• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  Impact of Major Cyber-attacks Across the Globe
Cyber-attack impact
03 June 2017

Impact of Major Cyber-attacks Across the Globe

Written by Seqrite
Seqrite
Security
Estimated reading time: 3 minutes

Cyber-attacks have become a lucrative money-making business for criminals, inviting smarter, more sophisticated hackers to launch advanced and complex attacks on organizations. Modern times demand that almost all of companies’ information, be it financial, process-related, customer or intellectual property, stored digitally on their network and be accessible from various locations. This makes the security of this data, vulnerable. In certain cases, all this information is stored on a cloud which is outside organization’s firewall thereby adding higher risk to crucial data.

With advancements in cyber-attacks, the associated costs, which include direct losses and cost of recuperating from an attack, have also grown exponentially. To gauge the scale of losses let us look at some of the recent attacks and their impact on the organizations.

  • Titan Rain: The attack on U.S military networks including those of NASA and Lockheed Martin, led to the theft of classified data and weapons research data. While it’s hard to quantify the effect, but the impact of this theft on national security is huge.
  • TJ Maxx: TJ Maxx, a retailing company was a victim of a cyber-attack in 2006. The cyber criminals breached the network and stole 45 million credit and debit card information. The total damages were to the tune of 250 million dollars.
  • Heartland Payment System: In 2008, this company’s payment network was injected with a spyware and millions of credit and debit card details were stolen. This attack cost the company about 140 million dollars in damages.
  • Bangladesh Bank Hacks: In February 2016, a bank officer’s computer was used to siphon off 81 million dollars of Bank’s money. The interesting thing here was that it was a single computer inside the bank’s network that was hacked to siphon off the money.
  • Ashley Madison: In 2015, Ashley Madison, a dating website, was hacked and data of millions of users from many countries was stolen. The company faced a 560 million USD class action lawsuit from its users. But the real cost in terms of lost credibility and humiliation of its users (and two unconfirmed suicides linked to this hack) cannot be measured in dollars.
  • Talk Talk Hack: In 2015, the British telecommunications company Talk Talk lost more than 100,000 customers and 60 million British Pounds (About 90 million USD at that time) as a result of this hack. This ransomware attack is still fresh and businesses are still recouping and assessing its impact. It was one of the largest global cyber-attacks, affecting more than 150 countries simultaneously. The total cost of this attack is estimated to reach 4 billion USD.

A few years ago, Wall Street reported that the total cost of cyber crimes in the US alone was over 100 billion USD. In 2015, A British insurance company Lloyd’s estimated that the cost of cyber attacks to business was nearly 400 billion USD. The cyber crimes are increasing at such a staggering pace that Juniper Research estimates that by 2019, cyber crimes would cost businesses more than 2 Trillion USD.

It is observed that even big companies with huge IT and security budgets are not safe from cyber attacks. Cyber security is not just a matter of installing firewalls and antivirus anymore. Every every endpoint in the organization, be it an open network port or a computer and a USB drive on a laptop that can be used to access data needs to be secured and protected. Full access to the data must be limited to the authorized users only. The data can be transferred (via email, or FTP or any other mode of transfer) only if the user is authorized to transfer and that too by using a particular mode.

The software designed to provide this level of data protection (the data loss prevention software) above and beyond firewalls and antivirus is required whether businesses are large or small. Data Loss Prevention solutions not only protect the critical data from an  external breach, but also from internal misuse and accidental loss. Investment in advanced cyber security solutions such as those offered by Seqrite can go a long way in creating a secured working environment for your enterprise.

Experience the best-in-class solutions offered by Seqrite

seqrite_cta1

 Previous PostSecurity Challenges and Solutions to Ensure Cyber Security in Fin...
Next Post  Need for Data Loss Prevention in Healthcare Industry
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Is your Router exposed to cyber threats

    Is your router exposed to cyber threats? Here is how to safeguard it.

    July 30, 2020
  • Snake ransomware stings to spread its venom in the veins of enterprise networks.

    Snake Ransomware brings impending doom to enterprise networks

    July 10, 2020
  • APT harbingers are using Honey Traps to attack Indian Defence.

    Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

    July 8, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.