Feeds

Cost of IT security breaches doubles – FBI

More firms blow the whistle

  • alert
  • submit to reddit

Intelligent flash storage arrays

Two in three US firms say they lost money after falling victim to security breaches last year, according to an FBI survey. The cost of intrusions was almost double that of 2000.

Eighty-five percent of respondents taking part in the sixth annual Computer Crime and Security Survey, detected computer security breaches in 2001. Most resulted in a financial hit, with 64 per cent saying their firms had lost money due to security lapses.

The survey discovered a slight increase in willingness to report computer crimes. More than a third (36 per cent) of the 538 security professionals polled reported intrusions to law enforcement, up from 25 per cent who contacted the authorities about breaches in the prveious year.

The average cost of security breaches, for those 186 firms prepared to estimate losses, was more than $2 million, compared to an average loss of $1.06 million recorded last year.

As in previous years, the most serious financial losses occurred through theft of proprietary information (34 respondents reported loses of $151 million) and financial fraud (21 respondents lost an estimates total of $93 million).

Internet connections, rather than internal systems, were cited as the most common point of attack.

Denial of service attacks, employee misuse of computers (downloading pirate software or porn) and viruses become more serious problem last year, according to the survey, which was conducted by the Computer Security Institute trade association with the FBI.

Patrice Rapalus, CSI Director, said the survey showed "neither technologies nor policies alone really offer an effective defence for your organisation".

Firms which want to build secure infrastructures should embrace "both the human and technical dimensions" of information security, and develop a properly funded strategy to combat security breaches, he said. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.