Research and analysis

Information security breaches survey: supporting data

Updated 4 June 2015
Download CSV 43.4 KB

Download the file to see all the information

This preview shows the first 1,000 rows and 50 columns. Download CSV 43.4 KB

Table 1 ""
Not set Not set
Q1_1_1. Where is your organisation's main location? Not set
Not set Not set
Total
Not set Not set
Total 326
Scotland 2%
Northern Ireland 0%
North West England 7%
Yorkshire and North East England 5%
Wales 3%
Midlands 6%
Eastern England 6%
South West England 8%
South East England 22%
Greater London 29%
Channel Islands 1%
Elsewhere in Europe 3%
North America 5%
South America -
Africa 1%
Asia 1%
Australia -
Table 2 ""
Not set Not set
Q1_1_2. How many staff does your organisation employ in the UK and Channel Islands? Not set
Not set Not set
Total
Not set Not set
Total 326
None 2%
Less than 10 17%
10 to 49 8%
50 to 249 13%
250 to 499 8%
500 to 9,999 35%
10,000+ 16%
Don't know 0%
Table 3 ""
Not set Not set
Q1_1_3. In what sector is your main business activity? Not set
Not set Not set
Total
Not set Not set
Total 326
Agriculture -
Banking 4%
Consultancy and professional services 18%
Distribution 1%
Education 5%
Government 8%
Health 4%
Insurance 8%
Leisure and entertainment 1%
Manufacturing 3%
Media 1%
Other financial services 6%
Pharmaceutical 1%
Property and construction 3%
Retail 3%
Services 3%
Technology 19%
Telecommunications 2%
Travel 2%
Utilities, energy and mining 3%
Other 6%
Table 4 ""
Not set Not set
Q1_1_4. Which of the following best describes your role in the organisation? Not set
Not set Not set
Total
Not set Not set
Total 326
Chief Executive Officer 7%
Chief Operations Officer 2%
Chief Information Officer 4%
Chief Information Security Officer 7%
Chief Finance Officer 2%
Chief Risk Management Officer 0%
Executive Director 2%
Non-Executive Director 1%
Managing Director 10%
Information Security 41%
Information Technology 2%
Finance 1%
Business Operations 3%
Legal -
Audit / Investigations 4%
Risk Management 5%
Other 10%
Table 5 ""
Not set Not set
Q1_1_5. How high a priority is information security to your top management or director group? Not set
Not set Not set
Total
Not set Not set
Total 326
Very high priority 41%
High priority 41%
Neither high nor low priority 13%
Low priority 3%
Not a priority at all 0%
Don't know 2%
Table 6 ""
Not set Not set
Q1_1_6. How well do you think your staff understand your security policy? Not set
Not set Not set
Total
Not set Not set
Total 326
Very well understood 21%
Quite well understood 54%
Poorly understood 23%
Don't know 1%
Do not currently possess one 2%
Table 7 ""
Not set Not set
Q1_1_7. What % of your total IT expenditure do you spend on information security? Not set
Not set Not set
Total
Not set Not set
Total 326
Zero 2%
1% or less 12%
2% to 5% 23%
6% to 10% 19%
11% to 25% 14%
26% to 50% 3%
More than 50% 2%
Don't know 26%
Table 8 ""
Not set Not set
Q1_1_8. Has your organisation had what it considers a serious" breach (highest impact on your impact scale) in the last year?" Not set
Not set Not set
Total
Not set Not set
Total 326
Yes 12%
No 82%
Don't know 6%
Table 9 ""
Not set Not set
Q1_2_2. How many times in the last year were you made aware that your systems have been infected by viruses or other malicious software either through detection by your own systems or reports from others? Not set
Not set Not set
Total
Not set Not set
Total 328
None 21%
Once only in the last year 12%
A few times in the last year 35%
Roughly once a month 7%
Roughly once a week 6%
Roughly once a day 4%
Several times a day 5%
Hundreds of times every day 1%
Don't know 9%
Table 10 ""
Not set Not set
Q1_3_3. How many times in the last year have you become aware that your staff have used other people's IDs to gain unauthorised access to systems or data? Not set
Not set Not set
Total
Not set Not set
Total 323
None 52%
Once only in the last year 8%
A few times in the last year 19%
Roughly once a month 7%
Roughly once a week 2%
Roughly once a day 0%
Several times a day 2%
Hundreds of times every day -
Don't know 11%
Table 11 ""
Not set Not set
