Enterprise Security Trends Blog | HP Blogs
Keep up with the latest cyber, consumerisation, collaboration and cloud enterprise security trends from the team of HP information security professionals.

Security attacks are becoming Harder, Better, Faster, Stronger

There is no denying it - the volume, financial impact and sophistication of cyber-attacks and data breaches continue to increase. You might say that cyber criminals, hacktivists and cyber terrorists are getting Harder, Better, Faster, Stronger - to quote Daft Punk.


Harder in terms of lost revenue from cyber-attacks

Research from the HP and Ponemon Cost of Cyber Crime study revealed that cyber-attacks cost businesses on average between $1.4 million and $46 million each year. This figure continues to rise each year.


Better attacks that take longer to resolve

The adversary is also becoming more sophisticated with their attacks. The average time to resolve an attack has increased to 24 days, up from 18 days the previous year.


Faster, more frequent breaches occurring each week

More worryingly, the number of successful attacks per week doubled between 2010 and 2012, with an average of two successful attacks each week perpetrated on businesses. 


All resulting in a Stronger adversary

Harder, better, faster means attackers are growing stronger. I don’t doubt for a minute that results from future studies will continue to show further increases in cyber attacks, that is until we start to think about security differently. Well, not just THINK about security differently but also DO security differently.


Take a look at the infographic for more detail or download the Cost of Cyber Crime study.


Get more information on HP Security  or follow us on Twitter @HPSecurity to stay up to date on the latest security news from HP.


cost of cyber crime infographic

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
About the Author
About the Author(s)
  • Manage cyber engineering & architecture team developing security services, security reference architectures, big data security, mobility, cloud, cyber situational awareness and security operation center solutions. Responsible for developing innovative cyber solutions across public sector accounts. Collaborates with HP Labs, HP CTO Organization, product groups and third-party vendors to leverage innovative technologies to deliver the next generation of cybersecurity solutions.
  • A business first, senior executive, with over 20 years of hands on experience in defending banks, governments and corporations against cyberwarfare. My career in security started when I was employed to crack a secure system, which had locked down the boot process, whitelisting of applications and encrypted disks. I linked TeamOffice (an ICL email and collaboration system) with Microsoft Word to send an email which allowed me to do anything the person reading the email could do and send the results back to me, all without there knowledge. Having proved this vulnerability, I worked with Peter Simpson to create Defuse, a tool that blocked inappropriate actions. This successfully blocked Winword Concept, the first known malicous code in the wild. From these begginings I have investigated all aspects of security to provide an holistic approach to security as a business enabler and currently advising organisations on the suitability of the cloud to their needs.

Follow Us