SINGAPORE 7th August 2023 — Data breaches cost billions of dollars around the world each year; for instance, IBM found back in 2022, that the average cost of a data breach in the U.S. to be $9.44 million. Besides monetary losses, data breaches erode consumer confidence, and lowers an organization’s credibility and reputation.

In the latest report from ExtraHop, a leader in cloud-native network detection and response (NDR), findings showed that public companies surveyed saw net income drop an average of 73 percent roughly one year following the announcements of a data breach.

Beyond Upfront Costs, Reputation Damages and Revenue Losses

No alt text provided for this image
Charts from The True Cost of a Security Breach report

To help business leaders better understand the full impact of a data breach, the analysis from ExtraHop looks at the costs associated with data breaches at six organizations, calculating the sum of regulatory fines, legal settlements, and cyber insurance, in addition to the longer-term effects on corporate earnings and stock price.

Nearly all organizations analyzed experienced a decline in quarterly earnings and stock prices after a data breach occurred. In one example following their study, ExtraHop noted that the company’s stock prices dropped double-digits after the breach in months to follow, as well as a large sum of insurance payments in filings to compensate for its security failings.

“When a data breach hits, real people lose real money – it goes way past the upfront costs that accompany stolen records and the number of people affected,” said Patrick Dennis, CEO, ExtraHop. “Both investors and customers lose faith in the business, which has a ripple effect on the organization for years to come. It’s important that corporate leaders take a hard look at their budget and make the cybersecurity investments they need to more effectively manage risk.”

Using Network Intelligence for Better Prevention

In today’s security landscape, organizations need full visibility into their network to track the movement of potential intruders and identify security threats before they become business problems. Using network intelligence to detect attacks in their earliest stages–when attackers are scanning for open ports and vulnerabilities, when they start using Active Directory to enumerate domain admin accounts, when they try elevating their privileges, or begin using Remote Desktop Protocol–is critical to preventing costly, damaging data breaches and avoiding unexpected security expenses.

While securing an organization can be a significant investment, ExtraHop argues that strong security tools can be much more cost effective.

Learn more about the True Cost of A Security Breach with ExtraHop, that shares specific tactics and techniques to help organizations better prepare for potential data breaches.

(This article was adapted from a press release from ExtraHop).

About ExtraHop

ExtraHop is the cybersecurity partner enterprises trust to reveal the unknown and unmask the attack. The company’s Reveal(x) 360™ platform is the only network detection and response platform that delivers the 360-degree visibility needed to uncover the cybertruth. When organizations have full network transparency with ExtraHop, they see more, know more, and stop more cyberattacks. Learn more at www.extrahop.com.

Recommended PostS

Newsletter

Subscribe to CXPOSÉ Newsletter

Get the latest conversations on customer experiences in your inbox.

Subscription Form
Related Posts

Newsletter

Subscribe to CXPOSÉ Newsletter

Get the latest conversations on customer experiences in your inbox.

Subscription Form
Other Categories
Follow Us
Open Source is more than just code, says SUSE APAC CTO Vishal Ghariwala.

Like, Follow and Share CXposè.tech's Socials below: 💎
🎉Website: https://cxpose.tech/
🎉Linkedin: https://lnkd.in/g5XjYfWW
🎉TikTok: https://lnkd.in/gUypxwVn
🎉Instagram: https://instagram.com / cxposetech 
🎉X: https://x.com/CxposeT3ch

#opensource #code #suse
The Secret Sauce of Open Source with SUSE's APAC CTO.

It's just another day with Hack CX and Javin Chew as he chats with another tech industry thought leader!

Like, Follow and Share CXposè.tech's Socials below: 💎
🎉Website: https://cxpose.tech/
🎉Linkedin: https://lnkd.in/g5XjYfWW
🎉TikTok: https://lnkd.in/gUypxwVn
🎉Instagram: https://instagram.com / cxposetech 
🎉X: https://x.com/CxposeT3ch

#opensource #digitaltransformation #cx
CXposè.tech was in Hong Kong last year for Cyberport's annual venture capital forum. 

Many startup founders and VC professionals like Sogal's Pocket Sun attended as well, and we took the opportunity to find out her top tips for founders to nurture and cultivate their own wellness and that of their teams. #wellness #leadership #startups 

 Like, Follow and Share CXposè.tech
's Socials below: 💎 
🎉Website: https://cxpose.tech/
🎉Linkedin: https://lnkd.in/g5XjYfWW
🎉TikTok: https://lnkd.in/gUypxwVn
🎉Instagram: https://www.instagram.com/cxposetech/
🎉X: https://x.com/CxposeT3ch
🔥CXposè.tech has a new playlist!🔥

Hack CX's Javin Chew talks with Chwee Beng about Supply Chain 2.0 and they dive into disaggregation as a result of the eCommerce wave which began in 2007. This eCommerce had sparked the mindset of brands going directly to consumers with their products and services.
Of course, supply chain had to adapt to this massive trend.

🎉This and more were discussed during Episode 2 of Hack CX: Supply Chain 2.0: Embracing AI and Sustainability Practices with Former GM & Board Member Chwee Beng Lee🎉

💯Watch the full episode here: https://youtu.be/yIhYnNwbdzI?feature=shared💯

CXposè.tech's Socials:
Website: https://cxpose.tech/
Linkedin: / cxpos%c3%a9-tech
TikTok: / cxpose
Instagram: https://www.instagram.com/cxposetech/
Loading the next set of instagram posts...