Data Security Risks
And The Cost of
Business Continuity
The state of data
security isn’t healthy.
The number of security
breaches has increased.
The scale and cost
has nearly doubled.
But 59% of businesses still
expect more security incidents
to occur in the next year.
So what does this all mean?
?
It means your business operations
will need to change.
Why?
Because the average data
security breach costs:
Large Businesses
£1.5m
Small & Medium Size
Businesses
£75k
Loss of business continuity
brings more costs.
Data breaches create
downtime
Downtime means loss of
business continuity
The nature of the breach will determine the length of
downtime and ultimately the business continuity cost.
So let’s imagine the
worst case scenarios.
14 breaches a year
£3.1m cost per breach
Annual cost = £43.4m
Large business
4 breaches a year
£311k cost per breach
Annual cost = £1.24m
Small business
What do these
costs consist of?
?
In Kapersky Labs’ global study,
they found the following:
SMB Enterprise
Proposition of
business incurring
this expense
Typical
losses
Proportion of business
incurring this expense
Typical
losses
Professional
services
Lose business
opportunities
Down time
Total expected
typical damage
$384K $551K
88% £11K 88% $84K
32% $16K 29% $203K
34% $66K 36% $1.4M
What sort of breaches are
causing so much disruption
and costly payouts?
According to Kapersky Lab, the top 3
most expensive security breaches are:
Employee
Fraud
Cyber
Espionage
Third
Party Failure
The ICO found that the most prevalent
security incidents for businesses, from
January - March 2016, were insecure web
pages being targeted by hackers. (42%)
However it’s not just IT business
costs you should worry about.
Other big consequences include:
● Damage to company reputation.
● Temporary loss of access to
information critical to
business continuity.
● Loss of ability to do business.
This isn’t anything
to take lightly.
11% of organisations changed
the nature of their business as a
result of their worst breach.
But what if you weren’t
aware of your
business’ IT security
threats?
?
14% of IT management admitted
they have never communicated data
security threats to their board.
?
?
?
For an infrastructure that can
recover from a data protection
breach, standardisation is
required across 3 main areas
of your business...
Staffing Training Systems
But this means you must stretch
your IT budget even further.
These costs are indirect to the
recovery, yet 75% of security
breaches led to unexpected
expenses.
SMBs - $8k
Large business - $69k
Make sure you….
Educate the workforce
around your data protection
plan and what everybody is
to do in the event of one.
Make sure you….
Provide adequate
training on hosted and
cloud based systems.
Make sure you….
Choose the right
technology for your business and
ensure your IT strategy is centric to
the wider needs of the business.
Discover how to reduce the downtime and maintain
steady output in times of a breach in our guide
Data Protection: A Modern Threat to Modern Business

More Related Content

PPT
BCM Training Part 1 - Introduction To BCM - Business Risk & Management
PDF
The Ultimate Data Protection Solution
PPTX
Insurance Top TIps
PDF
Symantec Infographic
PPTX
Dont Gamble With Your Data
PDF
uLaw TCO (Total Cost of Ownership) Whitepaper
PDF
Top7ReasonsPreventativeMaintenanceCity
PDF
Process Safety Blind Spots: EXPOSED [Infographic]
BCM Training Part 1 - Introduction To BCM - Business Risk & Management
The Ultimate Data Protection Solution
Insurance Top TIps
Symantec Infographic
Dont Gamble With Your Data
uLaw TCO (Total Cost of Ownership) Whitepaper
Top7ReasonsPreventativeMaintenanceCity
Process Safety Blind Spots: EXPOSED [Infographic]

What's hot (19)

PPTX
2011 SMB Disaster Preparedness Report
PPTX
Blue Hill Research: Managing Mobile Now and in the Future
PPT
6 Secrets Of The Worlds Safest Companies
PPT
DeltaV Security - Don’t Let Your Business Be Caught Without It
PDF
Event 16 12-15 global information security workforce study 1.0
PDF
True Cost of Compliance
PDF
Integrated risk management
PDF
Cybersecurity crisis management a prep guide
PDF
Cybersecurity Incident Management PowerPoint Presentation Slides
PPTX
Outsourcing Email Management? Companies are getting the Message
PPT
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
PPTX
Pace IT - Maintenance Procedures Best Practices
PPTX
Companies Aware, but Not Prepared for GDPR
PPTX
Risk monitoring and response
PPTX
Using HFIT to Improve Safety Management Systems
PPTX
HFIT - the Human Factors Integration Tool
PDF
Brown Smith Wallace Cyber Security Infographic
PPTX
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
PDF
App Showcase: Compliance
2011 SMB Disaster Preparedness Report
Blue Hill Research: Managing Mobile Now and in the Future
6 Secrets Of The Worlds Safest Companies
DeltaV Security - Don’t Let Your Business Be Caught Without It
Event 16 12-15 global information security workforce study 1.0
True Cost of Compliance
Integrated risk management
Cybersecurity crisis management a prep guide
Cybersecurity Incident Management PowerPoint Presentation Slides
Outsourcing Email Management? Companies are getting the Message
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
Pace IT - Maintenance Procedures Best Practices
Companies Aware, but Not Prepared for GDPR
Risk monitoring and response
Using HFIT to Improve Safety Management Systems
HFIT - the Human Factors Integration Tool
Brown Smith Wallace Cyber Security Infographic
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
App Showcase: Compliance
Ad

