ITO America Business Technology Publication
 
              
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
BSM & ITILv3
BI
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
 Podcasts
Videos
Webinars
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
ROI Analysis

Business Technology Whitepapers and Articles
Business Technology Article
PDF Document Download

Document:

Counting the Cost of Cyber Crime



You must be a logged in to view this document.

Click here if you've lost or would like to change your password?
Register on ITO America Business Technology website

Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology!


E-mail:
Password:
Verify Password:
Password must be 7-15 characters in length.
Articles in Business Technology
Excerpt:

It has been a busy month in cyberspace. TJX, the massive worldwide fashion retailer, is finally releasing some of the gory details of the recent hack which saw over 45 million credit and debit card details stolen from their databases.

The entire fiasco has cost the company an estimated $17 million to date.

Estimating the cost of an intrusion has never been easy. It is something that IT managers grapple with regularly, particularly when fighting for budgets.At a basic level, the most obvious cost component associated with a security incident of any kind is the cost of human labor that will be inevitably required to investigate the breach, often resulting in lost productivity as well as lost time.

Thankfully, most organizations have a very accurate indication of how much each and every employee's time costs, so putting a monetary figure on this component is straightforward enough.

One of the major challenges of the security community is to develop an effective return on investment calculation that will allow them to justify security expenditures before catastrophic incidents occur.

It is much more difficult to put an accurate and realistic figure on many of the other 'softer' knock-on effects of a security breach.
Loss of reputation is probably the most contentious issue, and the one that the majority of security technology vendors tout as the 'justification' for purchasing their products.

Ultimately, it pays to invest upfront in IT security, be it technology, training, policy initiatives or prevention mechanisms.