Security Breach Effects

Improved Essays
Effects of Security Breaches

Breaches come in many shapes and sizes, from rather harmless website defacements perpetrated by hacktivist groups or bored, gifted youngsters, to data being accidentally exposed, to data being stolen by professional crackers and later traded in the black market or used to blackmail the company (Krausz, Michael, and John Walker). Not all security breaches are of the same scale, and, naturally, not all breaches affect a company the same way. These security breaches result in a pronounced effect on a company’s bottom line, stock, and reputation

It may be quite obvious that the bottom line of a company’s checkbook is often directly affected by a security breach. Target suffered a large security breach in 2014 that
…show more content…
In 2009 Heartland Systems, a payment processor for Visa, lost approximately ten million credit card records, and within a week their stocks fell by about 70 percent (Krausz, en al.). A loss of 70 percent in stocks is quite pronounced even for a large company. Furthermore, a 70 percent loss has a far more pronounced effect on the individuals who owned those stocks prior to the security breach. For an investor that owned stock prior to a security breach it would be an abysmal feeling to learn that nearly three quarters of an investment, potentially their only investment, was utterly lost in the blink of an eye. Also, the price of stocks effects other investments such as mutual funds which are frequently used to build a person’s wealth, or retirement savings. The effect of security breach on a company’s stock will inevitably hurt investors just as surely as it will hurt the company as a …show more content…
According to Morse, an annual average of 9% in online sales are lost because consumers don’t feel the internet is safe enough. That 9% of lost sales equates out to about 21 billion dollars. Consumers do not want to put their money in harm’s way, and security breaches make potential markets appear dangerous. For example, a February 2015 Reuters’ article noted that after Target’s data breach in 2014 their high quality shopping experience was tarnished since customers had to replace their check cards. Also, getting a replacement card is not typically known as a fast or easy process, and it is a major inconvenience in today’s world where plastic is more common than paper as method of payment. Additionally, it is unlikely that a customer is going to continue shopping at a company that appears to have a reputation of poor security practices.

Without doubt, a security breach will result in a negative impact to any company that suffers from one. The loss in monetary value will vary depending on the scope of the attack, but for large companies the loss easily reaches tens of millions of dollars. An already fickle environment, a company’s stocks will be directly impacted by a security breach. Also, the most human effect a company will endure after a security breach is the loss or damage to their reputation. It does not matter if a security breach is from bored kids, hacktivist, or hardened crackers

Related Documents

  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The first being the security of personally identifiable information. Now in this instance the company itself is not fully responsible for this release but they are indirectly responsible. The hackers are directly responsible for the dissemination of the users personal data but the company could have avoided this incident by shutting down but chose not to which directly constitutes a breach of privacy and security proposed by the company to protect the users information. The next issue is the release of users information that paid the company the fee of $19 to delete their information. The company decided not to delete the users information for some reason from their servers.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    The Equifax disaster points to a much bigger problem. -Rhetorical Analysis This is a rhetorical analysis of the article “The Equifax disaster points to a much bigger problem” written by Herbert Lin. Let us start with the writer himself; he is a senior research scholar for cyber policy and security at the Center for International Security and Cooperation (CISAC) and Hank J. Holland fellow in Cyber policy and Security at the Hoover Institution both of which are located at Stanford University.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Data breaches caused by illegal hacking at Target were in themselves tragedies and worrisome events; not only for the company, but for the customers in general who shop at the store locations nation-wide. However, considering various steps taken by Target upon realization of the breaches, it is hard to defend or picture exact wrongful doings or violation of laws by Target. Let’s keep in mind that electronic data and information breaches are hard to prevent; this is mostly due to interconnectivities of globally devices. As such, laws do not persecute companies for hackers breaking into their networks; instead, there are laws binding companies to put required secure methods and practices in place to mitigate hacking or data thefts; also, once a breach is noticed, laws require that such incident be reported immediately and those affected be notified. Here's what happened after; "Target alerted authorities and financial institutions immediately after we discovered and confirmed the unauthorized access, and we are putting our full resources behind these efforts.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    9/11: A Case Study

    • 2106 Words
    • 9 Pages

    significant amount of people were too scared to even go on a vacation somewhere out of fear that if they went to a heavily populated city that they may become some of the next victims of terrorist attacks. Following the tragedy of 9/11, some pilots felt, “compelled to carry a weapon at work as a way to regain power, prestige, and a sense of security and control” because they were having difficulty reconciling, “fear, guilt, anxiety, and overwhelming sense of responsibility for elements outside of their control” (Fraher 2014). This provides another example of how the fear caused by 9/11 had deep and reaching effects on both the nation and its economy. Although it was largely an indirect effect caused by the hit to transportation industries, such as airlines, freight trains, etc., the shipping industry also suffered as a direct result of 9/11.…

    • 2106 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    Target Security Breach

    • 181 Words
    • 1 Pages

    From a managerial perspective, there were many errors made in handling the December 2013 Target security breach. The first questionable decision for review deals with the effects of poor communication. Chief Executive Gregg Steinhafel hesitates to publicly communicate the breach to consumers (Kinicki & Williams, 2013). The primary law of business is “being responsive to customers” (Kinicki & Williams, 2013, p.12). Furthermore, when the details were communicated, CEO Steinhafel inflated the amount of affected shoppers (Kinicki & Williams, 2013).…

    • 181 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    A lot of big companies like Yahoo!, the New York Times, Target, JP Morgan and Staples have all been the victims of cyber attacks. You might be thinking that it could never happen to a smaller organization, but a lot of smaller organizations have less security than what these mega corporations have. Every business, it does not matter the size, can be vulnerable to DNS hacking. While a lot of smaller companies do not get targeted because they fly under the radar, there is a belief that cyber criminals will target anything with a DNS vulnerability as technology advances. How can you stay safe?…

    • 396 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    It is important to know and identify when and how the breach occurred in order to accurately determine who was affected in the breach. Once the breach has been validated, the company needs to assign a manager who will handle the incident and have a response team ready in order to mitigate the problem. This team should handle all actions such as legal, IT, finance, risk management, and even media relations (Privacy Technical Assistance Center, 2012). If the authorities or law enforcement needs to be involved in the breach, then the team will determine whether they need to be contacted for further investigation. Once all the necessary information has been recovered, it is to determine whether the parties involved should be notified and what needs to be done in order to accommodate the persons involved, such as free credit report for a year.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 740 Words
    • 3 Pages

    Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It 1. Who are the stakeholders in the Target breach? The main stakeholders are their shareholders, the clients that had their personal information stolen, and individuals with an ongoing connection with Target organization whose personal information was or might have been compromised. Stakeholders who are affected or worried that they might be harmed start to mistrust the firm and its complacent-sounding promises.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    1 Our Understanding Telos Corporation (Telos) protects some of our country’s most security-conscious agencies and has established an excellent reputation. However, the company is not well known outside of government circles. Telos security solutions can benefit businesses as well as government agencies. As you know, cyber security breaches have had a profound impact on commerce and infrastructure.…

    • 1140 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    So, what are the main security threats affecting SMEs and what defences could be put in place to eliminate or minimise these threats? First we need to ask if there is a problem regarding security against SMEs and if so how large is this problem? Looking at the BIS ISBS 2015 we can clearly see a worrying increase in breaches when compared to the slight decrease that was reported in the surveys report of 2014.…

    • 1910 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Brain Drain In Lebanon

    • 889 Words
    • 4 Pages

    It is shocking news to hear when famous banks, financial institutes and large organizations are shutting down their businesses due to an unexpected system crash, security or virus…

    • 889 Words
    • 4 Pages
    Improved Essays