www.pwc.co.uk Information Security Breaches Survey 2013



Similar documents
2013 INFORMATION SECURITY BREACHES SURVEY. Technical Report. Survey conducted by. In association with

ISO/IEC 27001:2013 Launch Event

Commissioned by: Conducted by: In association with:

2015 INFORMATION SECURITY BREACHES SURVEY

Access Governance. Delivering value. What you gain. Putting a project back on track for success

Mitigating and managing cyber risk: ten issues to consider

Small businesses: What you need to know about cyber security

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

DBC 999 Incident Reporting Procedure

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Small businesses: What you need to know about cyber security

Cyber and Data Security. Proposal form

Cybercrime: risks, penalties and prevention

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

DeltaV System Cyber-Security

California State University, Chico. Information Security Incident Management Plan

Cybersecurity and internal audit. August 15, 2014

10 Smart Ideas for. Keeping Data Safe. From Hackers

Vulnerability Assessment & Compliance

2015 INFORMATION SECURITY BREACHES SURVEY

Service Children s Education

Cyber Essentials Scheme

Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery

How To Cover A Data Breach In The European Market

Business Case. for an. Information Security Awareness Program

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

Managing Security Risks in Modern IT Networks

MAXIMUM PROTECTION, MINIMUM DOWNTIME

2012 NCSA / Symantec. National Small Business Study

External Supplier Control Requirements

A number of factors contribute to the diminished regard for security:

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Service Schedule for Business Lite powered by Microsoft Office 365

Cyber Risks and Insurance Solutions Malaysia, November 2013

The Four-Step Guide to Understanding Cyber Risk

Identifying Cyber Risks and How they Impact Your Business

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Defensible Strategy To. Cyber Incident Response

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Policy Title: HIPAA Security Awareness and Training

Global Corporate IT Security Risks: 2013

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

How To Understand The Bring Your Own Device To School Policy At A School

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Service Schedule for BT Business Lite Web Hosting and Business Lite powered by Microsoft Office 365

A HELPING HAND TO PROTECT YOUR REPUTATION

PEER-TO-PEER NETWORK

Ensuring your DR plan does not Lead to a Disaster

Information Security and Risk Management

WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers. by Dan Sullivan. Think Faster. Visit us at Condusiv.

Security Basics: A Whitepaper

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

93% of large organisations and 76% of small businesses

The Cyber Threat Profiler

PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THIS SITE

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Computer Security: Principles and Practice

Third Party Security Requirements Policy

28400 POLICY IT SECURITY MANAGEMENT

Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper

Incident Response Plan for PCI-DSS Compliance

Guideline on Vulnerability and Patch Management

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Data Management Policies. Sage ERP Online

Data Security Incident Response Plan. [Insert Organization Name]

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification

CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard

Minimizing Computer Data Loss Risks With Online Backup. Seven Devastating but Common Computer Backup Mistakes

Information Security

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Transcription:

www.pwc.co.uk Information Security Breaches Survey 2013

Agenda and contents About the survey Security breaches increase External versus insider threats Understanding and communicating risks Implementation Key messages Questions Chris Potter Information Security Partner Andrew Miller Information Security Director Full survey report is available from: Department for Business, Innovation and Skills - www.gov.uk/bis PricewaterhouseCoopers LLP - www.pwc.co.uk/informationsecurity Infosecurity Europe www.infosec.co.uk Slide 2

About the survey Security breaches increase External versus insider threats Understanding and communicating risks Implementation Key messages Questions

What is the source of the survey data? Slide 4 (Based on 1,365 responses)

Which industry sectors are covered? Slide 5 (Based on 1,402 responses)

Thank you to all the organisations who supported this survey Slide 6

About the survey Security breaches increase External versus insider threats Understanding and communicating risks Implementation Key messages Questions

Security breaches reach highest ever levels Trend since 2012 % of respondents that had a breach Average number of breaches in the year Cost of worst breach of the year Overall cost of security breaches Large organisations (more than 250 staff) Small businesses (less than 50 staff) Slide 8

Breaches and risks have never been higher 113 17 450k- 850k 35k-65k Billions Median number of breaches suffered by a large organisation in the last year (71 a year ago) Median number of breaches suffered by a small business in the last year (11 a year ago) Average cost to a large organisation of its worst security breach of the year Average cost to a small business of its worst security breach of the year Estimated total cost to UK plc Three times more than 2012 Slide 9

Breakdown of breaches - Median number suffered last year 93% large organisations had a security breach last year 87% small businesses had a security breach last year (76% a year ago) (Based on 686 responses) (Equivalent comparative statistics from ISBS 2012 shown in brackets) Slide 10

Variations in type of breach witnessed last year Failure to patch systems at a large bank led to an infection by the Poison Ivy backdoor. There was an effective contingency plan in place, but it still took several man-months of effort to eliminate the infection from systems. After the breach, procedures, (in particular for rolling out operating system patches) were improved. Slide 11 (Based on 686 responses) A software bug at a large educational body in the Midlands led to hundreds of Students personal data being mistakenly handed out to other students. Several days of complaints and follow up ensued.

Impacts of breaches Business disruption and financial loss Slide 12

Impact of breaches duration of disruption Slide 13

Prevention is key as figures set to rise Respondents expect to see increases in incidents next year Slide 14 (Based on 145 responses)

About the survey Security breaches increase External versus insider threats Understanding and communicating risks Implementation Key messages Questions

External Threats lack of boundaries Multiple systems at a large outsource services provider became infected by a virus which spread by manipulating networking packets and then began reporting to command and control servers based in Eastern Europe and China. Fortunately, routine internal security monitoring identified this within a few hours. However, it caused serious disruption for a few weeks, as well as taking several manweeks of effort to eliminate from the network. The value of any data lost is unknown. Following the breach, the company deployed new systems as well as changing the configuration of their existing systems. Slide 16

Outsider attacks Slide 17

Small businesses become an increasing target for internal and external threats 63% Of small businesses were attacked by an unauthorised outsider in the last year (41% a year ago) 23% Of small businesses were hit by denial-of-service attacks in the last year (15% a year go) 15% Of small businesses detected that outsiders has successfully penetrated their network in the last year (7% a year ago) 9% Of small businesses know that outsiders have stolen their intellectual property or confidential data in the last year Slide 18

Internal and external threats remain a concern in large organisations 78% Of large organisations were attacked by an unauthorised outsider in the last year (71% previous year) 39% Of large organisations were hit by denial of service attacks in the last year (30% previous year) 20% Of large organisations detected that outsiders had successfully penetrated their network in the last year (15% previous year) 14% Of large organisations know that outsiders have stolen their intellectual property confidential data in the last year (12% previous year) Slide 19

Infection by viruses and malicious software Virus infection rate stabilised; but many businesses still catching themselves out. Many have left themselves vulnerable by not applying patches An unpatched system at a large agricultural business in the South-East became infected by the Conficker worm. Routine security monitoring picked it up immediately and an effective contingency plan kicked in. As a result, the business disruption was minor and dealt with within a day. (Based on 656 responses) Slide 20

Internal risks are on the increase (Based on 551 responses) A disgruntled employee at a large utility company stole some sensitive information which he had access to as part of his job and began selling this. The breach was discovered by accident, over a month after it started. The value of the lost data was several thousand pounds, but the impact on the business of the investigation and aftermath was even greater. The lack of contingency plan contributed to this cost. After the breach, the company deployed new systems, changed its procedures and introduced a formalised postincident review process. Slide 21

Staff related incidents increase significantly in the last year Staff related breaches remains relatively high levels with particular increases in small businesses reporting staff misuse of the Internet or email. The average affected company had about one breach a month A member of staff at a small security consultancy firm accidentally replied to all recipients of an email with an inappropriate response. This small mistake resulted in several thousand pounds of lost business, and consumed several days of management time dealing with the complaints from customers. The employee was disciplined and additional staff training was implemented. (Based on 528 responses) Slide 22

System failure and data corruption 66% large organisations and 60% of small ones suffered from system failure or data corruption during the year. A system change at a large bank based in central London went wrong, leading to a failure in the main payment system. This made it impossible to check payment information properly, which resulted in some erroneous payments being made. (Based on 662 responses) Lack of staff awareness, poorly designed configuration and process failures combined to allow an employee at a medium sized technology company to delete important data from a critical system. It took nearly a month to restore the system, after more than a man-week of effort. Afterwards, the company changed its procedures, the configuration of its live systems and its backup and contingency Slide 23 plans.

