Cost of Data Breaches Will Keep On Getting Higher

We all know cyberattacks are a fact of business life these days and it is no longer a question of if you get attacked, but instead when will you be compromised.

When the ‘inevitable happened’, it used to be that a company was hit financially as a by-product of being hacked by cybercriminals due to factors like the impact on their reputation; customer loyalty and even share price.

High profile hacks of businesses like Target in the US resulted in large-scale customer desertion (although short-term), a reduction in share price and even executives losing their jobs.

Attacks are not going away - on the contrary they are getting more common. According to a UK government 2015 information security breaches survey, 90% of large organisations and 74% of SMEs reported a security breach, leading to an estimated total of £1.4bn in regulatory fines that have a current maximum of £500,000.

But from 2018 the cost of a data breach or hack could go far higher with new EU legislation on data breach notification set to be implemented.

These changes mean UK businesses could face up to £122bn in penalties for data breaches.

In 2018, the European Union’s General Data Protection Regulation (GDPR) will introduce fines for groups of companies of as much as, €20m or 4%, of annual worldwide turnover, whichever is greater.

Of course we don’t know what changes there might be based on Brexit, but even so it is likely the UK will adopt a similar fine doctrine.

Clearly companies, both large and small, need to act now and start putting in place robust standards and procedures to counter the cyber security threat, or face the prospect of paying drastically increased costs in regulatory fines, as well as the reputational harm to their brand.

To be ready for this and to counter the growing industrialisation of hacking, businesses must gain an awareness of their digital footprint and the profile of their attackers. By doing this they can prioritise their security to where it has the most impact and therefore prevent, detect and help contain cyber-related incidents.

Only by analysing their company through an ‘attacker’s eye view’, can they be alert of potential threats, instances of sensitive data lose or compromised brand integrity and be able to stop them quickly with less impact on their brand, and then regulatory regime.

Huffpo

« Healthcare Suffers From A Lack Of Security Awareness
Hackers Target All The Major UK Banks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Collins Aerospace

Collins Aerospace

Collins Aerospace provides cybersecurity services and systems to protect critical infrastructure facilities and railroad operations.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

Material Security

Material Security

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.