Site icon LIFARS, a SecurityScorecard company

What Is The Average Time To Detect Data Breaches And How To Reduce It?

What Is The Average Time To Detect Data Breaches And How To Reduce It

What Is The Average Time To Detect Data Breaches And How To Reduce It

On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s consumer data, intellectual property, critical IT or financial data – a company’s fortune often hinges on their ability to keep that data safe and confidential. That all starts with cyber incident response measures. The proliferation of threats and TTPs (tactics, techniques, and procedures) mean it’s inevitable that even the most secure system will be breached. When that happens, fast detection and reaction times are the best hope of mitigating the damage. As the numbers show, the need for incident response frameworks is critical. Let’s have a look on what the average time to detect data breaches is.

 

If you learned that adversaries got hold of the data you are protecting, may it be customer, proprietary, or other sensitive information, you should contact LIFARS immediately.

 

How long does it take to detect a security breach?

Research suggests that most companies still have a long way to go to improve their detection rates. A report by IBM found that the average time to detect and contain a data breach is 280 days.

The longer a breach goes unaddressed, the more data gets leaked and the larger the overall impact – financial and otherwise. The same report found that by containing a breach in under 200 days, you can save $1 million in costs. Every day that you detect the breach sooner, will have a tangible effect on damage mitigation.

Most breaches also go unnoticed and don’t raise any alarms until the damage they cause becomes visible with time.

There are three main reasons for this:

How can response times be reduced?

Clearly, companies need to step up to the plate and introduce concrete measures that reduce their detection and response times. Literally hundreds of millions of dollars are on the line, never mind the knock-on effect on customers and data privacy.

Conclusion

In a world where there always seems to be a new cyber threat on the horizon, businesses are already playing catchup. The best time to start is today. By assessing current readiness, drafting an IR strategy, and adopting it as a core business operation you can have effective incident response security.

 

References

https://www.ibm.com/security/data-breach

Exit mobile version