Cost and frequency of cybercrime on the rise: Study
- 10 October, 2012 11:48
Cybercrime is costing Australian organisations as much as $10.9 million annually with some falling victim to 40 successful cyberattacks each week, according to a new study.
Information security research organisation Ponemon Institute completed case studies with 33 large Australian companies with more than 1000 seats (the number of direct connections to network and enterprise systems) for its 2012 Cost of Cyber Crime study.
The study found that the average annualised cost of cybercrime – using this benchmark sample – was $3.2 million per year.
The most costly cybercrimes continued to be caused by denial of service attacks, malicious insiders and Web-based attacks – when combined, these account for more than 60 per cent of cybercrime costs per organisation.
Disruption to business processes and revenue losses represented the highest external costs. When an attack occurred, business process losses account for 41 per cent of total external costs while costs associated with revenue losses and theft of information assets represented 54 per cent of external costs, the report said.
In addition, the average time to resolve a cyberattack – based on the sample – was 41 days compared to an average time of 21 days. The average cost incurred during a 21-day period was $183,479.
Recovery and detection were the most costly internal activities related to cybercrime, accounting for more than half the total internal cost annually, with “productivity losses and direct labour representing the majority of the total,” the report said.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
BYOD and Beyond - Implementing a Unified Access Solution
The rise of BYOD programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace. Whether you are contemplating the creation of a BYOD program or currently trying to establish one, this fact cannot be overstated. Find out how to overcome these challenges.
In Control at Layer 2: A Tectonic Shift in Network Security
Network hacking and corporate espionage are on the rise and set to intensify. Information security risks remain commonplace, and most organisations need to increase vigilance. This paper has analyses the realistic threats to fibre optic Ethernet networks – both at the LAN and WAN level. Read now.
Best Practice in BYOD
The key trend affecting enterprise mobility today can be summarized in four letters: BYOD – Bring Your Own Device. As the number of end-users bringing devices into your organization grows, so does the need for an effective Enterprise Mobility Management (EMM) solution. Learn how to manage devices across multiple platforms all from a single, centralised and unified management console. Download for more!