Instrumented Interconnecteds Intelligent

Posted by
in

Post feed

RSS 2.0

Laurence Guihard-Joly, General Manager, IBM Resilience Services

Laurence Guihard-Joly, General Manager, IBM Resiliency Services

By Laurence Guihard-Joly

Last August hackers stole personal photos of young actress Jennifer Lawrence and other celebrities from their smartphones and posted them online. Several months later, Sony Entertainment was hacked and the group responsible has routinely leaked troves of sensitive information, including everything from email threads to financial and salary details.

A similar intrusion at JPMorgan Chase late last year compromised the records of 76 million households and seven million business clients. The common thread between celebrity photo hacks and digital corporate invasions is the tools and tactics thieves use to purloin private pics and to steal more lucrative loot are the same – from spreading malware that can damage systems and compromise data to distributing “phishing” emails designed to trick people into sharing passwords and other sensitive info.

But while swiped movie star snaps make for bigger headlines at the supermarket checkout, the danger is much greater from data breaches like the ones at Sony Entertainment and JPMorgan Chase – where the damage can result in lower revenue, lost business, legal exposures and irreparable damage to reputation.

These risks become bigger and guarding against them more difficult as people put their business and personal information “into the cloud” by using mobile devices to purchase consumer goods, monitor health and fitness, pay taxes and manage government benefits, check investment accounts, make bank transfers, and share business correspondence and documents.

For more than a decade, the Ponemon Institute has performed detailed global analyses on the threat and impact of data breaches, and the news this year is not good as hackers and the tools they use become more sophisticated and efficient. Ponemon’s 2015 survey (2015 Cost of Data Breach Study: Global Analysis) of more than 350 companies showed that the cost of such intrusions is now roughly $3.8 million per incident, up 23 percent over the past two years. Average cost per record of sensitive information compromised has risen by 6 percent to $154 over the past year.

The latest Ponemon study highlights three key new findings that illustrate how detecting and preventing such breaches is a rising priority for many companies as the frequency and severity of these intrusions increases:

  • Security starts at the top – The focus on data breaches is rising to the top of the business, with senior leaders becoming involved in decisions to increase investments in security and insurance out of concern not only for near-term costs but also long-term impacts on reputation and business prospects. The survey shows for the first time that board-level involvement decreases intrusion costs by $5.5 per compromised record;
  • Time is not on your side – For the first time, the survey showed a direct correlation between how quickly an organization detects and stops a breach and the overall cost, with the average time it takes to identify a malicious attack being 256 days. The more time intruders have to poke around in your system, the greater the damage and the more they can steal. Consider that the Sony Entertainment intrusion went on for more than a year before anyone even discovered it;
  • Be Prepared – Having a comprehensive security policy means having all the right people involved across the business. For example, the study said early involvement of the Business Continuity Management team in remediation of intrusions can lower the costs of a breach by an average of $7.1 per record. The BCM team focuses daily on the resiliency of IT systems, guarding against a range of threats including natural disasters, civil unrest and, yes, security breaches. If you have to take a server, a database, or data center down to fix a security breach, it’s the Business Continuity Management team who can keep the business up and running by using the data backup or moving the work to another location.

Stolen celebrity selfies may create a bigger media splash, but the trend lines clearly show that corporate security breaches are a bigger concern as hackers are far more interested in cash than flash.As the Ponemon Study illustrates, top-level focus on the issue, acting with speed, and involving the right people – like your Business Continuity Management team – are all essential to combating these threats quickly and effectively.

Bookmark and Share

Previous post

Next post

20 Comments
 
September 3, 2016
5:57 am

what an info my buddy
snapchat for mac


Posted by: snapchat app
 
June 27, 2016
5:42 am

Thanks Laurence Guihard for such a great Piece.


Posted by: kamau
 
June 24, 2016
3:56 am

Nice post on cyber crime prevention.


Posted by: Brendah
 
June 10, 2016
2:47 pm

thanx bgt


Posted by: kredit mobil honda semarang
 
March 7, 2016
7:54 pm

snapchat pc


Posted by: snapchat pc
 
March 7, 2016
7:51 pm

hi
mobogenie for pc


Posted by: mobogenie pc
 
March 7, 2016
7:49 pm

good attempt
snapchat pc


Posted by: snapchatpc
 
March 7, 2016
1:27 am

As everyone being engaged over the web the more chances are there for the happenings of cyber crime. So anyone who is doing any type of business over web must be aware about the cyber crime and ways to prevent oneself from such type of happenings.


Posted by: Robert Johnsonn
 
March 5, 2016
9:32 am

nice


Posted by: imo for pc
 
September 10, 2015
5:00 am

Thanks Laurence Guihard-Joly for your nice article .Really cyber crime risks become bigger and we want to relifr from here.Computer crime


Posted by: zahid
 
July 7, 2015
1:47 am

Thanks for your comment..

Cyber crime is real and on the rise. We need to develop smarter tools in order to beat the hackers at their own game.


Posted by: Alice
 
July 7, 2015
1:46 am

Nice comment…

Cyber security is at the top of our organizations priority. Our customers must feel safe & secure with our online store. Great article!


Posted by: Alice
 
July 7, 2015
1:45 am

Thanks Gabu

Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.


Posted by: Alice
 
June 30, 2015
6:55 am

Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.


Posted by: Gabu
 
June 15, 2015
12:25 pm

Cyber security is at the top of our organizations priority. Our customers must feel safe & secure with our online store. Great article!


Posted by: Telematic Controls
 
June 10, 2015
4:49 am

And the more its detected the sharper the offenders become


Posted by: agrieconomics
 
June 5, 2015
6:35 am

Cyber crime is real and on the rise. We need to develop smarter tools in order to beat the hackers at their own game.


Posted by: Frank
 
June 5, 2015
4:12 am

We need to prevent information fully. Who are these hackers?


Posted by: Dorcas Nduati
 
May 28, 2015
6:10 am

I’d recommend this article to anyone out there in charge of systems in an organization. as you put it its all about proactive deterrent steps because the opposite is very costly. Thank you for this great article.


Posted by: cavs
 
May 28, 2015
2:00 am

Thank you for that great article. For minor hacks I would advice people to maintain good system hygiene. It goes without saying that you must have a fully updated operating system and installed software and a good security software to protect your computer/phone/tablet – apart from having safe browsing habits.


Posted by: Evans
 
Post a Comment