4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Large or Small, Data Breaches Can Wreck Your Business

Large or Small, Data Breaches Can Wreck Your Business

It’s no secret that a data breach can have serious consequences for any business, especially after some of the events that occurred throughout 2017. From the costs to repair any internal damage done to the efforts it takes to regain client trust, recovering from such an attack is no easy feat--and they’re only poised to get worse.

The breaches that were seen throughout 2017 actually had a lower average cost than other years, dropping by 10%. However, this still makes the average cost of a breach a considerable $3.62 million, and the particular bodies that were breached are cause for equally considerable concern. Furthermore, while there was a decrease in the average cost of a data breach, there was more data lost in the first half of 2017 than there was in the whole of 2016.

Looking back at the nature of some of these data breaches, there’s little wonder that so much data was lost.

The Equifax breach provides one of the most stunning examples of a data breach, and on a related note, one of the biggest examples of how a breach shouldn’t be handled. Not only were 143 million customers made vulnerable between May and July of 2017, the credit monitoring company waited until September to come clean that a breach had occurred. As a result, a little over a third of the American population was put at risk by having their personally identifiable information like social security numbers and birth dates stolen, without any knowledge of it. The CEO of Equifax put out an apology video that was widely seen as insincere, before losing his job.

In March, a database belonging to business analytics firm Dun & Bradstreet was exposed, allowing 33.7 million contact information records to be accessed. The database included contact information from a variety of recognizable organizations, including Walmart, AT&T, and most disconcertingly, 100,000 employee records from the Department of Defense. This information included the names and job titles of these employees as well.

Verizon also found itself in hot water in July when 14 million of their customers had enough data to access their accounts exposed. While there was no indication that this database was actually ever accessed by a cybercriminal, the fact that it could be accessed by anyone who happened to type it the right URL provides proof, along with the countless other examples of data breaches, that businesses need to take their data security more seriously than they are.

The most effective means of doing so may be to outline the cost that each industry faced for each breached record.

Reportedly, records for the following industries cost the breached business the associated amounts, for each record that was breached.

  • Healthcare: $355
  • Education: $246
  • Financial: $241
  • Services: $208
  • Life science: $195
  • Retail: $172
  • Communications: $164
  • Industrial: $156
  • Energy: $148
  • Technology: $145
  • Hospitality: $139
  • Consumer: $133
  • Media: $131
  • Transportation: $129
  • Research: $112
  • Public: $80

These are the numbers for 2016, so while 2017’s average cost per breached record will be lower, it is important to remember how many more breaches were seen in 2017, and how many more records were therefore accessed. As a result, while the average cost will be lower, the total can be expected to be much, much higher.

This applies to more than just the major companies and other large businesses and enterprises that are out there, as well. Reports have indicated that, not only do over 70% of attacks target small businesses, but over half of all small businesses have been a target of a cyberattack. Even worse for the small business, the estimated cost per breach can reach over half a million dollars, out-of-pocket, once all fees and fines are accounted for.

That estimate doesn’t even take the lost business that can be counted on after a data breach into account. So, not only does a data breach cost you financially, there’s a decreased chance of even bouncing back afterwards.

