• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • The Costs of Data Breaches Continues to Rise, Says Ponemon

    December 10, 2007 Dan Burger

    There are 215 million stories in the naked city . . . and those are just the stories that have something to do with data breaches. That’s the number, dating back to January 2005, established by the Privacy Rights Clearinghouse. If you find that surprising, wait until you hear about the financial loss attached to those breaches. According to the study released last week by the Ponemon Institute, data breach incidents cost companies $197 per compromised customer record in 2007. Here are some equally sobering statistics to think about:

    • The average per-incident costs were $6.3 million.
    • The cost of lost business increased by 30 percent to an average of $4.1 million.
    • Breaches by third-party organizations such as outsourcers, contractors, consultants, and business partners were reported by 40 percent of survey respondents.

    Do you feel that knot in your stomach getting tighter?

    As companies grapple with the challenge of protecting their customers’ private data, the latest research by The Ponemon Institute shows the cost of failing to protect data do is on the rise. Lost business opportunity, including losses associated with customer churn and acquisition, represented the most significant component of the cost increase.

    “The data from 2007 suggests that although companies are responding to data breaches more efficiently, consumers seem to be less forgiving when their personal information is compromised,” said Larry Ponemon, chairman and founder of The Ponemon Institute. “The bigger problem, however, remains the persistent underlying issue of data security. Of course, the easiest way for companies to avoid the costs associated with a data breach would be to avoid a breach in the first place.”

    Ponemon’s annual Cost of a Data Breach study tracks a wide range of cost factors, including legal, investigative, and administrative expenses as well as customer defections, opportunity loss, reputation management, and costs associated with customer support such as information hotlines and credit-monitoring subscriptions.

    So what measures are being put in place by companies that were crippled by a breach? The report lists the following technologies ranked according to popularity:

    1. Expanded use of encryption
    2. Data loss prevention solutions
    3. Identity and access management solutions
    4. Endpoint security controls
    5. Security event management solutions
    6. Perimeter controls

    “Compliance requirements, new notification laws, and the growing list of breaches have made organizations aware they need a different approach to data security,” said Phillip Dunkelberger, president and chief executive officer of PGP Corporation, one of two corporate sponsors of the study. “The 2007 Ponemon study shows that erecting another firewall doesn’t work anymore because confidential data isn’t just inside the company. A single product and a bunch of tactics aren’t enough, either.”

    “The fact that more than a third of breaches result from data being shared with third parties in the normal course of business is a clear signal that organizations should examine how they are sharing their customers’ data with outsourcers, vendors, and partners,” said Steve Roop, vice president of products and marketing at Vontu, the other corporate sponsor of this survey.

    The Cost of a Data Breach report was derived from the analysis of 35 data breach incidents. Some of those incidents involved a few as 4,000 records while others exceeded 125,000 records. The companies analyzed were from 16 industries, including communications, consumer goods, education, entertainment, financial services, gaming, health care, hospitality, Internet, manufacturing, marketing, media, retail, services, technology, and transportation. Copies of the study are available through PGP, Vontu, and The Ponemon Institute.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 16, Number 48 -- December 10, 2007

    Sponsored by
    Rocket Software

    Unlock the full potential of your data with Rocket Software. Our scalable solutions deliver AI-driven insights, seamless integration, and advanced compliance tools to transform your business. Discover how you can simplify data management, boost efficiency, and drive informed decisions.

    Learn more today.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Getting Started with Trial Capacity on Demand, Part 1 Above Security Takes i5/OS Log Aggregation to Heart

    Leave a Reply Cancel reply

TFH Volume: 16 Issue: 48

This Issue Sponsored By

    Table of Contents

    • VAI Partners with Mid-Range for Canadian Sales
    • Asia/Pacific Region Bolsters Disk Array Sales in Q3
    • MKS Swings to a Profit on Revenue Growth in Fiscal 2008 Second Quarter
    • The Costs of Data Breaches Continues to Rise, Says Ponemon
    • Quest Software Buys PassGo for Access and Identity Management
    • VAI Partners with Mid-Range for Canadian Sales
    • Robert Half Says IT Hiring to Be Solid in Q1 2008
    • As I See It: What’s Past Is Prologue
    • IDC Says Server Buyers Weigh Economy and Power in Q3
    • State of the System i: Other Software Makers Weigh In

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Meet The Next Gen Of IBMers Helping To Build IBM i
    • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
    • Will Independent IBM i Clouds Survive PowerVS?
    • Now, IBM Is Jacking Up Hardware Maintenance Prices
    • IBM i PTF Guide, Volume 27, Number 24
    • Big Blue Raises IBM i License Transfer Fees, Other Prices
    • Keep The IBM i Youth Movement Going With More Training, Better Tools
    • Remain Begins Migrating DevOps Tools To VS Code
    • IBM Readies LTO-10 Tape Drives And Libraries
    • IBM i PTF Guide, Volume 27, Number 23

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle