Study: The Aftermath Of A Breach

  /     /     /  
Publicated : 22/11/2024   Category : security


Study: The Aftermath Of A Breach


New Ponemon-Experian study highlights organizations top priorities following a data breach



Youve been breached: How do you minimize the fallout? Hiring outside legal help and assessing the damage to victims are the top two priorities, according to a new survey.
The newly released Aftermath of a Data Breach report from Experian and the Ponemon Institute surveyed IT security pros about a data breach they felt had the biggest impact on their organizations, both financially and reputationally.
Just half of the respondents said their organizations had done all they could to shield customer data, and 56 percent said retaining legal counsel was a priority, followed by analyzing the harm to user data (50 percent). Nearly 65 percent of organizations did not offer credit monitoring services to their customers affected by the breach, and 73 percent dont offer credit monitoring or other identity theft tools as part of their business.
Sixty percent of the organizations had not encrypted their customer data that was breached. Nearly 35 percent of the breaches were caused by insider mistakes; 19 percent, via a third-party outsourcer; and 16 percent, via a malicious insider.
Among the stolen data were email (70 percent); credit card and payment data (45 percent); and Social Security numbers (33 percent).
IT professionals in this study are correct when they say that following the loss or theft of consumer data it is critical for companies to take steps to understand the root cause in order to prevent another breach and protect consumers from future harm, said Larry Ponemon, chairman and founder of Ponemon Institute.
The good news: Following the data breach, 61 percent said their organizations increased their security budgets, and nearly 30 percent expanded their IT staff.
A full copy of
the report is available here for download
.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Study: The Aftermath Of A Breach