Please call us or contact us below with any questions or for a free and no obligation consultation and estimate!
800.264.2808 or 314.872.3322
Microtek
  • Linkedin
  • Facebook
  • Home
  • About Us
  • Services
    • Records Management Consulting
    • Scanning Paper Documents
    • Microfilming and Microfilm Scanning
    • Imaging Systems Conversion
    • Equipment Maintenance
  • Technologies
  • Products
    • Hardware
    • Software
  • Case Studies
  • Partners
  • Blog
  • Contact Us
  • Search

7 Surprising Statistics About Cyber Security

December 31, 2020/in Blog /by Aaron

Cyber security is still a major issue today being faced by organizations of every size, every sector, and every industry.

The following are 7 data security statistics you need to know in order to protect your organization.

1.) “Lost business costs accounted for nearly 40% of the average total cost of the data breach, increasing from $1.42 million in a 2019 study to $1.52 million in a 2020 study.”
– IBM/Ponemon

Data breaches rack up costs quickly, including in some surprising areas.  The top three are below:

•Increased customer turnover – even the most loyal of customers can lose trust and faith in your business when their data is compromised.
•Lost revenue due to system downtime – downtime compromises payments, new customer signup, and prospect discovery.
•Increasing cost of acquiring new business due to diminished reputation – new customers will be wary of giving business to companies who can’t protect their data.

As you can see, the costs associated with cyber security pale in comparison to the costs on your organization when your customers’ data is compromised.  Implementing and utilizing technology with the highest security standards is crucial to the integrity of your data and trust of your customers.

finance-security-before-508098514

2.) “71% of breaches were financially motivated, 25% were motivated by espionage.”
– Verizon

We are all well aware at this point of financially motivated attacks, like ransomware.  When ransomware infects your network, your data is held hostage and released for a fee.  If you do not comply by a certain date, the cost doubles or your data is permanently deleted or locked.  According to McAfee, ransomware attacks grew 118% in 2019.

Espionage, however, might seem like a job for James Bond.  Unfortunately, given the highly competitive and often political climate we are in, cyber espionage doesn’t involve a bullet-dodging adventure in the movies, but instead features hackers getting into your network to obtain economic, political, or military gain by stealing your intellectual property.

3.) “43% of breach victims were small businesses.”
– Verizon

If you think you’re safe from a data breach because you’re not a Fortune 500 company, you’re wrong.  Small organizations are often the perfect target for a data breach, because cyber security may not be a priority on an already strict budget.  However, according to Verizon’s report, cloud services that offer a myriad of web-based tools, along with the rise of social phishing attacks, are leveling the playing field between large enterprises and small organizations.  If you’re not adopting secure cloud technologies and educating your staff on potential threats, you put your business data at risk of a breach.

4.) “34% of data breaches involved internal actors.”
– Verizon

Not all data breaches are caused by external hackers.  Sometimes the bad actors are in your own organization.  Take for example the recent news where a Tesla employee was offered $1 million to facilitate a cyber attack.  Luckily, this employee instead worked with the FBI to catch and prosecute the criminal before any harm was done.  Unfortunately, this isn’t always the case.

It’s important to note that not all data breaches are caused with the intent of harm.  Human error is inevitable, and it sometimes takes simply copying sensitive information to your home computer to become vulnerable.  With remote work becoming the norm, this is especially dangerous as we juggle our personal and business devices in addition to integrating with the Internet of Things (IoT).

5.) “53% of companies found over 1,000 sensitive files open to every employee.  Only 5% of companies’ folders are properly protected on average.”
– Varonis

The amount of data is increasing, and it’s easy for documents to get copied, deleted, and shared beyond control.  When you do not have an efficient and secure information management system in place that restricts and audits users access to documents, you become vulnerable to loss, theft, and overwritten files.  Plus, with the cost of replacing a lost or stolen record at $150 per record, it’s worth it to take a deep look at your file permissions structure.

6.) “The top malicious email attachment types are .doc and .dot, which make up 37%.  The next highest is .exe at 19.5%.”
– Symantec

Email and social phishing attacks are the most common types of data breach for large and small businesses, according to Verizon.  They often trick users into thinking they’re clicking a link or document they recognize from a reputable company, but instead that click opens the doors for malware designed to infect your system and infiltrate your network.  Educating your employees on common phishing tactics and infected document types is a good first step.

7.) “Fully deployed security automation helped companies reduce the lifecycle of a breach by 74 days compared to companies with no security automation deployment, from 234-308 days.”
– IBM/Ponemon

The faster you can contain a data breach, the better for your organization.  Can you imagine the difference 160 days may mean for you and your customers?  If you haven’t already deployed security automation within your business, now is the time.  No one is 100% safe from a potential data emergency, but having a plan in place while relying on secure cloud technologies could potentially save you millions in the long run.

In 2020, data is still very much at risk.  It will also be in 2021.  However, your best line of defense is educating employees, using trustworthy technology for security automation (especially in the cloud like ImageSilo), and having an aggressive strategy for minimizing the damage done when a breach occurs.

At Microtek and Digitech Systems, the security of your information is of paramount importance and we are recognized cyber security experts.  When using our software, you can rest easy knowing that your documents are safely protected behind five levels of security.

We want to show you how Microtek’s over 50 years of experience can help you and your organization focus on information security.

If you have any questions, would like any additional information, or would like a free and no obligation consultation and estimate, please don’t hesitate to call us at 314-872-3322 or 800-264-2808 and ask for Aaron Liess or Mark Sandheinrich, or email us at sales@microtekstl.com.  Thanks!

Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on Google+
  • Share on Pinterest
  • Share on Linkedin
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail

Ready to start working smarter, not harder? Please call us or contact us here with any questions or for a free and no obligation consultation and estimate!

    Full Name*

    Email*

    Phone

    Message:

    Join our free newsletter – get the latest news, advice, special offers, updates, promotions, and insights delivered to your inbox.


    Founded in 1968, and headquartered in St. Louis, Missouri, Microtek specializes in services and systems for records, data, and information management. Microtek is dedicated to maintaining expertise in the most recent information and document imaging technologies through continuing education in the latest products and service techniques. We combine this with over 50 years of hands-on, real world experience. Read More »
    linkedin-iconfacebook-iconbbb-icon
    Copyright © 2021 - Microtek Document Imaging Systems, Inc.
    • Home
    • About Us
    • Services
    • Technologies
    • Products
    • Case Studies
    • Partners
    • Blog
    • Contact Us
    • Privacy Policy
    Are You Prepared For A Cyber Emergency?
    Scroll to top