• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Antivirus For Linux • Ransomware • Security  /  A single infected computer can cost your business millions of dollars, know how to save
A single infected computer can cost your business millions of dollars, know how to save
11 July 2017

A single infected computer can cost your business millions of dollars, know how to save

Written by Seqrite
Seqrite
Antivirus For Linux, Ransomware, Security

It was August 5th, 2012, when a massive cyber-attack crippled operations of one of the world’s leading petroleum and natural gas company, Saudi Aramco. A Virus named ‘Shamoon’ wiped out data from 35,000 computers bringing most of their operations to a halt. What led to this catastrophic attack was the opening of one wrong email by one of the technicians that’s it! And the company suffered losses of such high magnitude that took them really long to recover. This is just one example of how a single infected computer can cost millions of dollars to your business.

A simple virus attack can wipe out data from the computer, shut it down or send the confidential data outside the organization. It can harm the company in more than one ways. Computer viruses, in the form of the worms, are designed to jump to every machine connected to the infected computer and corrupt an entire network. A virus that hides inside a file infects every computer that opens the file and can be transferred via emails, FTP, P2P software and Instant Messaging software. Due to their capability of self-propagation, viruses can spread wide and fast across the organization if not stopped or corrected on time and every virus attack comes with huge direct and indirect cost.

Cost of Virus infection

Ponemon Institute conducted a study and came up with following costs related to the virus attacks. “Virus,” “worms,” and “Trojan” attacks average $2,054 in direct costs and take 2.5 days to resolve. “Malware” attacks average $1,090 and take 2.2 days to fix. “Botnet” attacks average $1,627 in direct costs and take 1.9 days to resolve. These costs are average for just a virus attack on a mid-sized organization. They don’t include the cost of other forms of cyber attacks.
For reference, here are some figures for the overall damages to the economy caused by some well-known virus.

  • MyDoom: It spread through emails and caused over $38 billion in damages.
  • SoBig: This virus propagated by itself using emails and caused over $37 billion in damages.
  • ILOVEYOU: This virus for the pioneer as it attached itself to the emails and self-propagate. It caused damages of $5 billion over one week alone.

There are numerous other examples that depict the severity of damage caused by viruses. However, this is only half the picture. The damage is not just financial, it also includes:

  • Loss of confidential data
  • Loss of employee productivity
  • Loss of reputation leading to a drop in revenue
  • Losses due to potential litigation and damages

Thus, it is obvious that it’s hard to calculate the actual cost of a virus attack as it takes years to recover from its devastating effects.

Sources of Virus

Organizations fail to realize that there are numerous sources of virus and simply isolating the network from the internet is not enough. That is just one point through which virus can transmit. Some of the well known advanced sources of virus infection today are:

  • Unsecured Public Wi-Fi
  • Shared USB drives
  • Mobile devices connected via Bluetooth
  • Emails attachments (MS office documents, images etc)
  • Instant Messengers
  • P2P sharing software
  • Malicious or infected websites

Many times a computer such as a laptop is taken out of the secure network by an employee. The employee then connects to the internet using an unsecured connection. The laptop now gets infected with a virus and the employee gets it back and connects to the organization’s network. The Virus now has a chance to spread to all the computers attached to the organization’s network. This is true for external devices such as USB drives, CDs, DVDs (typically pirated copies) and other pirated software that is installed or copied onto the computer. Thus employees inadvertently end up infecting the whole organization and puts it at risk. This careless and rogue behavior makes employees a risk to the company security.

Protecting your organization against cyber attacks and avoiding them from spreading

Protecting the organization’s assets against a cyber attack, including viruses requires a coordinated effort and dedicated resources. With a bit of planning and right tools, an organization can avoid immense losses that may occur due to cyber attacks. Choose a simple yet powerful platform to manage your enterprise’s security and enforce control over data with features such as:

  • Advanced Device Control: Enforce policies regarding use of storage devices, mobile and portable devices, wireless devices, network interfaces.
  • Data Loss Prevention: Prevents data loss by monitoring confidential and user defined data shared by removable drives, network or various applications.
  • Asset Management: Total visibility of changes happening on hardware and software running on endpoints.
  • Application Control: Enforce control over use of unauthorized applications within the network.
  • Anti Ransomware: Protection from ransomware attacks and automatic back-up of files.

Seqrite offers security solutions like Seqrite Endpoint security (EPS) which provides a simple and comprehensive platform to take care of all your security needs. It integrates innovative technologies like Anti ransomware, Advanced DNA scan, and Behavioral detection system to protect your enterprise from advanced cyber threats.  Its easy scalability and effortless management and administration, reduces strain on company’s resources thereby making it a luring option for enterprises.

Seqrite helps businesses simplify IT security and maximize business performance. To know more about our products and services visit our website or 

seqrite_cta1

 

 Previous PostTop 5 security threats for retailers in digital age
Next Post  How Seqrite Endpoint security solution can help you in setting up...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

    March 11, 2025
  • How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

    March 11, 2025
  • Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks

    January 31, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies