ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Is Your Company at Risk of a Cyber Attack?

Updated on July 14, 2017

How Much Does a Cyber Attack Cost?

Businesses face more and more cyber threats – technology and cyber crime develop together. Companies depend greatly on mobile technology, which allows working from virtually every corner of the world but also potentially exposes sensitive information.

The cost of a cyber attack depends on many factors. It is certainly less expensive to defend your company against a security breach than dealing with its aftermath. If a cyber attack can’t be prevented, a backup plan can reduce the costs significantly. Work out your emergency budget in advance to be able to take the necessary measures quickly after a breach has occurred.

The cost of a breach may involve immediate money loss but doesn’t end there. A cyber attack can result in a loss of customers, business partners, and value of the company’s stock. Costs may accrue years after the breach. A lot will depend on detection time (some cyber attacks take place years before they are detected), the type of attack (a one-time occurrence or ongoing/periodical?), and reaction time – sometimes executives choose to ignore the breach, hoping for the best.

Cyber attacks may also involve costs to the community; people may lose jobs and depend on social benefits. The company will pay less tax because of a decreased revenue. Experts estimate that companies in the U.S. lose $250 – $300 billion a year as a result of cyber crime.

Mobile Technology

Mobile technology has many advantages for companies. For starters, it allows greater flexibility – you may work from any place in the world with an Internet connection. The tide of mobile technology seems unstoppable – there will be 50 billion mobile devices on the market by 2050. This estimation doesn’t seem implausible if you consider that the average executive carries three to four mobile devices at any time. Out of 7 billion people on the planet, 6 billion have a phone. For comparison, only 4.5 billion people have access to toilets of latrines. Mobile technology is changing the face of the world and is here to stay.

But mobile technology also poses many risks. When implementing mobile technology, companies focus on their potential to increase productivity, not on their security. And yet, 12,000 laptops are lost or stolen at U.S. airports every week. Airports, despite a sense of security they inspire, are the breeding ground of criminals who steal mobile devices to extract sensitive information.

Social Media

Social media shape today’s world, there is no doubt about that. However, they are far from being risk-free. Social media have been used by hackers to profile banks. The criminals broke into several bank employees’ accounts in order to obtain such information as names, bank names, and titles. The criminals, using the bank employees’ credentials, sent e-mails to customers of the bank to obtain credit card information.

Many hacker groups, such as Anonymous, use social media to gain followers and commit crimes. Anonymous is driven by ideology – their basic principle is that information is for sharing, not for owning. Anyone disagreeing with the group is a potential target. Anonymous has attacked many corporate and government targets, as well as some child pornography sites. In the past, Anonymous has used social media to conduct a distributed denial-of-service attack, which comes down to flooding a website with so much traffic that it temporarily ceases to function.


Sources:

Ulsch, N MacDonnell, “Cyber Threat! How to Manage the Growing Risk of Cyber Attacks”, Wiley, 2014

Want to Learn More?

Here you can read about third-party vendors and cyber security.

Read more about protecting your company against cyber attacks.

Here you'll find information about global cyber threats.

Click here to find out how to handle a cyber attack.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)