Q1_3_4. How many times in the last year have you become aware of breaches in data protection laws/regulations in your company? Not set
Not set Not set
Total
Not set Not set
Total 323
None 56%
Once only in the last year 8%
A few times in the last year 16%
Roughly once a month 5%
Roughly once a week 2%
Roughly once a day 1%
Several times a day 1%
Hundreds of times every day -
Don't know 10%
Table 12 ""
Not set Not set
Q1_3_5. How many times in the last year have you become aware that your staff have deliberately obtained and misused confidential / sensitive data? Not set
Not set Not set
Total
Not set Not set
Total 323
None 67%
Once only in the last year 6%
A few times in the last year 11%
Roughly once a month 2%
Roughly once a week 1%
Roughly once a day 0%
Several times a day 0%
Hundreds of times every day -
Don't know 13%
Table 13 ""
Not set Not set
Q1_3_6. How many times in the last year have you become aware that your staff have accidentally lost or leaked your confidential / sensitive data? Not set
Not set Not set
Total
Not set Not set
Total 323
None 49%
Once only in the last year 13%
A few times in the last year 20%
Roughly once a month 6%
Roughly once a week 2%
Roughly once a day 0%
Several times a day 1%
Hundreds of times every day -
Don't know 10%
Table 14 ""
Not set Not set
Q1_3_7. How many times in the last year have you become aware that your staff have used your computer systems to carry out financial fraud or theft? Not set
Not set Not set
Total
Not set Not set
Total 323
None 78%
Once only in the last year 5%
A few times in the last year 2%
Roughly once a month 1%
Roughly once a week 1%
Roughly once a day 0%
Several times a day 0%
Hundreds of times every day -
Don't know 12%
Table 15 ""
Not set Not set
Q1_3_8. How many times in the last year have you become aware that your staff have stolen some of your computer equipment? Not set
Not set Not set
Total
Not set Not set
Total 323
None 69%
Once only in the last year 10%
A few times in the last year 7%
Roughly once a month 2%
Roughly once a week 1%
Roughly once a day 0%
Several times a day 0%
Hundreds of times every day -
Don't know 11%
Table 16 ""
Not set Not set
Q1_3_9. How many times in the last year have you become aware that your staff have deliberately sabotaged your data or systems? Not set
Not set Not set
Total
Not set Not set
Total 323
None 83%
Once only in the last year 3%
A few times in the last year 1%
Roughly once a month 1%
Roughly once a week 1%
Roughly once a day 0%
Several times a day -
Hundreds of times every day -
Don't know 10%
Table 17 ""
Not set Not set
Q1_4_2. How many times in the last year have you been made aware that unauthorised outsiders have succeeded in penetrating your network? Not set
Not set Not set
Total
Not set Not set
Total 323
None 72%
Once only in the last year 9%
A few times in the last year 4%
Roughly once a month 1%
Roughly once a week 1%
Roughly once a day -
Several times a day 1%
Hundreds of times every day 1%
Don't know 12%
Table 18 ""
Not set Not set
Q1_4_3. How many times in the last year have you been made aware that unauthorised outsiders have launched a Denial of Service (DoS) or Distributed DoS attack against your systems? Not set
Not set Not set
Total
Not set Not set
Total 322
None 63%
Once only in the last year 11%
A few times in the last year 9%
Roughly once a month 3%
Roughly once a week 1%
Roughly once a day -
Several times a day 1%
Hundreds of times every day 0%
Don't know 11%
Table 19 ""
Not set Not set
Q1_4_4. How many times in the last year have you been made aware that unauthorised outsiders have eavesdropped on your internet or telecommunications traffic? Not set
Not set Not set
Total
Not set Not set
Total 322
None 65%
Once only in the last year 3%
A few times in the last year 3%
Roughly once a month 0%
Roughly once a week 1%
Roughly once a day 0%
Several times a day 1%
Hundreds of times every day 0%
Don't know 26%
Table 20 ""
Not set Not set
Q1_4_5. How many times in the last year have you been made aware that unauthorised outsiders have misused your company's identity (e.g. Phishing)? Not set
Not set Not set