About the survey Security breaches increase External versus insider threats Understanding and communicating risks Implementation Key messages Questions

Priority given to security by senior management (Based on 1,204 responses) 25

Security expenditure by sector 10% is the average spent on security up from 8% a year ago. 16% is the average spent on security where security is a very high priority. Up from 11% a year ago (Based on 845 responses) 26

Translation into effective security defences. 93% of companies where security policy was poorly understood had staff related breaches (versus 47% where policy was well understood) 42% of large organisations don t provide any ongoing security awareness training to their staff (10% don't even brief staff on induction) 26% 33% 32% of respondents haven t briefed their board on security risks in the last year (19% never done so) of large organisations say responsibilities for ensuring data is protected aren't clear (only 22% say they are very clear) of companies don t evaluate the effectiveness of their security expenditure at all. 27

Investment versus overhead Lack of progress in treating security as an investment rather than overhead. 12% of organisations try to calculate return on investment on their security expenditure - worse than 2012 and significantly worse than 2004 (39%) (Based on 164 responses) Slide 28

How many organisations carry out security risk assessment? (Based on 146 responses) 29

Communicating security risks to staff A large technology company suffered when one of their customers decided to carry out an unauthorised destructive penetration test on their systems. This took down systems and led to customer complaints. Fortunately, the breach was identified and resolved immediately. (Based on 159 responses) 30

Actions following worst security breach of the year (Based on 122 responses) Slide 31

About the survey Security breaches increase External versus insider threats Understanding and communicating risks Implementation Key messages Questions

The Ten Steps The Ten Steps Large organisations Small businesses Information risk management Some good, some weak Some good, some weak User education and awareness Some good, some weak Generally weak Home and mobile working Some good, some weak Generally weak Incident management Some good, some weak Generally weak Managing user privileges Some good, some weak Some good, some weak Removable media controls Some good, some weak Generally weak Monitoring Some good, some weak Generally weak Secure configuration Some good, some weak Some good, some weak Malware protection Generally good Some good, some weak Network security Generally weak Generally weak https://www.gov.uk/government/publications/cyber-risk-management-a-board-level-responsibility Slide 33

Proactive versus reactive? 68% had contingency plans in place but plans are not always effective Following Superstorm Sandy, a mid sized technology company primarily based in London was forced to fail over from their primary servers in the USA to their backup server in the UK. Although the failover procedure was successful, a later power outage on either secondary site led to their clientfacing systems being inaccessible. It took around several man- weeks of effort over a 24 hour period to restore service. (Based on 99 responses) Slide 34

Smartphones and tablets pose as an increasing threat 9% of large organisations had a security or data breach in the last year involving smartphones or tablets An associate of a large consultancy bought tablet computers and used them with a client without checking with the IT department. To make this work, he used Dropbox to store client confidential data, without getting security clearance from either the consultancy or the client. (Based on 167 responses) Slide 35

Obtaining reassurance over external providers e.g. Cloud 4% of respondents had a security or data breach related to one of their cloud computing services. (Based on 172 responses) 36

Preventing misuse of the web and social networking 14% of large organisations had a security or data breach in the last year relating to social networking sites. (Based on 163 responses) 37

About the survey Security breaches increase External versus insider threats Understanding and communicating risks Implementation Key messages Questions

Key messages in 2013 Small business are now getting targeted Need to measure ROI on security investment Get the basics in place (Ten Steps) Educating staff can halve insider breaches Mobile, social media and the cloud 39

Any questions? This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PricewaterhouseCoopers LLP, its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it. 2012 PricewaterhouseCoopers LLP. All rights reserved. In this document, refers to PricewaterhouseCoopers LLP (a limited liability partnership in the United Kingdom) which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity.