Antivirus would have saved these businesses $71 billion in 2019
Several businesses ranging from tech to healthcare could save about $71 billion in 2019.
Data gathered and calculated by Precisecurity.com shows that Adobe, Facebook, First American Corporation, Health Sciences Authority, Ministry of Health (Singapore), and Quest Diagnostics could have saved the amount if they had proper antivirus solutions in place.
28% of data breaches involve malware, according to Verizon.
Precisesecurity.com argues that with a good antivirus solution some businesses could avoid data leaks, considering it would immunise computers against unauthorised code or software.
Antivirus also protects computer systems by detecting real-time threats to ensure the data is safe.
Malware usually affects computer systems in various ways, including self-replication to overloading the system, creating a backdoor for hackers, or file encryption.
Using a proper antivirus could help protect systems against these malware attacks.
In total, all records leaked due to poor security were worth $256 billion, since each record leak in 2019 was worth around $150, according to IBM Security.
From the data, 28% of the breaches include malware, meaning about $71 billion could be saved if an effective antivirus solution was in place.
Over the years, each exposed record has had different financial consequences on businesses. For example in 2014, each exposed record accounted for a $145 loss.
In 2015, there was a rise in the cost per record at $154. Over the last five years, the highest figure was recorded in 2016 at $158 while 2017 saw a sharp decline to $141.
In 2018 and 2019 each exposed record was worth $148 and $150 respectively.
The poor security led to the exposure of 1.7 billion records in 2019.
Adobe had 7,500 records exposed. In this incident, anyone with a web browser could access the leaked information which included email addresses, account creation date, Adobe products used among others.
Facebook suffered two breaches in 2019 due to poor security totalling in 807 million leaked records, including names, phone numbers, and Facebook user IDs.
First American Corporation saw 885 million records exposed. The firm lost data on bank account details, social security numbers, wire transactions, and other mortgage paperwork.
Health Sciences Authority (Singapore) saw 808,000 records exposed to unauthorised personnel. The breach, which was linked to a vendor, affected blood donors records stored by the entity.
Singapore’s Ministry of Health witnessed the exposure of 14,200 involving the country’s human immunodeficiency virus (HIV) registry.
And clinical laboratory service provider Quest Diagnostics had about 11.9 million records exposed. The exposure occurred when an unauthorised user had access to personal information through a third-party billing collections vendor.
To compare, even by using $15 as the worth per each exposed record, the damage for business would still be at about $7.1 billion in 2019.
source securitybrief
Industry: Cyber Security
Latest Jobs
-
- Security Analyst - Internal role. London commutable. Permanent
- London
- N/A
-
Security Analyst - Internal role. London commutable opportunity. Operational Security - Investigate, escalate and proactively work to ensure household name remains protected. Project Security - Coordinate, log change requests with project delivery teams to meet security requirements Policy / compliance - work with team to aid in uplifting these as and where needed This role is role to investigate, escalate and proactively work to protect a globally recognised brand. You must have current hands on operational analytical security experience with Microsoft technology stack Someone with a SOC Analyst / security engineering background would be well suited. This position will join a small team and would suit someone that has broad experience across the security threat landscape. Experience / knowledge across industry GRC standards such NIST, ISO27001 etc very advantageous and a priority. You will work across multiple teams proactively working to secure the business. Must be able to commute to Central London 3 days a week. Visa sponsorship not available Apply today to find out more.
-
- Network / Security Infrastructure Engineer | West London | Permanent
- London
- N/A
-
Network / Security Infrastructure Engineer | West London | Current Config, Install, upgrade experience On prem / Datacetner experience essential. Hands on experience MUST include: Routing, Switching, Network Security (firewall, IDS etc), Microsoft exchange / Exchange 365. Scripting / automation experience wanted. Python, Powershell etc Regular travel to West London is required. Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- SailPoint File Access Manager Consultant/ Architect
- N/A
- discussed on applications
-
SailPoint File Access Manager (SailPoint FAM) Consultant/ Architect is required for an up coming projects, Ideally looking for someone with experience in Designing and deploying SailPoint FAM , this is a new Deployment, you will work with customer in the initial workshop phase, to understand requirements and to get the initial design, you will then be responsible for deploying the solution. This is a home based role, with some onsite visits required during the length of the project. We are looking for someone who has previous experience in Deploying SailPoint FAM (ideally done design work) Need to have experience with SharePoint and ideally Azure and Share file
-
- DV Cleared CyberArk Consultant- Contract
- City of London
- Upto £700 per day
-
CyberArk Consultant is needed to be responsible for leading the deployment of CyberArk solutions for this Secure government site You will work with customer, helping to create CyberArk Strategic Roadmaps, on-boarding accounts, product and process integration into the CyberArk Solution and Proviso of Installation and technical Documentation. We are looking for this individual to have experience in: In CyberArk deployment, and ideally leady the deployment both strategically and also technically for this project we need the consultant to hold current DV cleared status For the right individual this could be a long term project.