{"id":219,"date":"2021-04-26T14:55:34","date_gmt":"2021-04-26T14:55:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/?p=219"},"modified":"2021-04-26T14:55:56","modified_gmt":"2021-04-26T14:55:56","slug":"j4-what-are-the-cost-benefits-to-cybersecurity-programs-in-business","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/2021\/04\/26\/j4-what-are-the-cost-benefits-to-cybersecurity-programs-in-business\/","title":{"rendered":"J7: What are the cost\/benefits to cybersecurity programs in business?"},"content":{"rendered":"\n<p>Developing a solid cyber risk culture and technical files are good company moves right off the bat.&nbsp; The tighter and more secure the defense is up front, the easier it is and more benefits on the back end.&nbsp; Frist of all, strong cybersecurity practices will improve the company\u2019s brand and the ability for growth or new partners\/clients. It is believed many corporate leaders think a strong cybersecurity program will increase a company\u2019s speed and profitability to market.&nbsp;<\/p>\n\n\n\n<p>The tools in place with an organization are essential, but it is even more crucial for information to be secured and the ways of which it is managed.&nbsp; Rather focusing on only one risk and ensuring everything is one hundred percent for it, companies would benefit more so planning for an all-inclusive, all hands approach for cybersecurity plans.&nbsp; Knowing what risks such business is dealing with can help effectively plan for what is necessary.&nbsp; For example, the top security threats typically are malware, phasing, ransomware, files less attacks and human errors.&nbsp; Breaking down possible cost hits are usually pretty intense and extravagant.&nbsp; The average cost to malware breaches or issues sits around 2.4 million dollars according to research done by Accenture.&nbsp; Typically, it could take nearly fifty days for a business to identify, address, patch, and repair affected systems.&nbsp; Phishing a <em>single<\/em> lost or stolen account can cost nearly 200 dollars or more.&nbsp; This does not even account for the possible thousands or more stolen records.&nbsp; There is a solid chance that if one record\/account has been stolen, the person on the other end did not stop there and took even more.&nbsp; Ransomware can be extremely destructive between the events occurring, system downtime, lost or damaged data, patching systems, and training personnel in the end on handling and spotting it sooner. &nbsp;Such ransomware attacks to business could cost upwards of 11.5 million dollars.&nbsp; Fileless attacks could cost nearly 5 million if they are fully contained.&nbsp; Human error accounts for nearly twenty seven percent of data breaches and could cost almost 150 dollars per compromised data record, which can take a substantial amount of time to recover and reconcile.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Developing a solid cyber risk culture and technical files are good company moves right off the bat.&nbsp; The tighter and more secure the defense is up front, the easier it is and more benefits on the back end.&nbsp; Frist of all, strong cybersecurity practices will improve the company\u2019s brand and the ability for growth or &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/moralesrebekah\/2021\/04\/26\/j4-what-are-the-cost-benefits-to-cybersecurity-programs-in-business\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">J7: What are the cost\/benefits to cybersecurity programs in business?<\/span><\/a><\/p>\n","protected":false},"author":19836,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts\/219"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/users\/19836"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/comments?post=219"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts\/219\/revisions"}],"predecessor-version":[{"id":221,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts\/219\/revisions\/221"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/media?parent=219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/categories?post=219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/tags?post=219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}