1 4, , , 7 1 7 6 1 8 28 6 - thomsonreuters.com.sg · DATA RECORDS LOST OR STOLEN SINCE 2013 Only 4%...

1
Build your culture of compliance With Thomson Reuters Compliance learning Learn more SOURCES 1. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/813599/Cyber_Security_ Breaches_Survey_2019_-_Main_Report.pdf 2. https://www.businessinsider.com/data-hacks-breaches-biggest-of-2018-2018-12#2-marriott-starwood-hotels-500-million-20 3. https://databreachcalculator.mybluemix.net/ 4. https://gdpr.eu/2019-small-business-survey/ 5. https://www.ibm.com/downloads/cas/ZBZLY7KL 6. https://securethebreach.com/ 1. ENCRYPT YOUR SENSITIVE DATA Locate your sensitive data and encrypt it. Whether your data resides on-premises, in virtual environments, the cloud or is in motion, encryption will render it useless to attackers. 3. MANAGE AND CONTROL USER ACCESS Manage and control access to your corporate resources and apps by verifying a user's identity, assessing and applying the right access policy, and enforcing the appropriate access controls using single sign on. 2. SECURE AND OWN YOUR ENCRYPTION KEYS Store encryption keys securely and separately from encrypted data. By centrally managing the key lifecycle, you ensure you maintain ownership and control of your data at all times. 4. TRAINING Train your employees and management to ensure they are knowledgeable of various laws and regulations. Thomson Reuters Compliance Learning courses provide interactive online training to ensure your company stays compliant. Here are some ways you and your company can strengthen your data privacy: TOP TIPS Of those who said they did use technical measures, encryption was the measure mentioned most often of businesses surveyed said they do not use technical measures to protect personal data 22% ARE YOU PROTECTED? 34% SOMEWHAT AGREE 9% NEUTRAL / DISAGREE 44% COMPLETELY AGREE HOW COMPLIANT ARE YOU? 716 small European businesses were asked: “Does your organization describe its data processing activities in clear, plain language to data subjects?” 2 1 Identify a lawful basis for using someone’s data Describe data processing activities in clear, plain language to data subjects The GDPR requires businesses to: Out of the 23 million small businesses in Europe required to comply with the General Data Protection Regulation (GDPR) implemented in 2018, around half of them are failing GDPR compliance on two crucial requirements. GDPR GENERAL DATA PROTECTION REGULATION 2018 2019 Only 33% of businesses have cyber security policies in place 27% of businesses had cyber security policies in place vs 30% of surveyed UK businesses made changes to cyber security due to GDPR Among the 30%... 15% had extra staff training or communications 11% changed firewall or system configurations 6% created new contingency plans* 60% created new policies *Remaining 8% - Other COST OF A MEGA BREACH A mega breach is more than 1 million records lost or stolen. $39.49M Records breached 1M 10M 20M 30M 40M 50M $147.70M $199.83M $279.31M $325.27M $350.44M The United States had the highest total average cost at $8.19M, followed by the Middle East at $5.97M. Alternatively, India and Brazil had the lowest total average cost at $1.83M and $1.35M, respectively. THE AVERAGE TOTAL COST OF A DATA BREACH by country or region in 2018 (measured in US$ millions) 8.19 5.97 4.78 4.44 4.33 3.88 3.75 3.52 3.30 3.06 2.62 2.30 2.13 1.86 1.83 1.35 UNITED STATES MIDDLE EAST GERMANY CANADA FRANCE UNITED KINGDOM JAPAN ITALY SOUTH KOREA SOUTH AFRICA ASEAN SCANDINAVIA AUSTRALIA TURKEY INDIA BRAZIL AVERAGE TOTAL COST OF DATA BREACH: $150 per record lost $3.92M Most costly industry: Healthcare $6.45M Most expensive country: The United States $8.19M TIMELINE OF A DATA BREACH 200 DAYS $4.56M $3.34M Containment in less than 200 days costs on average a total of Containment in over 200 days costs on average a total of INITIAL BREACH DETECTION Average time taken: 35 days CONTAINMENT Average time taken: 314 days ACTING FAST SAVES $ AV. 37% MORE EXPENSIVE MFUFT 26% Windows App 22% Other 45% Office Doc of known malware infiltrates systems via email Over 90% NUMBER OF BREACH INCIDENTS BY SOURCE Although malicious breaches were most common, inadvertent breaches from human error and system glitches were still the root cause for nearly half of all data breaches. $ $ $ $ $ $ $ $ $ $ $ 51% Malicious or criminal attack 25% System Glitch 24% Human Error Costing $133 * per stolen record Costing $132 * per stolen record Costing $166 * per stolen record *Cost to repair breach and recover lost data TOP 3 BIGGEST DATA BREACHES OF 2018 340 Million records affected 500 Million records affected 1.1 Billion records affected Learn the facts about data privacy and take precautions to ensure your organization isn’t the next victim of a malicious attack. Data records lost or stolen at the following frequency: DATA RECORDS LOST OR STOLEN SINCE 2013 Only 4% of breaches were “secure breaches” where encryption was used and the stolen data was rendered useless. 5,932,132 Every day Every hour 247,172 Every minute 4,120 Every second 69 14 7 1 7 61 8 28 6 , , , PROTECT YOUR PRIVACY: ENCRYPTION IS ESSENTIAL DATA BREACHES

Transcript of 1 4, , , 7 1 7 6 1 8 28 6 - thomsonreuters.com.sg · DATA RECORDS LOST OR STOLEN SINCE 2013 Only 4%...

