Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

1.2 Risks of data loss

This section is part of the amber and green pathways.

As the case studies showed, there are serious consequences of losing data.

These consequences can be expressed as a series of costs, such as:

  • the cost of recreating the lost data – either by buying new hardware and software or re-entering the lost data (which may not always be possible)
  • the cost of continuing without that data (availability)
  • the cost of informing others about the loss.

The costs cannot just be expressed in terms of money. For instance, the last cost, of informing others, is not just limited to, for example, postage and email charges. A company that suffers a data loss can also suffer a loss in its reputation as a professional organisation. This problem is greatly magnified if personal data belonging to other people has been lost. With the current regulations such as the GDPR, the organisations are liable to pay a hefty fine, which adds to the total cost of the incident to the organisation.

In the case of loss of intellectual property, the damages can be multiform and the consequent costs high due to long-term impact.

Case study: Norsk Hydro

In March 2019, Norsk Hydro, one of the biggest aluminium producers in the world, was targeted by a ransomware attack using LockerGoga which encrypted a wide range of files.

Norsk Hydro had detailed plans in place and was able to limit the spread of the attack and revert to manual operation. It also had secure backups of critical files. In spite of that, the latest estimates in May 2019 put the cost at between $45.6m and $51.3m.

While they were recovering from this attack, Norsk Hydro were also aware of phishing attempts being made on their trading partners that attempted to spread the malware, and to divert payments to criminal accounts.

Norsk Hydro did not pay any ransom and provided detailed updates on its response to the attack.

Case Study: American Medical Collection Agency (AMCA) and Quest Diagnostics

AMCA was a company that ran billing and payment services in the US. In August 2018, hackers gained access to its servers and remained undetected until March 2019. The data obtained by the hackers included social security numbers, some credit card and banking details and medical data.

Quest Diagnostics was a medical company that used the services of another company called Optum360 to collect payments due. Optum360 had outsourced this operation to AMCA. Quest Diagnostics was first to report the security breach after customer details were involved in many fraudulent transactions.

LabCorp, BioReference and Opko Health were other medical companies that used the services of AMCA. AMCA filed for bankruptcy but the financial impact on the medical companies that used AMCA services is not yet clear.

The risk of data loss cannot be completely eliminated, but it can be minimised. A survey conducted by Cybersecurity Insiders found that 68% of organisations confirm insider attacks are becoming more frequent, of which 63% think that privileged IT users are the biggest insider threat (Cybersecurity Insiders, 2020) In 2019, Verizon reported that 34% of breaches involved people inside the business, and 15% of all breaches were the result of misuse by authorised users. However, errors were the cause of 21% of all breaches (Verizon, 2019).

A significant number of security threats are caused inadvertently by employees who are unaware of the risks of their actions, such as copying data to external devices or websites, opening infected emails, clicking malicious links, installing software and so on. Better staff training could reduce the risk of accidental data loss.

The Infosecurity Europe survey revealed that while a slight majority of companies had implemented an internal information security policy to secure computers, networks and data, only a minority had provided staff training to raise awareness of potential security risks. Another important way of minimising the effect of any loss is by backing up data – making secure copies of data either on to a separate device, to a separate disk, or even to a different location.

Think about identity theft and loss of data. Have you ever been affected by these issues? How would you know? Reflect on your personal experience.

  • Have you checked your email on [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] ?
  • How would you recover if your live data was encrypted by ransomware, or simply destroyed?

Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to University-level study, we offer two introductory routes to our qualifications. You could either choose to start with an Access module, or a module which allows you to count your previous learning towards an Open University qualification. Read our guide on Where to take your learning next for more information.

Not ready for formal University study? Then browse over 1000 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus371