• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • The Costs of Data Breaches Continues to Rise, Says Ponemon

    December 10, 2007 Dan Burger

    There are 215 million stories in the naked city . . . and those are just the stories that have something to do with data breaches. That’s the number, dating back to January 2005, established by the Privacy Rights Clearinghouse. If you find that surprising, wait until you hear about the financial loss attached to those breaches. According to the study released last week by the Ponemon Institute, data breach incidents cost companies $197 per compromised customer record in 2007. Here are some equally sobering statistics to think about:

    • The average per-incident costs were $6.3 million.
    • The cost of lost business increased by 30 percent to an average of $4.1 million.
    • Breaches by third-party organizations such as outsourcers, contractors, consultants, and business partners were reported by 40 percent of survey respondents.

    Do you feel that knot in your stomach getting tighter?

    As companies grapple with the challenge of protecting their customers’ private data, the latest research by The Ponemon Institute shows the cost of failing to protect data do is on the rise. Lost business opportunity, including losses associated with customer churn and acquisition, represented the most significant component of the cost increase.

    “The data from 2007 suggests that although companies are responding to data breaches more efficiently, consumers seem to be less forgiving when their personal information is compromised,” said Larry Ponemon, chairman and founder of The Ponemon Institute. “The bigger problem, however, remains the persistent underlying issue of data security. Of course, the easiest way for companies to avoid the costs associated with a data breach would be to avoid a breach in the first place.”

    Ponemon’s annual Cost of a Data Breach study tracks a wide range of cost factors, including legal, investigative, and administrative expenses as well as customer defections, opportunity loss, reputation management, and costs associated with customer support such as information hotlines and credit-monitoring subscriptions.

    So what measures are being put in place by companies that were crippled by a breach? The report lists the following technologies ranked according to popularity:

    1. Expanded use of encryption
    2. Data loss prevention solutions
    3. Identity and access management solutions
    4. Endpoint security controls
    5. Security event management solutions
    6. Perimeter controls

    “Compliance requirements, new notification laws, and the growing list of breaches have made organizations aware they need a different approach to data security,” said Phillip Dunkelberger, president and chief executive officer of PGP Corporation, one of two corporate sponsors of the study. “The 2007 Ponemon study shows that erecting another firewall doesn’t work anymore because confidential data isn’t just inside the company. A single product and a bunch of tactics aren’t enough, either.”

    “The fact that more than a third of breaches result from data being shared with third parties in the normal course of business is a clear signal that organizations should examine how they are sharing their customers’ data with outsourcers, vendors, and partners,” said Steve Roop, vice president of products and marketing at Vontu, the other corporate sponsor of this survey.

    The Cost of a Data Breach report was derived from the analysis of 35 data breach incidents. Some of those incidents involved a few as 4,000 records while others exceeded 125,000 records. The companies analyzed were from 16 industries, including communications, consumer goods, education, entertainment, financial services, gaming, health care, hospitality, Internet, manufacturing, marketing, media, retail, services, technology, and transportation. Copies of the study are available through PGP, Vontu, and The Ponemon Institute.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 16, Number 48 -- December 10, 2007

    Sponsored by
    Manta Technologies

    The Leader in IBM i Education!
    Need training on anything i?
    Manta is all you need.

    Spring Sale! Save 20% off any Manta Combination Package, including the complete IBM i Training Library. Now through April 30.

    130 courses and competency exams on:
    · IBM i operations
    · System Management and Security
    · IBM i Programming Tools
    · Programming in RPG, COBOL, CL, Java
    · Web Development
    · SQL, DB2, Query

    Product features:
    · Runs in every popular browser
    · Available 24/7/365
    · Free Student Reference Guides
    · Free Student Administration
    · Concurrent User License
    · Built-In IBM i Simulator

    You can download our 200-page catalog and take sample sessions at MantaTech.com.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Getting Started with Trial Capacity on Demand, Part 1 Above Security Takes i5/OS Log Aggregation to Heart

    Leave a Reply Cancel reply

TFH Volume: 16 Issue: 48

This Issue Sponsored By

    Table of Contents

    • Robert Half Says IT Hiring to Be Solid in Q1 2008
    • VAI Partners with Mid-Range for Canadian Sales
    • Database Tool Maker Joins the System i Market
    • Quest Software Buys PassGo for Access and Identity Management
    • State of the System i: Other Software Makers Weigh In
    • The Costs of Data Breaches Continues to Rise, Says Ponemon
    • IDC Says Server Buyers Weigh Economy and Power in Q3
    • MKS Swings to a Profit on Revenue Growth in Fiscal 2008 Second Quarter
    • As I See It: What’s Past Is Prologue
    • Asia/Pacific Region Bolsters Disk Array Sales in Q3

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • LANSA Developing Business Intelligence Tool
    • Blazing The Trail For VTL In The Cloud
    • Data De-Dupe Gives VTL Customers More Options
    • Four Hundred Monitor, March 29
    • The Big Spending On IT Security Is Only Going To Get Bigger
    • IBM Tweaks Some Power Systems Prices Down, Others Up
    • Disaster Recovery: From OS/400 V5R3 To IBM i 7.4 In 36 Hours
    • The Disconnect In Modernization Planning And Execution
    • Superior Support: One Of The Reasons You Pay The Power Systems Premium
    • IBM i PTF Guide, Volume 25, Number 13

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2023 IT Jungle