all the SSL certificates the bug leaked will come at a very hefty price.
 
Google's Street View Software Unravels CAPTCHAs
The latest software Google uses for its Street View cars to read street numbers in images for Google Maps works so well that it also solves CAPTCHAs, those puzzles designed to defeat bots.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
Google Glass may find its first markets in verticals in which hands-free access to data is a boon. Medicine is among the most prominent of those, as seen in a number of Glass experiments under way.
 

Mobile Technology Spotlight
Google Releases Chrome Remote Desktop App for Android
You're out on a sales call, and use your Android mobile device to grab a file you have back at the office on your desktop. That's a bit easier now with Google's Chrome Remote Desktop app for Android.
 
Amazon 3D Smartphone Pics Leaked
E-commerce giant Amazon is reportedly set to launch a smartphone after years of development. Photos of the phone, which may feature a unique 3D interface, were leaked by tech pub BGR.
 
Zebra Tech Buys Motorola Enterprise for $3.45B
Weeks after Lenovo bought Motorola Mobility’s assets from Google for $2.91 billion, Zebra Technologies is throwing down $3.45 billion for Motorola’s Enterprise business in an all-cash deal.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.