Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

IT Attacks Cost Companies $200K a Year

May 23, 2012

The result of not bulking up information security efforts could cost companies more than $200,000, a study reveals.

Independently conducted by the Ponemon Institute, the "Impact of Cybercrime on Businesses" survey states that targeted attacks cost enterprises an average of $214,000. The expenses are associated with a forensic investigation, investments in technology and brand recovery costs.

The report polled 2,618 C-level executive and IT security personnel from the United States, United Kingdom, Germany, Hong Kong and Brazil. Its purpose was to identify commonalities among the countries.

The report noted that:

  • The level of risk for cybercrime varies among countries. DoS attacks are considered to pose the

greatest risk to organizations. Respondents in the U.S., UK and Hong Kong report they are most

worried about denial of service attacks and in Brazil respondents are concerned about viruses, worms

and trojans. Social engineering is the greatest concern in Germany.

  • An average of 43 percent of respondents report SQL injections as the most serious attacks their

organizations experienced in the past two years. More than one-third of organizations represented in

this research experienced APTs (35 percent), botnets (33 percent) and DoS attacks (32 percent).

  • Organizations face an average of 66 cyber attacks weekly that cause business disruptions.

Organizations in Germany and the U.S. experience the highest average rate of weekly attacks, 82

and 79 respectively. Brazil and Hong Kong have the lowest frequency, on average 47 and 54 per

week respectively. On average, respondents believe 17 percent of machines and mobile devices

within their organizations have been infected by an act of cybercrime.

  • Respondents in all countries reported the most serious consequences are business disruption and

loss of sensitive information, including intellectual property and trade secrets. Of least concern as a

consequence of cybercrime, with the exception of respondents in the UK, are diminished reputation

and brand name followed by equipment damages

  • The hacker’s motivation. While respondents may have different perceptions about which cyber risks

are most detrimental to their businesses, they all agree that the primary goal for cybercriminals is

financial fraud and/or access to the company’s financial records. In the U.S. and UK, financial gain is

followed by theft of customer data. Approximately five percent of security attacks are motivated by

political or ideological agendas.

  • Cybercrime continues to be costly for businesses worldwide. In the aftermath of one cybercrime

attack, the cost to investigate, recover brand and reputation and invest in technologies ranges from

an average high of $298,359 (U.S. $ dollars) for German organizations to an average low of $106,904

(U.S. $ dollars) for Brazilian organizations.

  • Too little is done in many countries to prevent cybercrime. While the majority of companies have

the important security building blocks, such as firewalls and IPS, needed for their security

infrastructure, less than half of organizations in this study have advanced protections to fight botnets

and APTs. The majority of organizations in the U.S. and Germany are deploying solutions and training that are

more specific to addressing cyber risk such as anti-bot, application controls and security intelligence

systems. Whereas, other countries represented in this study are lagging behind in their cyber security

readiness.

 

The full report is at: http://www.checkpoint.com/products/downloads/whitepapers/ponemon-cybercrime-2012.pdf

KEYWORDS: cybercrime IT security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • More Than Half of Mid-Sized Companies Have Seen Increased Hacker Attacks Since Last Year

    See More
  • security-vulnerability-freepik

    76% of companies impacted by it vulnerabilities in the last year

    See More
  • Lower Cost Do-it-yourself Cybercrime Kits Spur More Phishing Attacks

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • Optimizing Social Media from a B2B Perspective

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing