Costly content at risk

March 2014 Information Security

The average cost of multimedia files that a user might lose from a device as a result of a cyber attack or other damage is estimated at $418, according to a Consumer Security Risks Survey, conducted by B2B International and Kaspersky Lab.

Many of these losses could be prevented, but after users purchase digital content they often fail to take appropriate steps to ensure that content is secure.

Users can lose files in a number of different ways: losing a device, having a device stolen, or falling victim to malicious users. Cybercriminals understand that users value their files, which is why they are constantly developing new malware that can encrypt data on a hard drive and then demand a ransom to have those files restored and returned.

According to the B2B International survey, over the past year 27% of respondents encountered a cyber attack. At the same time, over 60% of users who were victims of malware that either damaged or destroyed data admitted that they had not been able to fully restore their files. During the same period, approximately 14% of users dealt with the loss, theft or crash of their device.

Studies have shown that potential losses resulting from the loss of multimedia content (in other words, the monetary value of the files that cannot be restored) is higher among younger respondents, who actively download music and movies. For example, respondents in the 16-24 age group would face an average loss of $670, while those in the 25-34 group would incur an average loss of $455; users aged 45 and older would lose an average of $227.

When it comes to the value of data losses in different countries, residents of China and Russia were likely to incur the highest average losses at $816 and $807 per user, respectively. This figure is considerably lower in Europe ($378) and North America ($342).

In order to protect digital assets, users not only need to back up their data on a regular basis – they also need to secure their personal devices against malicious attacks designed to steal or extort data. Smartphones and tablets should also have additional tools to help locate a lost device or to mitigate the potential damages of device theft.

Kaspersky Lab offers this through Kaspersky Internet Security – Multi-Device, a comprehensive solution to provide maximum user protection against all types of cyber threats. The solution includes individual products protecting Microsoft and Mac computers, as well as smartphones and tablets running on Android. iPhone and iPad owners can download the Kaspersky Safe Browser app free of charge to safely and securely view Web content on their devices.

For more information, www.kaspersky.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...