Costly content at risk

March 2014 Information Security

The average cost of multimedia files that a user might lose from a device as a result of a cyber attack or other damage is estimated at $418, according to a Consumer Security Risks Survey, conducted by B2B International and Kaspersky Lab.

Many of these losses could be prevented, but after users purchase digital content they often fail to take appropriate steps to ensure that content is secure.

Users can lose files in a number of different ways: losing a device, having a device stolen, or falling victim to malicious users. Cybercriminals understand that users value their files, which is why they are constantly developing new malware that can encrypt data on a hard drive and then demand a ransom to have those files restored and returned.

According to the B2B International survey, over the past year 27% of respondents encountered a cyber attack. At the same time, over 60% of users who were victims of malware that either damaged or destroyed data admitted that they had not been able to fully restore their files. During the same period, approximately 14% of users dealt with the loss, theft or crash of their device.

Studies have shown that potential losses resulting from the loss of multimedia content (in other words, the monetary value of the files that cannot be restored) is higher among younger respondents, who actively download music and movies. For example, respondents in the 16-24 age group would face an average loss of $670, while those in the 25-34 group would incur an average loss of $455; users aged 45 and older would lose an average of $227.

When it comes to the value of data losses in different countries, residents of China and Russia were likely to incur the highest average losses at $816 and $807 per user, respectively. This figure is considerably lower in Europe ($378) and North America ($342).

In order to protect digital assets, users not only need to back up their data on a regular basis – they also need to secure their personal devices against malicious attacks designed to steal or extort data. Smartphones and tablets should also have additional tools to help locate a lost device or to mitigate the potential damages of device theft.

Kaspersky Lab offers this through Kaspersky Internet Security – Multi-Device, a comprehensive solution to provide maximum user protection against all types of cyber threats. The solution includes individual products protecting Microsoft and Mac computers, as well as smartphones and tablets running on Android. iPhone and iPad owners can download the Kaspersky Safe Browser app free of charge to safely and securely view Web content on their devices.

For more information, www.kaspersky.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.