Viewers also liked (20)

PPT
Privacy and Data Security: Risk Management and Avoidance
PDF
KJ Poppe flevolandse landbouw.
PDF
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
PDF
Denning_Todd_Report
PPT
December ISSA Meeting Executive Security Presentation
PDF
IDC Best Practices in Private Sector Cyber Security
KEY
Data-Ed Online: How Safe is Your Data? Data Security Webinar
PDF
2015 Cyber Security Strategy
PPT
IT Security Strategy
DOCX
Information Systems Security & Strategy
PDF
IBM Security Strategy Overview
PDF
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
PDF
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
PPTX
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
PPTX
CyberSecurity Best Practices for the IIoT
DOCX
ciclo autonomico-short paper - Witfor 2016 paper_42
PPTX
Big Data and Security - Where are we now? (2015)
PDF
Affects of Media on the Mind
PDF
Cybersecurity
PDF
Network infrastructure security management solution - A holistic approach in ...
Privacy and Data Security: Risk Management and Avoidance
KJ Poppe flevolandse landbouw.
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
Denning_Todd_Report
December ISSA Meeting Executive Security Presentation
IDC Best Practices in Private Sector Cyber Security
Data-Ed Online: How Safe is Your Data? Data Security Webinar
2015 Cyber Security Strategy
IT Security Strategy
Information Systems Security & Strategy
IBM Security Strategy Overview
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
CyberSecurity Best Practices for the IIoT
ciclo autonomico-short paper - Witfor 2016 paper_42
Big Data and Security - Where are we now? (2015)
Affects of Media on the Mind
Cybersecurity
Network infrastructure security management solution - A holistic approach in ...
Ad

Similar to Data security risks and the cost of business continuity (slideshare) tmcs q3 july 2016 (20)

PDF
Signacure Brochure
PDF
L123
PDF
Importance of Data Security for Business
PDF
Importance of Data Security for Business
PDF
The cost of downtime
PDF
CBIZ Cyber Security - What Every Business Needs to Know
PDF
Cybersecurity Facts & Figures - What Every Business Needs to Know
PDF
2010 Annual Study: U.S. Cost of a Data Breach
PDF
What Does a Data Breach Cost?
PDF
Cyber risks and liabilities February 2017
PDF
InformationSecurity_11141
PDF
Cyber risks and liabilities newsletter jan feb 2017
PDF
The Rise of Data Breaches in Small Businesses
PPTX
Too Small to Get Hacked? Think Again (Webinar)
PPTX
State of cybersecurity
PDF
Data Protection - Safeguarding Your Business in the Digital Age.pdf
PPTX
Will Your Business Get Hacked? #HumberBizWeek2016
PPTX
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
PPTX
Will Your Business Get Hacked in 2016?
PDF
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Signacure Brochure
L123
Importance of Data Security for Business
Importance of Data Security for Business
The cost of downtime
CBIZ Cyber Security - What Every Business Needs to Know
Cybersecurity Facts & Figures - What Every Business Needs to Know
2010 Annual Study: U.S. Cost of a Data Breach
What Does a Data Breach Cost?
Cyber risks and liabilities February 2017
InformationSecurity_11141
Cyber risks and liabilities newsletter jan feb 2017
The Rise of Data Breaches in Small Businesses
Too Small to Get Hacked? Think Again (Webinar)
State of cybersecurity
Data Protection - Safeguarding Your Business in the Digital Age.pdf
Will Your Business Get Hacked? #HumberBizWeek2016
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
Will Your Business Get Hacked in 2016?
Network Security and Privacy Liability - Four Reasons Why You need This Cove...