Total
Not set Not set
Total 322
None 52%
Once only in the last year 10%
A few times in the last year 15%
Roughly once a month 3%
Roughly once a week 4%
Roughly once a day 1%
Several times a day 2%
Hundreds of times every day 1%
Don't know 12%
Table 21 ""
Not set Not set
Q1_4_6. How many times in the last year have you been made aware that unauthorised outsiders have pretended to be one of your customers with a view to fraud (identity theft)? Not set
Not set Not set
Total
Not set Not set
Total 322
None 59%
Once only in the last year 5%
A few times in the last year 13%
Roughly once a month 6%
Roughly once a week 0%
Roughly once a day 1%
Several times a day 1%
Hundreds of times every day 0%
Don't know 14%
Table 22 ""
Not set Not set
Q1_4_7. How many times in the last year have you been made aware that unauthorised outsiders have stolen some of your computer equipment? Not set
Not set Not set
Total
Not set Not set
Total 322
None 69%
Once only in the last year 8%
A few times in the last year 9%
Roughly once a month 2%
Roughly once a week 1%
Roughly once a day 0%
Several times a day -
Hundreds of times every day -
Don't know 11%
Table 23 ""
Not set Not set
Q1_4_8. How many times in the last year have you been made aware that unauthorised outsiders have exfiltrated confidential information from your organisation? Not set
Not set Not set
Total
Not set Not set
Total 322
None 71%
Once only in the last year 4%
A few times in the last year 3%
Roughly once a month 1%
Roughly once a week 1%
Roughly once a day 0%
Several times a day -
Hundreds of times every day -
Don't know 20%
Table 24 ""
Not set Not set
Q3_2_1a. Which is the most important driver for your information security expenditure? Not set
Not set Not set
Total
Not set Not set
Total 319
Preventing downtime and outages 11%
Protecting intellectual property 10%
Protecting customer information 33%
Protecting other assets (e.g. Cash) from theft 1%
Maintaining data integrity 5%
Complying with laws/regulations 10%
Business continuity in a disaster situation 2%
Protecting the organisation's reputation 20%
Enabling business opportunities 2%
Improving efficiency/cost reduction 1%
Suffered a serious security breach 1%
Government cyber security initiatives 2%
Other -
Don't know 3%
Table 25 ""
Not set Not set
Q3_2_1b. Which is the second most important driver for your information security expenditure? Not set
Not set Not set
Total
Not set Not set
Total 310
Preventing downtime and outages 13%
Protecting intellectual property 6%
Protecting customer information 18%
Protecting other assets (e.g. Cash) from theft 3%
Maintaining data integrity 10%
Complying with laws/regulations 17%
Business continuity in a disaster situation 4%
Protecting the organisation's reputation 20%
Enabling business opportunities 4%
Improving efficiency/cost reduction 2%
Suffered a serious security breach 2%
Government cyber security initiatives 2%
Other -
Don't know 1%
Table 26 ""
Not set Not set
Q3_2_1c. Which is the third most important driver for your information security expenditure? Not set
Not set Not set
Total
Not set Not set
Total 306
Preventing downtime and outages 13%
Protecting intellectual property 7%
Protecting customer information 14%
Protecting other assets (e.g. Cash) from theft 2%
Maintaining data integrity 11%
Complying with laws/regulations 17%
Business continuity in a disaster situation 10%
Protecting the organisation's reputation 13%
Enabling business opportunities 4%
Improving efficiency/cost reduction 3%
Suffered a serious security breach 1%
Government cyber security initiatives 3%
Other 0%
Don't know 0%
Table 27 ""
Not set Not set
Q3_2_9. How are cyber security risks identified and assured? Not set
Not set Not set
Total
Not set Not set
Total 317
Internal Audit 61%
Outsourced managed security provider 24%
Business as usual healthchecks 40%
Ad-hoc healthchecks / reviews 46%
Information / Cyber security risk assessment 64%
Other 4%
Don't know 5%
Table 28 ""
Not set Not set
Q3_2_4. What information do you use to help you evaluate the security threats that your organisation faces? Not set
Not set Not set
