Adam points to a report by Ponemon Institute and old friends PGP Inc on data breaches.
data breach incidents cost U.S. companies $202 per compromised customer record in 2008, compared to $197 in 2007. Within that number, the largest cost increase in 2008 concerns lost business created by abnormal churn, meaning turnover of customers. Since the study’s inception in 2005, this cost component has grown by more than $64 on a per victim basis, nearly a 40% increase.
Frequent readers of this blog will recall that I often post numbers of the average end-user cost of events like phishing. The number is about $1000.
Ignoring the obviously simplistic scientific process here, or better yet, leaving it to someone more scientific ... there is a huge difference between $200 and $1000.
We can take several views on this:
1200 | 1100 | 1000 | 900 | 800 | 700 | 600 | 500 | 400 | 300 | 200 | 100 | 000 | User Pays | |
Caveat emptor | user buys PGP | |||||||||||||
Switching | "churn" | |||||||||||||
risk sharing | small but painful | |||||||||||||
insurance | "don't lose that card" | |||||||||||||
Efficient | know the business! | |||||||||||||
Business pays | 000 | 100 | 200 | 300 | 400 | 500 | 600 | 700 | 800 | 900 | 1000 | 1100 | 1200 |
Markets tend to mature towards either the efficient view or the insurance view. The market in your identity is not mature. The reasons for that might be widely debated, but I'll have a quick stab here: we never really wanted to buy and sell our identities. We don't want that market in the first place, so damned if we're going to let it mature.
Posted by iang at February 4, 2009 04:51 AM | TrackBacka couple of my comments on the matter (from linkedin)
http://www.garlic.com/~lynn/2009b.html#62
http://www.garlic.com/~lynn/2009b.html#63
a related study/report from a couple weeks ago:
New Research Reveals 45% of Card Breach Victims Lose Confidence in Their Financial Accounts
http://sev.prnewswire.com/banking-financial-services/20090120/SF6044320012009-1.html
... and my comments
http://www.garlic.com/~lynn/2009b.html#9
and for a little more topic drift ... recent comments about "mis-aligned" business processes
http://www.garlic.com/~lynn/2009.html#74
You got the axes wrong, Ian. They need to be numbered in the exact opposite direction, both of them.
On the substance, it is an interesting article, as usual. Another refreshingly honest way of looking at security.
Posted by: Daniel A. Nagy at February 5, 2009 05:29 AM"darn! you spotted my marketing trick" :)
OK, fixed, THANKS! Of course, some will point out that the user pays always anyways ... but money being about information, Hayekian-wise, it is all about who has to carry the burden and incentive of that information.
Posted by: Iang at February 5, 2009 07:54 AMCool, but how do we get from here to there?
Posted by: Adam at February 5, 2009 10:55 AM"The Ponemon Institute, which puts out an annual data breach cost report, found that the total average cost of a data breach grew to $197 per compromised record. The costs add up to more than $6.3 million per breach and ranged from $225,000 to almost $35 million. The study factors in the cost of lost business and the investment a merchant makes in security technologies following a breach. The organization plans updated figures later this month.
The Maine data breach report further illustrates the far reaching effects of data breaches and identity crime, said Larry Ponemon, founder and chairman, Ponemon Institute. Ponemon cautioned that the costs listed in the report (which one, Maine or Ponemon?) are only those associated with financial institutions and don't reflect the total costs incurred by Hannaford's, victims, and other organizations."
Posted by: Larry Ponemon on the others... at February 10, 2009 08:18 AM