Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

CSI/FBI: Violations, Losses Down

Security violations are down, but latest CSI/FBI research shows bigger losses elsewhere

If you think your company has actually experienced fewer security violations in the last year than it did the year before, and lost less money as a result, you're not crazy. In fact, according to a new report that will be issued tomorrow by the FBI and the Computer Security Institute, you may even be normal.

In their 11th annual poll of large enterprises, the CSI and the FBI report that 52 percent of organizations experienced unauthorized use of their computer systems in the last 12 month, down from 56 percent last year and 53 percent the year before. The percentage of respondents who say that there was no unauthorized use of their organization's computer systems increased from 31 percent last year to an all-time high of 38 percent this year.

The percentage of companies reporting six or more violations was also down to its lowest level in the survey's history with about 24 percent.

It's not all good news, however. Some categories of violations showed an increase in costs. Losses from laptop or mobile hardware theft, for example, grew from $19,562 per respondent in 2005 to $30,057 in 2006. Losses from telecommunication fraud rose from $2,750 last year to $12,377 this year. And the cost of Website defacement grew from $1,494 to $1,806.

Overall, though, the cost of security violations dropped in the past year, as it did the year before, according to the survey. "Taking the last two years together, there was a decline in average losses of $358,297, a two-year decline of over 68 percent," the report states. The CSI and the FBI attribute the decrease to the decline in reported incidents as well as dramatic increases in security investment by small and medium-sized firms.

In several cases, losses per incident also decreased in the last year, according to the survey. The cost of unauthorized access to information dropped from $303,234 in 2005 to $85,261 in 2006. The cost of viruses dropped from $179,781 to $69,125. And the costs of denial-of-service attacks dropped from $56,672 to $20,872.

Despite the relative dropoff in the frequency and costs of security incidents, enterprises continue to report ongoing threats. The majority of companies reported at least one security violation in the last 12 months. Most of the data losses come from outside the organization: Only 29 percent of respondents said that insider attacks accounted for more than 40 percent of their losses. Virus attacks and unauthorized access of systems are the two greatest sources of financial loss, according to the report.

What are IT departments doing about the violations? Some 98 percent have deployed firewalls, and 97 percent are using antivirus software. Seventy-nine percent have installed anti-spyware software, and 69 percent are using intrusion detection systems. Sixty-three percent are encrypting data in transit.

However, there are some "hot technologies" that still have not been deployed by a majority of enterprises. End-point security software, for example, has been deployed in only 31 percent of enterprises. Only 32 percent of respondents have installed wireless security products, and only 39 percent are using application firewalls. Sixty-one percent of respondents said they do no outsourcing of the security function.

What's at the top of the priority list? Seventy-three percent of respondents cited "data protection" as one of the most critical issues for the next two years. Sixty-three percent cited policy and regulatory compliance (such as SOX and HIPAA); 58 percent put identity theft and leakage of private information at the top of their lists (respondents were allowed more than one answer). Interestingly, fewer than 10 percent cited Web attacks, physical security, or end-point security as a top priority.

Despite the relative decline in incidence and losses due to security violations, the CSI and the FBI don't expect those losses to be eliminated anytime soon. "Regardless of measures an organization may take to protect its systems using technical computer security measures such as the use of passwords, biometrics, antivirus software and the like, there will be risks of financial loss that still remain," the report states.

— Tim Wilson, Site Editor, Dark Reading

  • Computer Security Institute (CSI)
  • Federal Bureau of Investigation

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Data Privacy Protections for the Most Vulnerable -- Children
    Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
    Sodinokibi Ransomware: Where Attackers' Money Goes
    Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-10-19
    Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
    PUBLISHED: 2019-10-19
    templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
    PUBLISHED: 2019-10-18
    In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
    PUBLISHED: 2019-10-18
    In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...
    PUBLISHED: 2019-10-18
    HCL Traveler versions 9.x and earlier are susceptible to cross-site scripting attacks. On the Problem Report page of the Traveler servlet pages, there is a field to specify a file attachment to provide additional problem details. An invalid file name returns an error message that includes the entere...