Data Security Risks
And The Cost of
Business Continuity
The state of data
security isn’t healthy.
The number of security
breaches has increased.
The scale and cost
has nearly doubled.
But 59% of businesses still
expect more security incidents
to occur in the next year.
So what does this all mean?
?
It means your business operations
will need to change.
Why?
Because the average data
security breach costs:
Large Businesses
£1.5m
Small & Medium Size
Businesses
£75k
Loss of business continuity
brings more costs.
Data breaches create
downtime
Downtime means loss of
business continuity
The nature of the breach will determine the length of
downtime and ultimately the business continuity cost.
So let’s imagine the
worst case scenarios.
14 breaches a year
£3.1m cost per breach
Annual cost = £43.4m
Large business
4 breaches a year
£311k cost per breach
Annual cost = £1.24m
Small business
What do these
costs consist of?
?
In Kapersky Labs’ global study,
they found the following:
SMB Enterprise
Proposition of
business incurring
this expense
Typical
losses
Proportion of business
incurring this expense
Typical
losses
Professional
services
Lose business
opportunities
Down time
Total expected
typical damage
$384K $551K
88% £11K 88% $84K
32% $16K 29% $203K
34% $66K 36% $1.4M
What sort of breaches are
causing so much disruption
and costly payouts?
According to Kapersky Lab, the top 3
most expensive security breaches are:
Employee
Fraud
Cyber
Espionage
Third
Party Failure
The ICO found that the most prevalent
security incidents for businesses, from
January - March 2016, were insecure web
pages being targeted by hackers. (42%)
However it’s not just IT business
costs you should worry about.
Other big consequences include:
● Damage to company reputation.
● Temporary loss of access to
information critical to
business continuity.
● Loss of ability to do business.
This isn’t anything
to take lightly.
11% of organisations changed
the nature of their business as a
result of their worst breach.
But what if you weren’t
aware of your
business’ IT security
threats?
?
14% of IT management admitted
they have never communicated data
security threats to their board.
?
?
?
For an infrastructure that can
recover from a data protection
breach, standardisation is
required across 3 main areas
of your business...
Staffing Training Systems
But this means you must stretch
your IT budget even further.
These costs are indirect to the
recovery, yet 75% of security
breaches led to unexpected
expenses.
SMBs - $8k
Large business - $69k
Make sure you….
Educate the workforce
around your data protection
plan and what everybody is
to do in the event of one.
Make sure you….
Provide adequate
training on hosted and
cloud based systems.
Make sure you….
Choose the right
technology for your business and
ensure your IT strategy is centric to
the wider needs of the business.
Discover how to reduce the downtime and maintain
steady output in times of a breach in our guide
Data Protection: A Modern Threat to Modern Business

Data security risks and the cost of business continuity (slideshare) tmcs q3 july 2016

  • 1.
    Data Security Risks AndThe Cost of Business Continuity
  • 2.
    The state ofdata security isn’t healthy.
  • 3.
    The number ofsecurity breaches has increased.
  • 4.
    The scale andcost has nearly doubled.
  • 5.
    But 59% ofbusinesses still expect more security incidents to occur in the next year.
  • 6.
    So what doesthis all mean? ?
  • 7.
    It means yourbusiness operations will need to change.
  • 8.
  • 9.
    Because the averagedata security breach costs: Large Businesses £1.5m Small & Medium Size Businesses £75k
  • 10.
    Loss of businesscontinuity brings more costs. Data breaches create downtime Downtime means loss of business continuity
  • 11.
    The nature ofthe breach will determine the length of downtime and ultimately the business continuity cost. So let’s imagine the worst case scenarios.
  • 12.
    14 breaches ayear £3.1m cost per breach Annual cost = £43.4m Large business
  • 13.
    4 breaches ayear £311k cost per breach Annual cost = £1.24m Small business
  • 14.
    What do these costsconsist of? ?
  • 15.
    In Kapersky Labs’global study, they found the following: SMB Enterprise Proposition of business incurring this expense Typical losses Proportion of business incurring this expense Typical losses Professional services Lose business opportunities Down time Total expected typical damage $384K $551K 88% £11K 88% $84K 32% $16K 29% $203K 34% $66K 36% $1.4M
  • 16.
    What sort ofbreaches are causing so much disruption and costly payouts?
  • 17.
    According to KaperskyLab, the top 3 most expensive security breaches are: Employee Fraud Cyber Espionage Third Party Failure
  • 18.
    The ICO foundthat the most prevalent security incidents for businesses, from January - March 2016, were insecure web pages being targeted by hackers. (42%)
  • 19.
    However it’s notjust IT business costs you should worry about.
  • 20.
    Other big consequencesinclude: ● Damage to company reputation. ● Temporary loss of access to information critical to business continuity. ● Loss of ability to do business.
  • 21.
  • 22.
    11% of organisationschanged the nature of their business as a result of their worst breach.
  • 23.
    But what ifyou weren’t aware of your business’ IT security threats? ?
  • 24.
    14% of ITmanagement admitted they have never communicated data security threats to their board. ? ? ?
  • 25.
    For an infrastructurethat can recover from a data protection breach, standardisation is required across 3 main areas of your business...
  • 26.
  • 27.
    But this meansyou must stretch your IT budget even further.
  • 28.
    These costs areindirect to the recovery, yet 75% of security breaches led to unexpected expenses.
  • 29.
    SMBs - $8k Largebusiness - $69k
  • 30.
    Make sure you…. Educatethe workforce around your data protection plan and what everybody is to do in the event of one.
  • 31.
    Make sure you…. Provideadequate training on hosted and cloud based systems.
  • 32.
    Make sure you…. Choosethe right technology for your business and ensure your IT strategy is centric to the wider needs of the business.
  • 33.
    Discover how toreduce the downtime and maintain steady output in times of a breach in our guide Data Protection: A Modern Threat to Modern Business

Editor's Notes

  • #16 Can you redesign this table?