Total
Not set Not set
Total 313
Discussions with senior management 53%
Views of internal security experts 64%
External security consultants 46%
Guidance from security bodies (e.g. ISF, IISP, ISC2) 51%
Alerts from government/intelligence services 53%
Government Cyber Security Ten Steps guidance 30%
Advice from security product vendors 49%
News reports in the media 51%
Industry Groups ('chatham house' rules type meeting) 36%
Cyber-security Information Sharing Partnership (CiSP) 27%
Other 4%
!None of the above 1%
!Don't know 5%
Table 29 ""
Not set Not set
Q3_2_5. How often do the CEO and Board members receive updates on who may be attacking your organisation? Not set
Not set Not set
Total
Not set Not set
Total 310
Daily 7%
Weekly 11%
Monthly 19%
Quarterly 19%
Annually 6%
Less frequently than annually 6%
Never 11%
Don't know 22%
Table 30 ""
Not set Not set
Q3_2_6. How clear is it who owns critical data within your organisation and takes responsibility for ensuring the data is protected? Not set
Not set Not set
Total
Not set Not set
Total 309
Very clear 40%
Quite clear 37%
Not clear 21%
Don't know 1%
Table 31 ""
Not set Not set
Q3_2_7. How is information classified within your organisation and is it consistently applied? Not set
Not set Not set
Total
Not set Not set
Total 309
Data classification scheme exists and consistently applied 33%
Data classification scheme exists but not consistently applied 33%
Document management policies exist and consistently applied 16%
Document management policies exist but not consistently applied 22%
No meaningful differentiation between different information types 11%
Not applicable as information is not classified 10%
Don't know 4%
Table 32 ""
Not set Not set
Q3_2_8. What cyber security governance and risk management arrangements do you have in place? Not set
Not set Not set
Total
Not set Not set
Total 308
CISO in place 33%
Board member with responsibility for Cyber risks 44%
Cyber security risks are included on Directorate / Departmental risk registers 31%
Cyber security risks are promoted into the Enterprise risk register 39%
Cyber security risks included within the Internal Audit plan 44%
Security risk assessment carried out in the last year 59%
Formal cyber security policy in place 46%
Other 4%
!None of the above 7%
!Don't know 7%
Table 33 ""
Not set Not set
Q3_3_1. Has your organisation documented its information security policy? Not set
Not set Not set
Total
Not set Not set
Total 307
Yes 84%
No 14%
Don't know 2%
Table 34 ""
Not set Not set
Q3_3_2. Do you provide staff with any security awareness training? Not set
Not set Not set
Total
Not set Not set
Total 307
Yes - on induction and regularly thereafter 64%
Yes - on induction only 21%
No 12%
Don't know 2%
Table 35 ""
Not set Not set
Q3_3_3. Has staff security awareness increased or decreased over the last year? Not set
Not set Not set
Total
Not set Not set
Total 307
Increased 61%
Decreased 2%
Stayed the same 31%
Don't know 6%
Table 36 ""
Not set Not set
Q3_3_4. What steps have you taken to raise your customers' security awareness? Not set
Not set Not set
Total
Not set Not set
Total 306
Providing direct guidance (e.g. On your web-site) 51%
Sponsorship or industry initiatives 13%
Providing customers with security tools (e.g. Anti-virus) 25%
Other steps 13%
No steps taken 28%
Don't know 9%
Table 37 ""
Not set Not set
Q3_3_5. Has your organisation implemented the principles of the International Standard for Information Security Management (ISO 27001)? Not set
Not set Not set
Total
Not set Not set
Total 306
Yes, completely 22%
Yes, partially 33%
No, but plan to 12%
No, and not planned 25%
Don't know 8%
Table 38 ""
Not set Not set
Q3_3_12. Has your organisation implemented Cyber Essentials and Cyber Essentials plus? Not set
Not set Not set
Total
Not set Not set
Total 306
Yes - badged for Cyber Essentials plus 2%
Yes - badged for Cyber Essentials 2%
Cyber Essentials fully implemented but not badged 4%
Cyber Essentials plus fully implemented but not badged 2%
Partially implemented 11%
No - but plan to 19%
No - and not planned 42%
Don't know 16%
