Security Breach Research Paper

Improved Essays
Did you know that the average cost of a typical data breach is $5.4 million in the United States? A data breach can take a toll on a company of any size and consumers alike, which is why it is so important for both consumers and companies to take necessary precautions to reduce the risk of breaches.

Data security breaches have a compound impact on both consumers and businesses. Once data breaches have been detected consumers must find a way to protect their personal information, and businesses have to find a way to recover along with implementing preventative measures and regaining consumer’s trust.

Consumers shop with companies under the faith that their personal information will be protected. When a security breach occurs, the consumer’s
…show more content…
Odds are that in one’s lifetime a consumer will be a victim of a security breach at some point.

Data breaches are on the rise, and businesses need to ensure that they have sufficient security defenses in place to protect their data. Data breaches can have both direct and indirect financial consequences for a business. After a breach, businesses must resolve the problem leading to the breach, deal with the repercussions and come up with ways to limit risks in the future. When a security breach occurs in a business, it can have many negative affects on the business, such as negative press, loss of consumer loyalty, diminished brand reputation and even lawsuits.

The steps that a company take when dealing with a data breach can effect how they recover afterwards. According to Experian’s Data Breach Response Guide, “In the face of a data breach, organizations have the opportunity to quickly implement sound decisions that will ultimately result in preserving brand equity and customer relationships. One way to preserve brand equity is to provide complimentary identity protection and credit monitoring services. Research shows that individuals affected in a breach who receive free credit monitoring are six times less likely to file a lawsuit against the breached

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Avmed: Forensic Analysis

    • 294 Words
    • 2 Pages

    In December of 2009 a company named AvMed, which is a Florida based not-for-profit health plan provider, had two laptops stolen (Anderson,2010; “We help our members”, n.d.). One of the laptops was recovered and it contained encrypted patient information. However, the second laptop was not encrypted and it contained names, Social Security numbers, addresses, birthdays and other healthcare information. Initial reports indicated a little over two hundred thousand clients were impacted, but a forensic analysis by Price Waterhouse Coopers revealed that the scope of the data breach may involve 1.2 million customers.…

    • 294 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Target Executive Summary

    • 343 Words
    • 2 Pages

    In December 2013, criminals forced their way into systems, gaining access to guest credit and debit card information. It was determined that certain guest information was also taken, for example, the information included names, mailing addresses, email addresses or phone numbers. The massive data breaches at Target were broken into the retailer's network using login credentials stolen from a heating, ventilation and air conditioning company. The hackers first tested the data-stealing malware on a small number of cash registers. The cost of the breach was far reaching to Target, customers, employees and banks.…

    • 343 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    When I think of security breaches, I always think of the many stores that I have shopped at, only to find out months later they have been hacked. A few years ago I remember Target stores causing widespread panic, by releasing a press release that anyone who shopped in their store with a card was at risk for being hacked. These types of breaches leave customers in panic, and vigilantly inspecting their checking accounts, credit card statements, and their credit scores to ensure they have not been taken advantage of. But how prevalent are breaches?…

    • 946 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Target Security Breach

    • 181 Words
    • 1 Pages

    From a managerial perspective, there were many errors made in handling the December 2013 Target security breach. The first questionable decision for review deals with the effects of poor communication. Chief Executive Gregg Steinhafel hesitates to publicly communicate the breach to consumers (Kinicki & Williams, 2013). The primary law of business is “being responsive to customers” (Kinicki & Williams, 2013, p.12). Furthermore, when the details were communicated, CEO Steinhafel inflated the amount of affected shoppers (Kinicki & Williams, 2013).…

    • 181 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Organization: J.P Morgan Chase Cyber security attack which involved J.P Morgan Chase bank is one of major attacks which took place recently. About two third of the bank’s customer details were stolen in this attack. The Bank officially announced that the data of 83 million customers was hacked out of which there were 76 million household and 7 million small business customers were involved. Key-points of the attack • The data comprises of the information of 83 million Customer details such as name, phone number, address and email address •…

    • 414 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The Department of Homeland Security is one of 15 department in the U.S. Cabinet. Homeland Security is in charge of ensuring the safety of Americans from threats of all kinds. This includes the prevention of terrorist attacks, the protection against natural and man-made disasters, the watching of borders, and the protection against cyberspace. To prevent future terrorist attacks the department informs the government about potental targets based on collected information from files. Homeland security is also the first to send aid to victims of disasters.…

    • 196 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Security Threat Groups, also referred to as gangs are either an formal or informal group of prison inmates who set up either by race or by their beliefs. The evolution of gangs have developed a threat to the safety of prison officials and other inmates. Some of the major security threat groups include the Aryan Brotherhood, The Klu Klux Klan, The Folks, The Nation of Islam, and MS13. Groups within the correctional facilities are categorized as STGs depending upon parameters such as gang history, purpose, involvement in illegal activities, propensity for violence, and its structure and composition.…

    • 2127 Words
    • 9 Pages
    Great Essays
  • Great Essays

    Every day thousands of people risk their lives to protect our country from harm, from serving in the army, to working for the government in the Department of Homeland Security because, these people are the ones who keep us protected from harm. For my senior project, I am researching how it is possible to get a job in the Department of Homeland Security. Prior to the start of this project I just had the basic knowledge of what it is and that it is a part of the government. Throughout this project I plan on exploring the system and the skills it takes to get into the Department of Homeland Security starting in college. By doing this I hope to be able to better understand what it takes to become part of the Department of Homeland Security and…

    • 1554 Words
    • 7 Pages
    Great Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Credit monitoring firms can assist in monitoring activity on consumer’s credit reports after a breach. Also, consumers can place a security freeze on their credit reports to restrict access to them making it more difficult for thieves to open new…

    • 794 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Equifax Case Study

    • 733 Words
    • 3 Pages

    One of the most vital services offered by Equifax to individuals and businesses is its analytical insights that are useful in decision making concerning financial matters. This service, in addition to verifying the identities of businesses and individuals, makes Equifax a significant player in the Credit bureau business in the US (Reuters, 2018). Company Profile Given its global operations, Equifax has sizable annual revenue amounting to 3.144 billion USD. Its reputation as a premier credit bureau in the US has been tarnished by recent events of data breaches with the latest data breach being so severe that it triggered a congressional inquiry into its business practices (Rucker, 2018).…

    • 733 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays