Enterprise Security Trends Blog | HP Blogs
Keep up with the latest cyber, consumerisation, collaboration and cloud enterprise security trends from the team of HP information security professionals.

Security attacks are becoming Harder, Better, Faster, Stronger

There is no denying it - the volume, financial impact and sophistication of cyber-attacks and data breaches continue to increase. You might say that cyber criminals, hacktivists and cyber terrorists are getting Harder, Better, Faster, Stronger - to quote Daft Punk.


Harder in terms of lost revenue from cyber-attacks

Research from the HP and Ponemon Cost of Cyber Crime study revealed that cyber-attacks cost businesses on average between $1.4 million and $46 million each year. This figure continues to rise each year.


Better attacks that take longer to resolve

The adversary is also becoming more sophisticated with their attacks. The average time to resolve an attack has increased to 24 days, up from 18 days the previous year.


Faster, more frequent breaches occurring each week

More worryingly, the number of successful attacks per week doubled between 2010 and 2012, with an average of two successful attacks each week perpetrated on businesses. 


All resulting in a Stronger adversary

Harder, better, faster means attackers are growing stronger. I don’t doubt for a minute that results from future studies will continue to show further increases in cyber attacks, that is until we start to think about security differently. Well, not just THINK about security differently but also DO security differently.


Take a look at the infographic for more detail or download the Cost of Cyber Crime study.


Get more information on HP Security  or follow us on Twitter @HPSecurity to stay up to date on the latest security news from HP.


cost of cyber crime infographic

Showing results for 
Search instead for 
Do you mean 
About the Author

Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.