Recently uploaded (20)

PDF
MBA2024 CGE 1.pdf file presentation 2025
PDF
Second Hand Fashion Call to Action March 2025
PPTX
IMM.pptx marketing communication givguhfh thfyu
PDF
income tax laws notes important pakistan
DOCX
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
PDF
Communication Tactics in Legal Contexts: Historical Case Studies (www.kiu.ac...
PPTX
chapter 2 entrepreneurship full lecture ppt
PDF
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
PDF
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
PDF
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PPTX
Portfolio Example- Market & Consumer Insights – Strategic Entry for BYD UK.pptx
PPTX
Market and Demand Analysis.pptx for Management students
PDF
Cross-Cultural Leadership Practices in Education (www.kiu.ac.ug)
PDF
Stacey L Stevens - Canada's Most Influential Women Lawyers Revolutionizing Th...
DOCX
Hand book of Entrepreneurship 4 Chapters.docx
PPTX
Transportation in Logistics management.pptx
PDF
Chapter 2 - AI chatbots and prompt engineering.pdf
PDF
HQ #118 / 'Building Resilience While Climbing the Event Mountain
PPTX
IITM - FINAL Option - 01 - 12.08.25.pptx
PDF
1911 Gold Corporate Presentation Aug 2025.pdf
MBA2024 CGE 1.pdf file presentation 2025
Second Hand Fashion Call to Action March 2025
IMM.pptx marketing communication givguhfh thfyu
income tax laws notes important pakistan
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
Communication Tactics in Legal Contexts: Historical Case Studies (www.kiu.ac...
chapter 2 entrepreneurship full lecture ppt
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
Portfolio Example- Market & Consumer Insights – Strategic Entry for BYD UK.pptx
Market and Demand Analysis.pptx for Management students
Cross-Cultural Leadership Practices in Education (www.kiu.ac.ug)
Stacey L Stevens - Canada's Most Influential Women Lawyers Revolutionizing Th...
Hand book of Entrepreneurship 4 Chapters.docx
Transportation in Logistics management.pptx
Chapter 2 - AI chatbots and prompt engineering.pdf
HQ #118 / 'Building Resilience While Climbing the Event Mountain
IITM - FINAL Option - 01 - 12.08.25.pptx
1911 Gold Corporate Presentation Aug 2025.pdf

Data security risks and the cost of business continuity (slideshare) tmcs q3 july 2016

  • 1. Data Security Risks And The Cost of Business Continuity
  • 2. The state of data security isn’t healthy.
  • 3. The number of security breaches has increased.
  • 4. The scale and cost has nearly doubled.
  • 5. But 59% of businesses still expect more security incidents to occur in the next year.
  • 6. So what does this all mean? ?
  • 7. It means your business operations will need to change.
  • 9. Because the average data security breach costs: Large Businesses £1.5m Small & Medium Size Businesses £75k
  • 10. Loss of business continuity brings more costs. Data breaches create downtime Downtime means loss of business continuity
  • 11. The nature of the breach will determine the length of downtime and ultimately the business continuity cost. So let’s imagine the worst case scenarios.
  • 12. 14 breaches a year £3.1m cost per breach Annual cost = £43.4m Large business
  • 13. 4 breaches a year £311k cost per breach Annual cost = £1.24m Small business
  • 14. What do these costs consist of? ?
  • 15. In Kapersky Labs’ global study, they found the following: SMB Enterprise Proposition of business incurring this expense Typical losses Proportion of business incurring this expense Typical losses Professional services Lose business opportunities Down time Total expected typical damage $384K $551K 88% £11K 88% $84K 32% $16K 29% $203K 34% $66K 36% $1.4M
  • 16. What sort of breaches are causing so much disruption and costly payouts?
  • 17. According to Kapersky Lab, the top 3 most expensive security breaches are: Employee Fraud Cyber Espionage Third Party Failure
  • 18. The ICO found that the most prevalent security incidents for businesses, from January - March 2016, were insecure web pages being targeted by hackers. (42%)
  • 19. However it’s not just IT business costs you should worry about.
  • 20. Other big consequences include: ● Damage to company reputation. ● Temporary loss of access to information critical to business continuity. ● Loss of ability to do business.
  • 21. This isn’t anything to take lightly.
  • 22. 11% of organisations changed the nature of their business as a result of their worst breach.
  • 23. But what if you weren’t aware of your business’ IT security threats? ?
  • 24. 14% of IT management admitted they have never communicated data security threats to their board. ? ? ?
  • 25. For an infrastructure that can recover from a data protection breach, standardisation is required across 3 main areas of your business...
  • 27. But this means you must stretch your IT budget even further.
  • 28. These costs are indirect to the recovery, yet 75% of security breaches led to unexpected expenses.
  • 29. SMBs - $8k Large business - $69k
  • 30. Make sure you…. Educate the workforce around your data protection plan and what everybody is to do in the event of one.
  • 31. Make sure you…. Provide adequate training on hosted and cloud based systems.
  • 32. Make sure you…. Choose the right technology for your business and ensure your IT strategy is centric to the wider needs of the business.
  • 33. Discover how to reduce the downtime and maintain steady output in times of a breach in our guide Data Protection: A Modern Threat to Modern Business

Editor's Notes

  • #16: Can you redesign this table?