The Cost of Cyber Crime

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Previous Next

Click through for results from a survey on the cost of cyber attacks, sponsored by ArcSight, an HP company, and conducted by the Ponemon Institute.

The Second Annual Cost of Cyber Crime Study, sponsored by ArcSight, an HP company, is based on a representative sample of 50 organizations in various industry sectors. While the research focused on organizations located in the United States, many are multinational corporations. For consistency purposes, the benchmark sample consists of only larger-sized organizations (i.e., more than 700 enterprise seats).

Despite widespread awareness of the impact of cyber crime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions. Key takeaways from this report include:

  • Cyber crimes can do serious harm to an organization’s bottom line. The study found that the median annualized cost of cyber crime for the organizations in the study is $5.9 million per year, with a range of $1.5 million to $36.5 million each year per company. This represents an increase in median cost of 56 percent from the first cyber cost study published last year.
  • Cyber attacks have become common occurrences. The companies in the study experienced 72 successful attacks per week and more than one successful attack per company per week. This represents an increase of 44 percent from last year’s successful attack experience.
  • The most costly cyber crimes are those caused by malicious code, denial of service, stolen devices and Web-based attacks. Mitigation of such attacks requires enabling technologies such as SIEM and enterprise governance, risk management and compliance (GRC) solutions.

Similar to last year, the purpose of this benchmark research is to quantify the economic impact of cyber attacks and observe cost trends over time. ArcSight believes that a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.

More Slideshows:


The State of Enterprise Mobility Mobile devices greatly improve employee productivity, but most organizations do not have a structure in place to support the devices.

Five IT Career Skills on the UpswingFive IT skills getting attention from recruiters.

Eight Rules for Investing in a New Accounting SystemTips on choosing the right accounting system for your business.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

cloud5-190x128.jpg How to Keep Your Cloud Technologies Secure

Just because a loss event hasn't happened yet doesn't mean you have immunity; no organization does. See how you can keep cloud technologies secure. ...  More >>

Security75-190x128 A New Security Approach to Combat Today's Threats

By focusing security resources on detection and containment, with a strong emphasis on network visibility, enterprises can turn the tables on cyber criminals. ...  More >>

Global20-290x195 5 Recommendations to Secure the Internet of Things

Five recommendations to mitigate IoT risk and maintain a strong security posture in this ever-growing connected world. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date