Clearly, a data breach isn’t something that a small, or even a medium-sized, business can afford. 4IT offers solutions to help protect your data from such breaches. Reach out to us at 305-278-7100 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Business Management Hackers Backup Productivity Hosted Solutions Malware Managed Service Provider Google IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Hardware VoIP Business Continuity Mobile Devices User Tips Workplace Tips Network Security Saving Money Computer Mobile Device Management Virtualization Upgrade Windows 10 Miscellaneous Data Server Email communications Alert Mobile Computing Small Business Communication Network Save Money Microsoft Office Quick Tips Apps Managed IT Services Outsourced IT Social Media Smartphone Smartphones BYOD Going Green Mobile Office Browser Information Technology Productivity Cybercrime Health Android Gadgets Holiday Office Operating System Application Ransomware Chrome Managed IT Cybersecurity Passwords Mobility Best Practice Disaster Risk Management Tablet WiFi Data Backup Firewall The Internet of Things Avoiding Downtime IT Solutions Spam BDR Data Management Data Recovery Search Collaboration History Telephone Systems Internet of Things Remote Computing Automation Unified Threat Management Hard Drives Vendor Management Marketing Hacking Saving Time User Error Phishing Remote Monitoring VPN Wireless Technology Employer-Employee Relationship Budget Facebook Apple Law Enforcement Content Filtering Office Tips Office 365 Proactive IT Vulnerability Password Money Hosted Solution iPhone Customer Relationship Management Maintenance Computers Recovery Phone System Data Security Big Data Two-factor Authentication Work/Life Balance USB Bring Your Own Device Analytics Encryption IT Support Gmail Router Antivirus Government App Shortcut Social Humor Administration Intranet Lithium-ion battery Wearable Technology Social Engineering Google Drive Telephony OneNote PowerPoint Virus Current Events Printer Tech Support SaaS Excel Outlook Audit HaaS Point of Sale Windows 10 IT COnsultant Politics Business Intelligence Personal Information Cost Management Computer Repair Retail Bandwidth Printer Server Wireless Unsupported Software Laptop Cloud Computing Data Breach Private Cloud Save Time Trending Users Education Net Neutrality Identity Theft Data Protection Windows 8 Flexibility Paperless Office Cortana Managing Stress Samsung Project Management Fax Server Wi-Fi Emergency Artificial Intelligence Network Congestion Workplace Applications Help Desk Streaming Media Blockchain Travel hacker Commerce Uninterrupted Power Supply online currency Update Customer Service Transportation Biometrics Computer Care Virtual Reality Battery Data Loss Robot Networking Meetings Managed IT Services Automobile Google Docs Redundancy End of Support Data Storage Efficency Instant Messaging Social Networking Emails Legal HIPAA Internet Exlporer Entertainment Benefits DDoS Computer Accessories Solid State Drive Display Mouse Compliance Sports Augmented Reality eWaste CrashOverride IT Budget Lifestyle Regulations Wiring Safety WannaCry Text Messaging IT Management Ebay Information Computing How To Value Word Chromecast data breach Settings Upgrades Debate Cameras Legislation User Evernote WIndows Server 2008 Training Science MSP Windows Ink Administrator risk management Colocation Consultant Virtual Desktop Presentation Comparison The Blindside Of Best Available Workers Patch Management Bluetooth IT Technicians Company Culture Black Market Google Maps Access Touchscreen Specifications Nokia Twitter IT Security Updates Regulation SharePoint Cleaning Identities Software as a Service Surge Protector Experience Conferencing Teamwork Television Keyboard Microsoft Word Avoid Downtime Sync 3D Printing IoT Busines Continuity iOS Near Field Communication Gifts Managed IT Service Music Hiring/Firing Device Security Adobe Computer Fan Data storage Books IT consulting ISP Human Resources Running Cable Smart Technology Devices Video Games Licensing Dark Web Document Management Microsoft Excel Reliable Computing Credit Cards Hard Drive Advertising Screen Mirroring Programming Blogging Spyware Touchpad Mobile Device Bloatware File Sharing Managed Security FAQ Images Cast Website Uograde Scam Fraud Windows 10s Nanotechnology Sales systems Charger OneDrive Branding Amazon Distributed Denial of Service Employer Employee Relationship Edge Tablets Hard Disk Drive Operating Sysytem Root Cause Analysis Co-managed IT Worker Commute hack WIndows 7 Wireless Charging PDF HBO Storage Ciminal Scalability Inbound Marketing NFL Files best practices IT service Reputation Domains Tutorial Shadow IT Relocation Buisness Language Gift Giving Webinar Tech Term Mobile IT solutions Proactive Microblogging Youtube Professional Services Taxes Websites Managed Service Provder Supercomputer Webinar Electronic Medical Records