September 8, 2016
-
Joe Franscella
,

The Real Cost of Cyber Attacks

<p>The cost of cyber attacks has been escalating as criminals develop more advanced ways to benefit from their efforts. Exploiting network vulnerabilities and employee error has grown from a cottage industry to a full scale dark enterpr2ise. Both <a href="http://www.share.org/blog/cybercrime-the-organized-crime-rings-that-threaten-your-it-security" target="_blank">organized criminals</a> and <a href="http://www.theglobalist.com/china-united-states-cyber-crime-politics/" target="_blank">governments</a> alike are hacking targets with little regard for the damage incurred.</p><p>Consider all the different problems which will arise if and when a hacker targeting you is successful.</p><p>At the very least, resolving an issue of malware will leech time and effort that could have been spent elsewhere. Your security IT pros, or in some cases the small business owner, must address an infected computer. When a virus infection goes undetected, your whole network will run slower.</p><p>Your business may be more liable for the high cost of cyber attacks than you realize. Small to medium sized businesses used to believe themselves less desirable targets than the bigger companies whose data breaches make the headline news. Hackers have recently discovered the benefits of low-hanging fruit in the form of SMEs. These companies are often less prepared with regards to their network sanctity and security training protocols. In fact <a href="http://smallbiztrends.com/2016/04/cyber-attacks-target-small-business.html" target="_blank">cyber attacks against SMES increased 43%</a> in the last five years.</p><p>It’s no great revelation that people rely on their jobs for livelihood. But had you considered the personal damage employees will experience if the business network is attacked? The cost of cyber attacks large scale companies absorb includes lost repeat business and cleanup jobs that can cost in excess of tens of thousands of dollars. Knowing that <a href="{page_3326}">60% of hacked SMES fail</a> altogether, one must make the correlation and accept responsibility for protecting employees’ means of life. If you are the owner of the business, this is especially relevant.</p><p>Tallying the cost of cyber attacks is more than a formula for tallying expenses and lost business. If you think a hit to your wallet is personal, consider how painful losing privacy will be. Being hacked is stressful. The panic, helplessness, and shame that befall responsible parties will persist throughout the resolution process, which can be weeks or months. Persistent mental stress affects your whole body and impacts your most important relationships.</p><p>Hacks are predicted to escalate up to the point of threatening your life as you know it. Military hacks who put our troops and domestic security at risk are a serious threat. <a href="https://www.anomali.com/blog/chinese-hackers-pilfer-us-military-crown-jewels">State sponsored hacks against the US</a> come from hostile states which mean to spy on defense plans and benefit from US developments.</p><p>Local governments rely on technologies to manage elements of their respective infrastructures. Clean water, power, and waste management are controlled with supervisory control and data acquisition systems. SCADA systems have been found to have both <a href="https://www.wired.com/2013/10/ics/" target="_blank">systemic vulnerabilities and weak security practices</a> in many instances. These conditions put cities at risk of sabotage. Large scale thefts of wealth can put vulnerable people into unhealthy and even hostile situations. Terrorists could potentially interfere with the power grid or internet service. Tampering with the delivery of goods and services could potentially cause shortages which lead to rioting.</p><p>When you take in the breadth of potential damage, it can be quite alarming. Panicking about the future is not as productive as taking a proactive stance. Rather than worry, begin by taking the necessary steps to learn about threats and stop hackers from succeeding.</p><p><span class="hs-cta-wrapper" id="hs-cta-wrapper-bd3e320b-6f5f-47ad-ae30-589597d266a4"><span class="hs-cta-node hs-cta-bd3e320b-6f5f-47ad-ae30-589597d266a4" data-hs-drop="true" id="hs-cta-bd3e320b-6f5f-47ad-ae30-589597d266a4" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="{page_3457}" href="https://cta-service-cms2.hubspot.com/ctas/v2/public/cs/c/?cta_guid=bfe9d714-b9a1-4733-8b89-44b169eb6a53&amp;placement_guid=bd3e320b-6f5f-47ad-ae30-589597d266a4&amp;portal_id=458120&amp;redirect_url=APefjpE-F0yWjH6ag9zv7YVgjtNsmAD6szFKVkcjynsZQFny2qNm-jtsyO6eBX0qXSvYRmniUxsO67ivDgc_SU7CfQrfx0w-CedzpLZa2jh66_JLAGqMH1e63NvnkDDqhDvQH8gpdHC_BAUWWsVNbR9KuzBxut34Wa3phuLJ1zQfvzgyMXFSF1geSNDh0OdmBQSWS38hi2xOp7uYTcQWFOoctTrt60L1YkYnaP22GVmCX0daoqWv0sc4Wsbjl7pY5VtqM7UjT0IhlnjTj0qwbcForOYh8g918bf2Vi_Cn7ySIvhDotKJIG2tW-GnTS4WSGDBUQx3P0FdHuYBRETherkrAqRHyFsD6A&amp;hsutk=2767d93d6471d657e0c9f660e4b58ef8&amp;utm_referrer=https%3A%2F%2Fblog.anomali.com%2Fthe-real-cost-of-cyber-attacks&amp;canon=https%3A%2F%2Fblog.anomali.com%2Fthe-real-cost-of-cyber-attacks&amp;pageId=4395797448&amp;__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478822660171.1478831861868.179&amp;__hssc=41179005.8.1478831861868&amp;__hsfp=1335165674" id="cta_button_458120_bfe9d714-b9a1-4733-8b89-44b169eb6a53" style="margin: 20px auto;" target="_blank" title="Download Here">Download Here </a> </span> <script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script> <script type="text/javascript">hbspt.cta.load(458120, 'bd3e320b-6f5f-47ad-ae30-589597d266a4', {});</script> </span></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.