The Growing Cost Of Cyber Crime

No industry is untouched by the growing cost of cybercrime and organisations have seen security breaches grow by 67% in the past five years alone. Cybercrime is increasing, takes more time to resolve, and is more expensive for organisations to deal with .

Banking is one of the most affected areas, with annual costs crossing $18 million in 2018. This probably not surprising as financial motives are a major incentive for hackers as historically criminals have often tried to steal from banks in the past. However, cybercrime is now costing all types of business around the world enormous amounts of money.

Current estimates suggest that cybercrime has a projected global value $5.2 trillion for criminals over the next 5 years.

Experts Categorise Cyber Crime into 4 Groups

  • Malware,
  • Wweb-based attacks,
  • DDoS (denial of service) 
  • Malicious insiders.

While the first two are distressing, as huge information loss takes place, the third one additionally, disrupts the business. However, the insider led crime is the most vicious, as it grinds everything to a halt. Undoubtedly, the USA tops the list with known costs of $27.4 million, followed by Japan of $13.6 million, Germany $13.1million, UK 11.5 million, France $9.7 million, according to the Raconteur website. Other big nations reeling under the ill effects of such crime are Singapore, Canada, Spain, Italy, Brazil and Australia. Unfortunately, many countries do not have reliable data.

Evidently, the Banking industry is most prone to such ingress in their IT systems and data shows losses in 2018, totalling $18.4 million. Utility and software are also big losers in the same range. The auto industry has shown a 50 per cent increase in cyberattack hits last year, while travel and life sciences have faced 100 per cent more virulence in cybercrime losses. Even the media industry suffered a reported $9.2 million worth of fraud effects. 

Information theft is the most expensive and fastest rising consequence of cybercrime. However, data is not the only target. Core systems such as industrial controls are being hacked in a dangerous trend to disrupt and destroy, the report said.

While data remains a key target, theft is not always the outcome of an attack. A new wave of cyberattacks sees data no longer just being copied but being destroyed or changed, in attempts to breed distrust.

The steps that can be taken to mitigate the consequences of this new crime is to use more frequent and up-to-date employee training and cyber audits should be included in an organisation’s company strategy and tactics.
 
Cyber Security Intelligence  can connect you with experts who can complete a Cyber Audit and advise on the best course of action to vastly improve your cyber resilience, securing your data and protect your business from cyber-attacks with a plan for the Future.

CSI can also suggest and recommend the best Cyber Security Training Programmes that will work best for your Organisation and Employees.

Contact Us HERE

Business World:          Visual Capitalist:           ZDNet

You Might Also Read: 

Measuring Your Organisation’s Cyber Security:

Cybersecurity Has A Metrics Problem:   

 

 

« 'Cyber Ranges' Improve Corporate Security
Notorious Hackers Claim Responsibility For Attacks On Labour Party »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Cybereason

Cybereason

Cybereason provides real-time detection of malicious activity enabling you to identify the cause and scope of an attack and ensure an effective response.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

The Cyber Security Expert

The Cyber Security Expert

The Cyber Security Expert delivers cyber security consultancy, website and cloud security monitoring services, and specialist training services.

Gigacycle

Gigacycle

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

Cado Security

Cado Security

Cado Security is pushing digital forensics, and cyber incident response to the next level with an incident response software platform and specialist consulting services.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

SafePaas

SafePaas

SafePaas is a leading Enterprise Risk Management Platform. One source of truth for all your Audit, Risk, and Compliance requirements. Complete governance across your systems.

Secjur

Secjur

Secjur is a provider of AI-based compliance tools that aim to put compliance, data protection, information security and whistleblowing on autopilot.

Calamu

Calamu

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it.