The Enterprise Security Supersite NewsFactor Sites:     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
You are here: Home / Data Security / Human Error Cause of Most Breaches
DDoS Protection Powered By Verisign
Report: Human Error, System Problems  Cause Most Breaches
Report: Human Error, System Problems Cause Most Breaches
By Jennifer LeClaire / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus

Human errors and system problems caused two-thirds of data breaches in 2012 and pushed the global average to $136 per record. So says a new study from Symantec Corp. and the Ponemon Institute called "2013 Cost of Data Breach Study: Global Analysis."

The companies point to issues like employee mishandling of confidential data, lack of system controls, and violations of industry and government regulations. Heavily regulated fields including healthcare, finance and pharmaceutical-incurred breach costs 70 percent higher than other industries.

"While external attackers and their evolving methods pose a great threat to companies, the dangers associated with the insider threat can be equally destructive and insidious," said Larry Ponemon, chairman of the Ponemon Institute. "Eight years of research on data breach costs has shown employee behavior to be one of the most pressing issues facing organizations today, up 22 percent since the first survey."

Malicious Attacks Most Costly

Overall, the global cost per compromised customer record was up over last year. But the United States total cost per data breach incident was down slightly at $5.4 million. That decline, the report suggested, is thanks to the appointment of chief information security officers (CISOs) with enterprise-wide responsibilities, comprehensive incident response plans, and stronger overall security programs.

"Given organizations with strong security postures and incident response plans experienced breach costs 20 percent less than others, the importance of a well-coordinated, holistic approach is clear," said Anil Chakravarthy, executive vice president of the Information Security Group at Symantec. "Companies must protect their customers' sensitive information no matter where it resides, be it on a PC, mobile device, corporate network or data center."

According to the report, and not surprisingly, malicious and criminal attacks are the most costly everywhere. Consolidated findings show that malicious or criminal attacks cause 37 percent of data breaches and are the most costly data breach incidents in all nine countries. U.S. and German companies experience the most expensive data breach incidents caused by malicious or criminal attackers at $277 and $214 per compromised records, respectively.

Getting to the Root

We caught up with Jim Butterworth, chief security officer at HBGary, to get his take on the findings. He told us by conducting a forensic investigation to determine the root cause of an incident, a victim is able to determine the extent and breadth of an intrusion.

"In years past, folks would essentially 'overreport,' meaning if a database was accessed, the assumption was made that it was copied. However, there are digital artifacts present that can play a huge role in risk mitigation, regulatory compliance and satisfy the due diligence aspects of any liability," Butterworth said. "By collecting and analyzing these artifacts as part of its overall incident response program, a victim can significantly reduce the financial impact and civil liability typically associated with these breaches."

Symantec recommends the four best practices to prevent a data breach and reduce costs in the event of one: educate employees and train them on how to handle confidential information; use data loss prevention technology to find sensitive data and protect it from leaving your organization; deploy encryption and strong authentication solutions; and prepare an incident response plan, including proper steps for customer notification.

Tell Us What You Think



Posted: 2013-06-25 @ 3:55am PT
Given the lack of repect big companies especially give to their staff, it is not surprising that company loyalty is becoming less and less. All the preventative measures described in this article are about training users / employees, but how about training senior management in the companies to treat their staff better and make people less inclined to cause breaches?

Maureen Robinson:

Posted: 2013-06-20 @ 1:34am PT
The fact that human errors and system problems caused two-thirds of data breaches in 2012 shows that we still have a lot to work to better manage application security. And although industries including healthcare, finance and pharmaceutical are heavily regulated, the fact that breach costs 70% higher than other industries shows that they are not yet enough regulated. We also wrote a blog article explaining the threats banking applications are exposed to and some steps which might help addressing and improving the overall security posture. The article is available here:

Like Us on FacebookFollow Us on Twitter
MAY BE OF INTEREST is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Are Government Spies Tipping Off Tor?
Less than a month ago, tech news headlines heralded a Tor Project breach. Now, some are saying that government spies are sharing information with Tor to help it prevent future breaches.
Backoff Malware Hits 1,000+ Businesses, Likely More
More than 1,000 businesses across the U.S. might have been affected by Backoff, a new kind of point-of-sale (PoS) malware, according to the Department of Homeland Security.
PlayStation Network Back Online After Attack
Sony’s PlayStation and Entertainment Network are back online after a distributed denial of service (DDoS) attack crashed the systems on Sunday. But Sony says no personal info was accessed.

Enterprise Hardware Spotlight
Alert: HP Recalls 5 Million Notebook AC Power Cords
HP is recalling about 5.6 million notebook computer AC power cords in the U.S. and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard.
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.

Mobile Technology Spotlight
Verizon Hops on the Voice-Over-LTE Bandwagon
Wireless provider Verizon is gearing up for a nationwide launch of its Voice-over-LTE service over the next several weeks, promising clearer and crisper phone calls and a Skype-like video service.
Smartphone 'Kill Switch' Law in California; Will Other States Follow?
California’s new law -- signed by Gov. Jerry Brown on Monday -- aimed at deterring cellphone theft could mean most mobile phones sold in the U.S. will soon include similar “kill-switch” tech.
Apple To Replace 'Small Percentage' of iPhone 5 Batteries
If you've noticed your iPhone 5 isn't acting right, it might be because of a bad battery -- and you might be eligible for a replacement. Apple is offering new batteries, though only for a small percentage of users.

Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.