Cyber crime costs up nearly 40%
SECURITYBy BiztechAfrica - Oct. 9, 2012, 7:47 a.m.
HP has unveiled new research indicating that the cost and frequency of cybercrime have both continued to rise for the third straight year.
According to the third annual study of U.S. companies, the occurrence of cyber attacks has more than doubled over a three-year period, while the financial impact has increased by nearly 40%.
Conducted by the Ponemon Institute and sponsored by HP, the 2012 Cost of Cyber Crime Study found that the average annualised cost of cyber crime incurred by a benchmark sample of U.S. organisations was USD8.9 million.
This represents a 6% increase over the average cost reported in 2011, and a 38% increase over 2010. The 2012 study also revealed a 42% increase in the number of cyber attacks, with organisations experiencing an average of 102 successful attacks per week, compared to 72 attacks per week in 2011 and 50 attacks per week in 2010.
“Organisations are spending increasing amounts of time, money and energy responding to cyberattacks at levels that will soon become unsustainable,” said Cassie Liddle, Solution Pre-Sales Architect, South Africa and MEMA, HP. “There is clear evidence to show that the deployment of advanced security intelligence solutions helps to substantially reduce the cost, frequency and impact of these attacks.”
The most costly cybercrimes continue to be those caused by malicious code, denial of service, stolen or hijacked devices, and malevolent insiders. When combined, these account for more than 78% of annual cybercrime costs per organisation. Additional key findings include:
- Information theft and business disruption continue to represent the highest external costs. On an annual basis, information theft accounts for 44% of total external costs, up 4% from 2011. Disruption to business or lost productivity accounted for 30% of external costs, up 1% from 2011.
- Deploying advanced security intelligence solutions can mitigate the impact of cyberattacks. Organisations that deployed security information and event management (SIEM) solutions realised a cost savings of nearly USD1.6 million per year. As a result, these organisations experienced a substantially lower cost of recovery, detection and containment than organisations that had not deployed SIEM solutions.
- Cyber attacks can be costly if not resolved quickly. The average time to resolve a cyber attack is 24 days, but it can take up to 50 days according to this year’s study. The average cost incurred during this 24-day period was USD591,780, representing a 42% increase over last year’s estimated average cost of USD415,748 during an 18-day average resolution period.
- Recovery and detection remain the most costly internal activities associated with cyber crime. On an annual basis, these activities account for almost half of the total internal cost, with operating expenses and labour representing the majority of the total.
“The purpose of this benchmark research is to quantify the economic impact of cyber attacks and observe cost trends over time,” said Dr. Larry Ponemon, chairman and founder, Ponemon Institute. “We believe a better understanding of the cost of cybercrime will assist organisations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.”
In conjunction with this third annual study of U.S. companies, cybercrime cost studies also were conducted in Australia, Germany, Japan and the United Kingdom. HP is hosting a series of webinars highlighting the findings from these studies, with the U.S.-focused webinar taking place Nov. 7. Additional information about this webinar, and those taking place in other regions, is available at www.hpenterprisesecurity.com/ponemon-cost-of-cyber-crime/.
MORE SECURITY NEWS
2014 Banking and ICT summits pegged for Uganda, Zambia and EthiopiaCyber Security Africa has announced that its 2014 Banking and ICT summits will be hosted in Uganda, Zambia and Ethiopia. Read More
Security in 2014: Money and MayhemIT security stands at the frontier of a fight for wealth and information, says Andrew Kirkland, Regional Director Africa, Trustwave. Read More
McAfee delivers on Intel vision of free mobile securityMcAfee has announced details of free protection for consumers on any Android and iOS mobile device. Read More
Botswana financial institutions exposed to cyber crimeBotswana’s financial institutions face a growing risk of cyber fraud, says BIC MD Dziki Nganunu. Read More
New Android threat risesThe AndroRAT is an example of how cyber criminals can manipulate apps for their own gain, says Intact Security. Read More
Arbor Networks partners with Networks Unlimited in SSAArbor Networks has announced a new partnership with Networks Unlimited to help organisations better mitigate and defend against the growing DDoS threat to their customers’ businesses. Read More
Trend Micro’s 2013 threat roundup highlights private data profitabilityAccording to Trend Micro Incorporated’s 2013 annual threat roundup report, “security breaches, cyber criminals, and organised attacks made it nearly impossible to keep personal and financial data private. Read More
Hardcore goons use mobiles to scare, extort KenyansHardcore criminals in prison are reported to be using mobile phones to extort money and scare Kenyan civilians. Read More
Phone scammers back in businessMicrosoft has warned of scam artists who defraud PC users by pretending to work for Microsoft. Read More
ADT, McAfee study finds parallels between physical, digital securityMcAfee has released the results of a survey that takes a look at the important parallels between personal and online security. Read More
FEATURED STORYMACRA demystifies spectrum management
Malawi's regulator explains the issues around spectrum allocation. Gregory Gondwe reports.
BEST READ NEWS
IN DEPTHYouthConnekt launches Mobile Apps for Human Development Challenge in Rwanda
Rwanda’s Ministry of Youth and ICT and the UNDP, in close collaboration with Motorola Solutions, will power a Mobile App Challenge that will be implemented by YouthConnekt.