Tip:
Highlight text to annotate it
X
Hey everybody, Jamie Barnett here with Netskope go for
another Movie Line Monday.
And today's video is going to be about money.
What better topic to talk about on a Monday?
No Movie Line Monday about money would be complete
without a quote from Trading Places.
So today's quote is from Dan Aykroyd and Eddie Murphy.
"Looking good, Louis!" "Feeling good, Billy Ray!"
So let's dive in.
And so what we're talking about is the multiplier effect
of a cloud data breach.
Now, we all know about the studies that Ponemon Institute
does about data breaches in general.
And they have put together some great estimates based on
a bunch of research that are very useful for the industry.
I thought we have a little bit of fun and just do this by the
numbers, so bear with me here.
Hundred to 250--
Ponemon has estimated, based on a whole bunch of research,
that it costs any organization who experiences a data breach
between $100 to $250 per record that has been breached.
And that has a bunch of direct and indirect costs
associated with it.
And they've also taken kind of a separate look and said, for
an organization, on average, it costs a
total of $5.4 million.
Now, that's an important number when you think about
the kind of breaches that we've seen, sort of in the
past, right.
You see things like attacks from outsiders, you've seen
malware attacks, you've seen people who have lost a laptop
that has records in it and it is unencrypted,
and things like that.
People losing mobile devices.
But many of those attacks do not necessarily have a
multiplier effect.
So let's talk about the nature of the cloud, and what
happens, and why that is impactful on a data breach.
So this next number here is number of devices.
According to a recent study that Cisco did, the average
knowledge worker carries 3.3 devices for computing.
So they might have a mobile device, they
might have an iPad.
They might have a cell phone, and then maybe they have a
home computer and a work laptop.
So let's talk about what that looks like.
Because if you have a file sharing service or some sort
of cloud app where you're actually sharing data between
them, you might have a client on each of those devices.
So that is 3.3, and just for the sake of simplicity, we'll
call it three mobile devices.
So you have that data in three different places now.
And so that is a multiplier in and of itself.
Let's also talk about the fact, this next number here,
which is based on a Harris Interactive study, which
polled individuals and said how often do you, or how many
of you, have shared files via an unapproved
file sharing service?
Thirty-eight percent said that they had.
So let's talk about what that means.
These people are sharing this data with somebody else.
And then that person has three devices.
And they are also sharing.
And they're sharing, 38% of the time, via
an unapproved device.
And so on, and so on, and so on.
So that has a tremendous multiplicative effect.
When you have a sensitive piece of data and it is doing
the rounds, it is essentially reaching an endless tapestry
of cloud-connected endpoints.
Let's talk about this next stat.
This is another Ponemon Institute study that was done
with another organization, a separate study from the one
above, where they looked at number of cloud security--
they looked at cloud security in general.
And they talked about number of organizations who have lost
sensitive data as a result of file sharing services.
And the number is staggering--
90%.
So very much validating this prior information here about
the magnitude and risk of a cloud data breach when you
start talking about cloud services and enterprises.
So that's today's Movie Line Monday.
We look forward to seeing you again.
Thank you.