Estimating the cost of a cloud data breach
Posted on 05 June 2014.
IT and security professionals expect cloud services to multiply the likelihood and economic impact of data breaches as they pervade the enterprise. They also reveal that the scope of usage and responsibility for securing cloud services remains largely unknown among IT, according to Netskope.


The report draws upon Ponemon Institute’s May 2014 Cost of a Data Breach study that established a cost of $201.18 per lost or stolen customer record. For a data breach involving 100,000 or more customer records the cost would come to just over $20 million.

Survey respondents were asked to estimate the current probability of a data breach of that magnitude and then how increasing the use of cloud services would change that probability. The report states that this multiplies the probability of a data breach by as much as 3x.

“With a $201 price tag for every record lost, the cost of a data breach of just 100,000 records is $20 million. Imagine then if the probability of that data breach were to triple simply because you increased your use of the cloud. That’s what enterprise IT folks are coming to grips with and they’ve started to recognize the need to align their security programs to account for it,” said Sanjay Beri, CEO and founder of Netskope.

“The report shows that while there are many enterprise-ready apps available today, the uncertainty from risky apps is stealing the show for IT and security professionals. Rewriting this story requires contextual knowledge about how these apps are being used and an effective way of mitigating risk,” according to Beri.

“We’ve been tracking the cost of a data breach for years but have never had the opportunity to look at the potential risks and economic impact that might come from cloud in particular,” said Dr. Larry Ponemon, Chairman and Founder of Ponemon Institute. “It’s fascinating that the perceived risk and economic impact is so high when it comes to cloud app usage."

Lack of confidence in the cloud increases expectations of a data breach
Across the board, respondents believe that their high-value IP and customer data are less secure when the use of cloud services increases. Respondents said they believe there is a lack of due diligence in the implementation and monitoring of security programs within companies and have uncertainty about cloud service provider security practices, while recognizing that there are unknown cloud services in a network.

This all leads to the general perception that the probability of a data breach is increasing in today’s IT environment.
  • Respondents estimate that every 1 percent increase in the use of cloud services will result in a 3 percent higher probability of a data breach. This means that an organization using 100 cloud services would only need to add 25 more to increase the likelihood of a data breach by 75 percent.
  • More than two-thirds (69 percent) of respondents believe that their organization is not proactive in assessing information that is too sensitive to be stored in the cloud.
  • 62 percent of respondents believe the cloud services in use by their organization are not thoroughly vetted for security before deployment.
  • Almost three-quarters (72 percent) of respondents believe their cloud service provider would not notify them immediately if they had a data breach involving the loss or theft of their intellectual property or business confidential information, and 71 percent believe they would not receive immediate notification following a breach involving the loss or theft of customer data.
  • Respondents believe 45 percent of all software applications used by organizations are in the cloud, but exactly half (22.5 percent) of these applications are not visible to IT.
  • Respondents estimate that 36 percent of business critical apps are based in the cloud, yet IT lacks visibility into nearly half of them.
Ponemon Institute surveyed 613 IT and security practitioners in the U.S. who are familiar with their company’s usage of cloud services. The web-based survey was fielded in March of 2014.





Spotlight

Lessons learned developing Lynis, an open source security auditing tool

Posted on 15 October 2014.  |  Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening. It is written in shell script, installation is not required and can be performed with a privileged or non-privileged account.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 17th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //