Average Cost of Cyber Crime Per Company is US$7.7M

October 2015
CFO Innovation Asia;10/15/2015, p1
The article reports on the 13 percent and 14 percent increase in average annualized cost of cyber crime incurred by a benchmark sample of Australian and Japanese organizations according to a Ponemon Institute study that was sponsored by HP Enterprise Security. Topics discussed include ways enterprises can better plan their security strategy and investments, the most costly internal cost related to cyber crime, and the total average cost of cyber crime in the U.S.


Related Articles

  • Are you Preventing Data Losses?  // Security: Solutions for Enterprise Security Leaders;Sep2009, Vol. 46 Issue 9, p16 

    The article reports on the study conducted by Ponemon Institute LLC regarding data protection in 2009. The study found out that there are 58% of companies which believe that data protection is crucial as part of their risk management, while 12% of companies are in doubt. The study also claimed...

  • Mapping to the NIST Cybersecurity Framework. Durbin, Steve // CIO Insight;10/8/2014, p1 

    The article focuses on the advantages offered by the National Institute of Standards and Technology (NIST) Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity on business enterprises developing a cyber-risk strategy. Topics discussed include the importance of risk...

  • Datendiebstahl als Insiderverbrechen. Moerler, Christian // Risiko Manager;2013, Issue 1, p3 

    The article reports that a study has been issued by the Ponemon Institute of the actual cost of cybercrime, and the author presents his opinion of its implications.

  • Vast Majority Of Companies Not Covered For Cyber Attack.  // National Underwriter / P&C;5/16/2011, Vol. 115 Issue 18, p12 

    In this article, the author discusses the management of issues involving cyber attacks in companies. The author mentions the significance of investing on network-liability policies in ensuring the security of a company. He also mentions insights of some notable people regarding the issue such as...

  • Building Risk Resilience. DURBIN, STEVE // Information Security;Jun2012, Vol. 14 Issue 5, p7 

    The author discusses security measures to deal with computer security threats and the challenges faced by business enterprises. He mentions various computer network threats including external threats, regulatory threats and internal threats. Several security measures are suggested including that...

  • SAFEGUARDING CUSTOMER DATA. PYZIK, KENNETH // Internal Auditor;Oct2014, Vol. 71 Issue 5, p22 

    The article discusses strategies on protecting against cyber breaches, which affected the business of eBay, Home Depot and Target in 2014 after hackers were able to obtain their customers' data. Topics discussed include the three states of personally identifiable information (PII), aspects...

  • The cybersecurity threat is real ... so commit. Shipchandler, Shamoil T.; Riley, Rachel M. // Inside Counsel (SyndiGate Media Inc.);6/8/2015, p7 

    The article discusses the need for law firms to be committed in their efforts intensify their cybersecurity measures. Topics discussed include cybersecurity risks affecting every industry including schools, the government and the retail industry, reasons behind groups' cyberterrorism efforts...

  • Managing the risk of IoT. Sorebo, Gib // Control Engineering;Sep2015, Vol. 62 Issue 9, p33 

    The article presents six ways to effectively manage security risks that comes with the use of the Internet of Things (IoT), which includes identifying existing IoT implementations in place, planned or anticipated, adopting security policies or procedures related to IoT and participating in...

  • THE NEW REALITY OF CYBERSECURITY. Tuttle, Hilary // Risk Management (00355593);Oct2015, Vol. 62 Issue 8, p21 

    The article focuses on steps in developing a cybersecurity strategy to protect company assets from digital invasion. Topics include assessing a company's cybersecurity through its policies, procedures, training and risk management, acquiring the services of an insurer, and having a robust,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics