PRO+ Premium Content/Information Security
Access your Pro+ Content below.
Data breach costs hit hard; where are you most vulnerable?
This article is part of the Information Security issue of February 2020, Vol. 21, No. 1
You've probably heard Benjamin Franklin's quip about death and taxes: they're life's only certainties. Then again, good ol' B. Franks didn't live to see the rise of the internet age. If he had, he surely would've added one more item to that list of life's inevitabilities: data breaches. Like death and taxes, breaches are always unpleasant and can be expensive. Data breach costs remain staggeringly high -- nearly $4 million on average, according to IBM Security's 2019 "Cost of a Data Breach Report." In the same report, it's revealed that loss of business accounts for the largest chunk of data breach costs (36%), closely followed by the expenses associated with detection and escalation (31%). Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
Features in this issue
-
Threat intelligence offers promise, but limitations remain
Do you know how to use threat intelligence feeds to best effect in your company? Learn what this valuable yet often confusing resource can and can't do for cybersecurity.
-
Data breach costs hit hard; where are you most vulnerable?
Breaking down the cost of a data breach isn't for the faint of heart. But with millions of dollars on the line for a single event, companies also need to have their eyes wide open.
News in this issue
-
Fresh thinking on cybersecurity threats for 2020
It's a good time to take a clear-eyed view of the likely security threats facing your organization. But then what? Experts suggest getting creative with your threat responses.
Columns in this issue
-
Cisco CISO says today's enterprise must take chances
Cisco CISO Steve Martino talks about taking chances, threats, how the security leader's role is changing and what really works when it comes to keeping the company secure.
-
2 components of detection and threat intelligence platforms
Deploying threat detection and intelligence platforms is one of the smartest ways to protect your organization's valuable assets. Make sure you know how to choose the best tool.