In: Computer Science
What are some to the hidden cost an organization need to deal with after a data breach? Use your own word
Detection, escalation, notification and post data breach response
The four main activities that follow a data breach are detection, escalation, notification and post data breach response – and they all mean additional costs to an organization.
Detection and escalation: Activities that enable a company to detect and report a breach to appropriate personnel within a specified time period.
Notification costs: Activities that enable the company to notify individuals who had data compromised in the breach (data subjects) as regulatory activities and communications.
Post data breach response: Processes set up to help individuals or customers affected by the breach to communicate with the company, as well as costs associated with redress activities and reparation with data subjects and regulators.
Lost business cost: Activities associated with the cost of lost business, including customer turnover, business disruption, and system downtime.
This last point is important, as once an organization has lost the trust of their customers, it is very difficult to win it back, with 64 percent of consumers saying they are unlikely to do business with a company where their financial or sensitive data was stolen.
Increase in third-party website breaches
Aside from these figures, there are two other important points to take away from the findings:
The increase in third-party vulnerabilities emphasizes the need for companies to closely vet the security of the companies they do business with, align security standards, and actively monitor third-party access.
Global beauty brand Sephora was forced to email online customers to inform them of that their personal information may have been exposed to unauthorized third parties, including first and last name, date of birth, gender, email address, and encrypted password, as well as data related to beauty preferences.
As this example demonstrates, your company website is one area where third parties can present an access point to your customers’ sensitive information – and yet it is often overlooked by the security team. However, it is important to mitigate any threat from third party vendors by creating an allowlist and a blocklist that allow you to only share data with trusted vendors.
With the loss or theft of more than 11.7 billion records in the past three years alone, the Ponemon report urges companies to be aware of the full financial impact that a data breach can have on their bottom line – and focus on how they can reduce these costs.
Speak to us about how we can help manage and secure all your third-party vendor technologies to prevent unauthorized data collection and prevent a potentially disastrous data breach within your organization.
Some more of the report’s headlines findings include: