Page not available in your preferred language
The branch that you searched for does not have a page in your preferred language. Would you like to visit the branch page on the #CODE# site?
Boxes and filing cabinets stuffed with old documents? Get our One Time Shredding Service.
Protect your business from an information breach with regularly scheduled paper shredding service.
Our convenient, easy to use, drop off document shredding is just around the corner.
Ensure sensitive data on old hard drives is 100% inaccessible by physically destroying the drive.
Private information can be found on more than paper: we destroy CD-ROMs, USB drives, and data tapes.
From pill bottles to identity cards, specialty shredding destroys information wherever it’s found.
Get a Quote
Back To Information Security Resources
In this issue, we will examine the various ways an organization may be negatively impacted if it were to suffer a data breach
Download PDF Version
The 2013 Shred-it Information Security Tracker, conducted via Ipsos Reid, revealed that only 12 percent of small business owners and 29 percent of large business owners are aware that a data breach could result in severe financial impact and harm the credibility of the business 1. These statistics reveal that the vast majority of both large and small American businesses are generally unaware of the many costs that may be associated with a data breach. Most seemingly believe that a data breach is a one-time affair with few - if any - long-term consequences.
In reality, data breaches can have numerous long-term negative impacts, many of which might be unexpected. For example, organizations may experience a loss of revenue, loss of reputation, have their business opportunities dwindle and, most importantly, they may lose the trust of employees, customers and shareholders. With this in mind, this newsletter will provide you with insight on the various costs of a data breach and provide helpful tips to avoid becoming a victim.
The next time an organization thinks a data breach can be easily contained and its impact minimized, consider this story:
Last month, one of your company’s rising stars was on the road signing a major deal with a new distributor. On their way back to the office, they accidentally lost the financial information outlining the deal. They were unsure how this happened, but when you found out about the incident the following Monday you had to make the difficult phone call to your new distributor. The ink had barely dried when the partner backed out of the deal, citing an inability to trust you after having lost their financial information.
Because of this breach, your company lost out on a deal that would have guaranteed business growth until the end of the fiscal year. But the costs don’t stop there, and instead begin piling up for you and your associates. Thinking you might be able to salvage the situation, you reach out to other distributors, but all you find are dead ends. The story was leaked to the media and now you’ve lost your hard-earned reputation as few in the business community now trust you. Your quarterly estimates quickly fall and revenue drops. With a limited market and no potential, you begin shedding staff. On top of this, your company is embroiled in a legal battle stemming from the original breach.
The Ponemon Institute’s 2013 Cost of a Data Breach Study classifies the losses detailed in the above story as a form of opportunity cost. This can be defined as lost business opportunities resulting from negative reputation effects following a breach (and publicly revealed to the media)2. This study found “that the negative publicity associated with a data breach incident causes reputation effects that may result in abnormal turnover as well as a diminished rate for new customer acquisitions”3. In essence, most companies experienced opportunity costs associated with the breach incident, which diminished their ability to attract and retain new and existing customers.
With 35 percent of data breaches attributed to human error, organizations may want to reconsider their perception of the potential impact of a data breach4. In order to avoid this most unfortunate fate, organizations can take a number of steps to protect sensitive information:
When it comes to protecting sensitive information, an organization can never be too careful. By following the above tips and being aware of the impact of data breaches, organizations can arm themselves against the many potential long-term effects that result from a data breach.
Shred-it has developed an online survey to help businesses better understand security gaps in their processes.
To conduct your own security self-assessment, visit our website at: Risk Assessment Survey
You can also stay informed with Shred-it on Facebook and LinkedIn or follow us on Twitter at @Shredit.
Fill out the form below and we’ll contact you with a free quote within the hour! (Between 8:00am and 5:00pm, Mon - Fri)