Table 39 ""
Not set Not set
Q3_3_6. How has the amount that you spend on information security changed over the last year? Not set
Not set Not set
Total
Not set Not set
Total 306
Increased 46%
Stayed the same 39%
Decreased 3%
Don't know 11%
Table 40 ""
Not set Not set
Q3_3_8. Which of the following techniques do you use to evaluate the effectiveness of your spend on information security? Not set
Not set Not set
Total
Not set Not set
Total 304
Measuring trend in security incidents/costs 37%
Benchmarking against other organisations 14%
Return on investment calculations (ROI) 14%
Measuring staff awareness 27%
Monitoring level of regulatory compliance 33%
Feedback from management 29%
Active technical testing such as penetration testing and cyber attack simulation 39%
Table top exercise 13%
Other formalised process 3%
!Don't formally evaluate the effectiveness of information security spend 26%
!Don't know 11%
Table 41 ""
Not set Not set
Q3_3_9. Which standards and good practice guides do you ensure your suppliers comply with? Not set
Not set Not set
Total
Not set Not set
Total 304
A recognised standard such as ISO 27001 51%
Government-related requirements 31%
Payment card industry (PCI) 37%
Independent service auditor's report (e.g. ISAE 3402) 13%
Cyber Essentials 9%
Cyber Essentials Plus 5%
Other 4%
!None 19%
!Don't know 10%
Table 42 ""
Not set Not set
Q3_3_10. Do you have a formal incident management process? Not set
Not set Not set
Total
Not set Not set
Total 302
Yes - including incident identification, response and recovery 31%
Yes - including incident identification, response, recovery and root cause analysis 16%
Yes - including incident identification, response, recovery, root cause analysis and continuous improvement 31%
No 19%
Don't know 3%
Table 43 ""
Not set Not set
Q3_3_11. Which of the following 10 Steps" security practices do you conduct?" Not set
Not set Not set
Total
Not set Not set
Total 300
Directors are engaged with cyber risk through specification of risk appetite and approval of cyber risk management policy 50%
Policy to control all access to removable devices 59%
Established training programme and awareness of cyber risks 55%
Incident management capabilities 70%
Mobile working policy and training 64%
Patch management 77%
Up to date malware protection 88%
User account management 80%
Monitor user activity 60%
IT logging and monitoring 70%
None of the above 1%
Table 44 ""
Not set Not set
Q3_4_1. How are you primarily made aware and how do you track regulation and guidance (domestic and international) relevant to cyber security including data protection and information management? Not set
Not set Not set
Total
Not set Not set
Total 299
General Council is engaged and has this responsibility 7%
Obtain regular external legal advice 7%
Data protection officers engaged with the security programme and upcoming regulation 25%
CISO has responsibility for identifying upcoming regulation 20%
Upcoming regulation and guidance is not tracked effectively 17%
Other 6%
Don't know 18%
Table 45 ""
Not set Not set
Close 1. Many thanks for your time today. That is the end of part one of this survey. We will be distributing invites to complete part 2 in the future or alternatively you can complete part 2 now here. When would you like to complete part 2? Not set
Not set Not set
Total
Not set Not set
Total 215
Now 57%
Next year 43%
Table 46 ""
Not set Not set
Q2_1_1. Where is your organisation's main location? Not set
Not set Not set
Total
Not set Not set
Total 338
Scotland 3%
Northern Ireland 1%
North West England 6%
Yorkshire and North East England 5%
Wales 3%
Midlands 7%
Eastern England 5%
South West England 10%
South East England 20%
Greater London 29%
Channel Islands 0%
Elsewhere in Europe 4%
North America 4%
South America -
Africa 1%
Asia 2%
Australia 1%
Table 47 ""
Not set Not set
Q2_1_2. How many staff does your organisation employ in the UK and Channel Islands? Not set
Not set Not set
Total
Not set Not set
Total 338
None 3%
Less than 10 19%
10 to 49 11%
50 to 249 14%
250 to 499 6%
500 to 9,999 33%
10,000+ 13%
Don't know 1%
