The Enterprise Security Supersite NewsFactor Sites:     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
You are here: Home / Network Security / Human Error Cause of Most Breaches
Real-time info services with Neustar
Report: Human Error, System Problems  Cause Most Breaches
Report: Human Error, System Problems Cause Most Breaches
By Jennifer LeClaire / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus

Human errors and system problems caused two-thirds of data breaches in 2012 and pushed the global average to $136 per record. So says a new study from Symantec Corp. and the Ponemon Institute called "2013 Cost of Data Breach Study: Global Analysis."

The companies point to issues like employee mishandling of confidential data, lack of system controls, and violations of industry and government regulations. Heavily regulated fields including healthcare, finance and pharmaceutical-incurred breach costs 70 percent higher than other industries.

"While external attackers and their evolving methods pose a great threat to companies, the dangers associated with the insider threat can be equally destructive and insidious," said Larry Ponemon, chairman of the Ponemon Institute. "Eight years of research on data breach costs has shown employee behavior to be one of the most pressing issues facing organizations today, up 22 percent since the first survey."

Malicious Attacks Most Costly

Overall, the global cost per compromised customer record was up over last year. But the United States total cost per data breach incident was down slightly at $5.4 million. That decline, the report suggested, is thanks to the appointment of chief information security officers (CISOs) with enterprise-wide responsibilities, comprehensive incident response plans, and stronger overall security programs.

"Given organizations with strong security postures and incident response plans experienced breach costs 20 percent less than others, the importance of a well-coordinated, holistic approach is clear," said Anil Chakravarthy, executive vice president of the Information Security Group at Symantec. "Companies must protect their customers' sensitive information no matter where it resides, be it on a PC, mobile device, corporate network or data center."

According to the report, and not surprisingly, malicious and criminal attacks are the most costly everywhere. Consolidated findings show that malicious or criminal attacks cause 37 percent of data breaches and are the most costly data breach incidents in all nine countries. U.S. and German companies experience the most expensive data breach incidents caused by malicious or criminal attackers at $277 and $214 per compromised records, respectively.

Getting to the Root

We caught up with Jim Butterworth, chief security officer at HBGary, to get his take on the findings. He told us by conducting a forensic investigation to determine the root cause of an incident, a victim is able to determine the extent and breadth of an intrusion.

"In years past, folks would essentially 'overreport,' meaning if a database was accessed, the assumption was made that it was copied. However, there are digital artifacts present that can play a huge role in risk mitigation, regulatory compliance and satisfy the due diligence aspects of any liability," Butterworth said. "By collecting and analyzing these artifacts as part of its overall incident response program, a victim can significantly reduce the financial impact and civil liability typically associated with these breaches."

Symantec recommends the four best practices to prevent a data breach and reduce costs in the event of one: educate employees and train them on how to handle confidential information; use data loss prevention technology to find sensitive data and protect it from leaving your organization; deploy encryption and strong authentication solutions; and prepare an incident response plan, including proper steps for customer notification.

Tell Us What You Think



Posted: 2013-06-25 @ 3:55am PT
Given the lack of repect big companies especially give to their staff, it is not surprising that company loyalty is becoming less and less. All the preventative measures described in this article are about training users / employees, but how about training senior management in the companies to treat their staff better and make people less inclined to cause breaches?

Maureen Robinson:

Posted: 2013-06-20 @ 1:34am PT
The fact that human errors and system problems caused two-thirds of data breaches in 2012 shows that we still have a lot to work to better manage application security. And although industries including healthcare, finance and pharmaceutical are heavily regulated, the fact that breach costs 70% higher than other industries shows that they are not yet enough regulated. We also wrote a blog article explaining the threats banking applications are exposed to and some steps which might help addressing and improving the overall security posture. The article is available here:

Like Us on FacebookFollow Us on Twitter
Protect 100% of your Data The prevalence of laptops and mobile devices in the enterprise makes corporate data increasingly vulnerable to loss and breach. And yet, workforce productivity is now inextricably linked to mobility. Click here to access the white paper "Top 10 Endpoint Backup Mistakes" to learn more about how to confidently protect data across platforms and devices while also providing features designed to enhance the end user experience.
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Russian Gang with Stolen IDs Hacks Hosting Company
In August, a Russian cyber gang obtained what researchers called “the largest cache of stolen data." Now, those hackers may be putting their ill-gotten gains to criminal use.
Dairy Queen Latest Retailer To Report Hack
Known for its hot fries and soft-serve ice cream, Dairy Queen just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.

Enterprise Hardware Spotlight
AMD's New FX Series CPU Breaks Processing Speed Record
The new FX-8370 processor from Advanced Micro Devices has set a record for silicon processor speed, the company announced. Overclocked, the eight-core chip was measured at 8722.78 MHz.
Intel Intros Lightning-Fast PC Processors
Call it extreme. Intel just took the covers off its first-ever eight-core desktop processor, which is aimed at hardcore power users who expect more than the status quo from their computers.
HP Previews ProLiant Gen9 Data Center Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.

Mobile Technology Spotlight
Rumor Mill Puts Mobile Wallet in iPhone 6
Apple is moving toward the mobile wallet world with its next iPhone. The tech giant has partnered with retailers, banks and major payment networks to make it happen, according to Bloomberg.
Will iPhone Finally Catch Up with NFC Mobile Payment Ability?
Apple's latest version of the iPhone may have a mobile wallet to pay for purchases with a tap of the phone. The iPhone 6 reportedly is equipped with near-field communication (NFC) technology.
Visual Search To Shop: Gimmick or Game Changing?
Imagine using your phone to snap a photo of the cool pair of sunglasses your friend is wearing and instantly receiving a slew of information about the shades along with a link to order them.

Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.