IBMs data breach 2020 report and lists collected losses occurred among various industry segments and regions and reasons we break it down in terms of impact and disruption to business true cost of data breach impact and losses over years the following security measures can prevent losses and costs, while complicating factors can make a breach more disruptive. listed below are industry recognized factors known for having an impact on data breach! Threat vectors and actors are primarily responsible for attacks and breaches, the factors and measures listing are enablers for the impact responsible for and prevention of data breaches.


Compliance failures | Third Party Breaches | Remote Workforce | Data Privacy failures | Security Skills shortage | Complex Security Systems | Ransomware | IOT / OT impact | Misconfigurations | Legacy Machines | Cloud migration | Forgotten / Stolen / Lost Credentials and Devices


AI platform | Red team testing | ID theft protection | Data loss prevention | Business continuity | Employee training | Threat Intel sharing | Security analytics | DevSecOps | Vulnerability testing | Managed security | Formation of IR team | Board involvement | CISO appointed | Incident response testing | Encryption

New factors and measures impacting are remote workforce, data privacy failures, complex security systems, ransomware and most often missed misconfigurations. Choosing the right AI automates continuous monitoring and security response and helps secure and maintain business continuity using threat intelligence to to keep updated against possible threat actors encryption and protection secures data privacy and compliance.

Ransomware evolved in the last few years from using mails as a delivery mechanism to exploiting zeroday vulnerabilities to exfiltration of data for double extortion. Check out our livebook EVASION EVOLUTION for an in depth analysis and understanding of viruses and why we consider ransomware as the evolutionary result of virus today. Click here for assessment on how prepared your organization and measures are to be taken.

Ransomware attacks in the US doubled about 98% increase in the last three months. India ranked second with an over 39% rise in ransomware attacks followed by Sri Lanka, Russia and Turkey, A 50% jump in the daily average of ransomware attacks in last three months globally, compared to the first half of 2020 predicting more attacks and escalations!

India ranks 3rd in the list of the highest number of internet users worldwide after the USA & China. With the exponential rise on the Internet and mobile phone users, there is a significant rise in the number of cyberattack incidents in India and globally, Pandemic sped up the need for faster better security solutions social engineering (fake website fake emails) increased potential threat to all remote workforce. DSCI released recommended work from home security products for our country. Authbase's NGAV is recommended to boost up security to detect threats without signatures

Ransomware do not discriminate there's been a 260% increase in the frequency of attacks, a 50% increase in ransom demanded across every industry in the first half of this year alone! IBM released global average cost of data breach in 2020 is 3.86 million healthcare average is 7.13 million dollars. total losses due to business disruption is a lot more. Among the most aggressive attacks, Maze and DoppelPaymer, which have begun exfiltrating data from hacked networks, and threatening to release data on leak sites, as part of double extortion, demanding ransom six times more than the average.

Along with ransomwares, a recorded spike in the number of funds transfer frauds and business email compromise events, growing 35% and 67%. Reported losses from these incidents have ranged from thousands to over a million dollars per event. October month is cyber awareness month ironically enough a large number of exploits were found this month in various segments browsers enterprises servers firewalls enterprise applications. the trend will keep growing until we take proactive measures along with reactive measures.

maintaining cyber hygiene and best practices can easily help secure 90% of the threats out there. being and maintaining compliance is a biggest factor for cybersecurity in our company we see cybersecurity and dat compliance as two sides of the same coin. keeping software uptodate backing up regularly having and maintaining cyber awareness helps protects against social engineering! human beings are always the weakest link in the chain.

Targeted attacks on pharma and research have been continously increasing the attackers don't use disclosed exploits they have an arsenal of their own tools they try multiple ones and they have to only get lucky only once. mostly due to the nature of the attacks secops take time to respond to these classifying them from anomalies to threats at a global level to be aware until time for firewall and antivirus to update their signatures rules unless.

Check out the biggest hacks and data breaches this year at ZDNet

SHIELD by design and process effectively negates many factors responsible for breaches while continuous monitoring, predicts and responds to threat vectors, reduces the attack surface improving the overall cyber posture, autonomous ai identifies and mitigates threat actors securing the networks and machines. data specific use cases allow unparalleled protection and security for data compliance