Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-nmvwc Total loading time: 0 Render date: 2024-06-15T19:08:29.295Z Has data issue: false hasContentIssue false

4 - Dealing with threats

Published online by Cambridge University Press:  08 June 2018

Get access

Summary

Introduction

Your organization is a custodian of data about your customers, staff and others you do business with, and it is your responsibility to deal with the data in a manner that demonstrates integrity. We have seen, in Chapter 2, that where data protection legislation exists, there is a legal requirement to safeguard personal data. In Chapter 3, we have seen that the data provided by a person in one context may be enhanced or enriched by judicious use of data from other sources. This ‘value-added’, higher-quality data set is an even bigger asset than what we started with – through synergy it has become more than the sum of its parts and certainly needs the same level of protection.

The Ponemon Institute's eighth annual study into the cost of a data breach in almost 300 companies, nine countries and 16 industries revealed that in 2012, this amounted to an average of US$136 per compromised customer record, a rise from the 2011 figure of US$130 per record (Ponemon Institute, 2013). The costs to German and US organizations, however, were higher, at US$199 and US$188, respectively. Other findings of interest were that data breaches as a result of malicious and criminal attacks and botnets were more costly, and that breaches due to the negligence of insiders accounted for 35% of breaches, malicious attacks being responsible for 37%, and ‘system glitches’ – IT and business process failures – for the remainder.

There are multiple threats to an organization's data, and the levels of threat behaviour facilitated by the internet, in particular, mean that taking precautions ought to be standard practice, rather than a sign of excessive caution. When an automated scanning program can check millions of IP addresses for vulnerabilities in less time than it takes to describe what it is doing, the responsible way for an organization to act is to erect its defences first, and then build behind them. Prevention rather than cure is what we must aim for, because breaches of security are irreversible, as regards the data that are lost, leaked or damaged.

It has become conventional to divide threats into internal threats, which originate within the organization, and external threats, which come from outside the organization.

Type
Chapter
Information
Information Governance and Assurance
Reducing risk, promoting policy
, pp. 81 - 112
Publisher: Facet
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×