Page 1: 1 4, , , 7 1 7 6 1 8 28 6 - thomsonreuters.com.sg · DATA RECORDS LOST OR STOLEN SINCE 2013 Only 4% of breaches were “secure breaches” where encryption was used and the stolen

Build your culture of complianceWith Thomson Reuters Compliance learning

Learn more

SOURCES1. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/813599/Cyber_Security_

Breaches_Survey_2019_-_Main_Report.pdf2. https://www.businessinsider.com/data-hacks-breaches-biggest-of-2018-2018-12#2-marriott-starwood-hotels-500-million-203. https://databreachcalculator.mybluemix.net/4. https://gdpr.eu/2019-small-business-survey/5. https://www.ibm.com/downloads/cas/ZBZLY7KL6. https://securethebreach.com/

1. ENCRYPT YOURSENSITIVE DATA

Locate your sensitive data and encrypt it. Whether your data resides on-premises, in virtual environments, the cloud or is in motion, encryption will render it useless to attackers.

3. MANAGE ANDCONTROL USERACCESS

Manage and control access to your corporate resources and apps by verifying a user's identity, assessing and applying the right access policy, and enforcing the appropriate access controls using single sign on.

2. SECURE AND OWNYOUR ENCRYPTIONKEYS

Store encryption keys securely and separately from encrypted data. By centrally managing the key lifecycle, you ensure you maintain ownership and control of your data at all times.

4. TRAINING

Train your employees and management to ensure they are knowledgeable of various laws and regulations. Thomson Reuters Compliance Learning courses provide interactive online training to ensure your company stays compliant.

Here are some ways you and your company can strengthen your data privacy:

TOP TIPS

Of those who saidthey did use technical measures, encryption

was the measure mentioned most often

of businesses surveyed said they do not use

technical measures to protect personal data

22%

ARE YOU PROTECTED?

34% SOMEWHAT AGREE

9% NEUTRAL / DISAGREE

44% COMPLETELY AGREE

HOW COMPLIANT ARE YOU?716 small European businesses were asked:

“Does your organization describe its data processing activities in clear, plain language to data subjects?”

21Identify a lawful basis for using someone’s data

Describe data processingactivities in clear, plain

language to data subjects

The GDPR requires businesses to:

Out of the 23 million small businesses in Europe required to comply with the General Data Protection Regulation (GDPR) implemented in 2018, around half of them are failing GDPR compliance on two crucial requirements.

GDPRGENERAL DATA PROTECTION REGULATION

2018 2019Only 33%

of businesses have cyber security

policies in place

27%of businesseshad cyber security policies in place

vs

30%of surveyed UK

businesses madechanges to cyber

security dueto GDPR

Among the 30%...

15%had extra staff

training or communications

11%changed firewall

or system configurations

6%created new contingency

plans*

60%created

newpolicies

*Remaining 8% - Other

COST OF AMEGA BREACHA mega breach is more than 1 million records lost or stolen.

$39.49M

Records breached 1M 10M 20M 30M 40M 50M

$147.70M

$199.83M

$279.31M

$325.27M$350.44M

The United States had the highest total average cost at $8.19M, followed by the

Middle East at $5.97M.

Alternatively, India and Brazil had the lowest total

average cost at $1.83M and $1.35M, respectively.

THE AVERAGE TOTAL COSTOF A DATA BREACHby country or region in 2018 (measured in US$ millions)

8.19

5.97

4.78

4.44

4.33

3.88

3.75

3.52

3.30

3.06

2.62

2.30

2.13

1.86

1.83

1.35

UNITED STATES

MIDDLE EAST

GERMANY

CANADA

FRANCE

UNITED KINGDOM

JAPAN

ITALY

SOUTH KOREA

SOUTH AFRICA

ASEAN

SCANDINAVIA

AUSTRALIA

TURKEY

INDIA

BRAZIL

AVERAGE TOTALCOST OF DATABREACH:

$150 per record lost

$3.92M

Most costly industry:Healthcare

$6.45M

Most expensive country:The United States

$8.19M

TIMELINE OF A DATA BREACH

200 DAYS

$4.56M$3.34M

Containment in less than 200 days costs on average a total of

Containment in over 200 days costs on average a total of

INITIAL BREACH

DETECTIONAverage time taken: 35 days

CONTAINMENTAverage time taken: 314 days

ACTING FAST SAVES $ AV. 37% MORE EXPENSIVE

200 days

$4.56M

Containment in over 200 days is on average

37% more expensive, costing around

$3.34M

Acting fast saves $ - containment in less than 200 days costs on average a total of

The average time from breachto containment is 314 days(279 days from detection)

BREACH0 days

DETECTION35 days: average time taken to identify breach

LIFECYCLE OFA DATA BREACH

File types:

26% Windows App

22% Other

45% Office Doc

of known malware infiltrates systems

via email

Over 90%

NUMBER OF BREACH INCIDENTSBY SOURCE

Although malicious breaches were most common, inadvertent breaches from human error and system glitches were still the root

cause for nearly half of all data breaches.

$$$ $$$ $$$$$

51%Malicious or criminal attack

25%System Glitch

24%Human Error

Costing $133*per stolen record

Costing $132*per stolen record

Costing $166*per stolen record

*Cost to repair breach and recover lost data

TOP 3 BIGGESTDATA BREACHESOF 2018

340 Millionrecords affected

500 Millionrecords affected

1.1 Billionrecords affected

Learn the facts about data privacy and take precautions to ensure your organizationisn’t the next victim of a malicious attack.

Data records lost or stolen at the following frequency:

DATA RECORDS LOST OR STOLEN SINCE 2013Only 4% of breaches were “secure breaches” where encryption was used

and the stolen data was rendered useless.

5,932,132Every day Every hour

247,172Every minute4,120

Every second69

1 4 7 1 7 6 1 8 2 8 6, , ,

PROTECT YOUR PRIVACY: ENCRYPTION IS ESSENTIAL

DATA BREACHES