Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

6/19/2019
12:00 PM
50%
50%

Cost per Cyberattack Jumps to $4.6M in 2019

From 2018 to 2019, the percentage of cyberattacks costing $10 million or more nearly doubled, hitting 13%.

The cost of cyberattacks spiked more than $1.5 million in the past year, going from $3 million per incident in 2018 to $4.6 million in 2019. Pricier breaches are becoming more frequent: The percentage costing $10 million or more nearly doubled from 7% in 2018 to 13% this year.

Radware researchers who compiled the report "2019 C-Suite Perspectives: From Defense to Offense, Executives Turn Information Security into a Competitive Advantage" found there are four main business impacts after a cyberattack: customer loss (45%), brand reputation loss (44%), and revenue loss and operational effects (32% each). Cybersecurity has also become an executive issue, with 72% of executives reporting it's on every board meeting agenda.

Respondents are now working to meet the expectations of an increasingly cyber-savvy customer base; people want to know what companies are doing to protect their information. Three-quarters of executives say security is a key part of their marketing messages. Half of businesses sell dedicated security products and services; 41% offer security features as add-ons.

Still, companies have a long way to go. Seventy percent of senior executives polled in North America and Europe say their organization experienced a cyberattack in the 12 months prior. Three-quarters of those in EMEA admit their networks are vulnerable to cyberattacks.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
6/19/2019 | 2:50:35 PM
But wait - there's MORE
IF companies have enough CYBER ATTACK INSURANCE ----- Then it won't cost a single Penny!!!   right?
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13643
PUBLISHED: 2019-07-18
Stored XSS in EspoCRM before 5.6.4 allows remote attackers to execute malicious JavaScript and inject arbitrary source code into the target pages. The attack begins by storing a new stream message containing an XSS payload. The stored payload can then be triggered by clicking a malicious link on the...
CVE-2019-13644
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.1 is vulnerable to stored XSS due to lack of filtration of user-supplied data in a budget name. The JavaScript code is contained in a transaction, and is executed on the tags/show/$tag_number$ tag summary page.
CVE-2019-13645
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file names. The JavaScript code is executed during attachments/edit/$file_id$ attachment editing.
CVE-2019-13646
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to reflected XSS due to lack of filtration of user-supplied data in a search query.
CVE-2019-13647
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file content. The JavaScript code is executed during attachments/view/$file_id$ attachment viewing.