Table 48 ""
Not set Not set
Q2_1_3. In what sector is your main business activity? Not set
Not set Not set
Total
Not set Not set
Total 338
Agriculture 0%
Banking 5%
Consultancy and professional services 20%
Distribution 1%
Education 6%
Government 7%
Health 4%
Insurance 6%
Leisure and entertainment 1%
Manufacturing 2%
Media 2%
Other financial services 6%
Pharmaceutical 1%
Property and construction 3%
Retail 2%
Services 4%
Technology 19%
Telecommunications 1%
Travel 2%
Utilities, energy and mining 3%
Other 7%
Table 49 ""
Not set Not set
Q2_1_4. Which of the following best describes your role in the organisation? Not set
Not set Not set
Total
Not set Not set
Total 338
Chief Executive Officer 7%
Chief Operations Officer 2%
Chief Information Officer 4%
Chief Information Security Officer 7%
Chief Finance Officer 3%
Chief Risk Management Officer 1%
Executive Director 2%
Non-Executive Director 1%
Managing Director 10%
Information Security 37%
Information Technology 1%
Finance 1%
Business Operations 5%
Legal 0%
Audit / Investigations 6%
Risk Management 6%
Other 8%
Table 50 ""
Not set Not set
Q2_1_5. How high a priority is information security to your top management or director group? Not set
Not set Not set
Total
Not set Not set
Total 338
Very high priority 39%
High priority 42%
Neither high nor low priority 13%
Low priority 3%
Not a priority at all 2%
Don't know 1%
Table 51 ""
Not set Not set
Q2_1_6. How well do you think your staff understand your security policy? Not set
Not set Not set
Total
Not set Not set
Total 338
Very well understood 21%
Quite well understood 53%
Poorly understood 23%
Don't know 1%
Do not currently possess one 2%
Table 52 ""
Not set Not set
Q2_1_7. What % of your total IT expenditure do you spend on information security? Not set
Not set Not set
Total
Not set Not set
Total 338
Zero 2%
1% or less 12%
2% to 5% 22%
6% to 10% 17%
11% to 25% 15%
26% to 50% 2%
More than 50% 1%
Don't know 28%
Table 53 ""
Not set Not set
Q2_1_8. Has your organisation had what it considers a serious" breach (highest impact on your impact scale) in the last year?" Not set
Not set Not set
Total
Not set Not set
Total 338
Yes 13%
No 79%
Don't know 8%
Table 54 ""
Not set Not set
Q2_2_1. What type of incident was your worst breach this year? Not set
Not set Not set
Total
Not set Not set
Total 46
Infection by a virus or other malicious software 11%
Staff misuse of the internet or email 9%
Breach of laws/regulations 7%
Attack on website or internet gateway 22%
Systems failure or data corruption 11%
Fraud or theft using computer systems 2%
Theft or unauthorised disclosure of confidential data 20%
Physical theft of computer equipment -
Compromise of internal systems with subsequent remote access 7%
Other 9%
Not applicable - no security incidents in the year 4%
Table 55 ""
Not set Not set
Q2_2_3. How was the incident identified? Not set
Not set Not set
Total
Not set Not set
Total 42
By its impact on the business 17%
By routine internal security monitoring 26%
By other internal control activities (e.g. Reconciliations, audits) 12%
From reporting of similar incidents in the media -
From warning by government/law enforcement 7%
By accident 10%
From direct reporting by the media 10%
Other 17%
Don't know 2%
Not applicable -
Table 56 ""
Not set Not set
Q2_2_4. How long was it between the breach occurring and it being identified as a breach? Not set
Not set Not set
Total
Not set Not set
Total 42
Immediate 17%
Within a few hours 17%
Within a day 10%
Within a week 19%
Within a month 17%
Within 100 days 7%
Longer than 100 days 7%
Organisation identified and dealt with risk before a breach occurred -
Don't know 7%
Not applicable -
Table 57 ""
Not set Not set
Q2_2_5. Which of the following factors contributed to the incident occurring? Not set
Not set Not set
Total
Not set Not set
Total 42
Insufficient priority placed on security by senior management 26%
Weaknesses in vetting people 5%
Inadvertent human error 36%
Deliberate misuse of systems by staff 14%
Lack of staff awareness of security risks 33%
Lack of staff awareness of legal/regulatory requirements 12%
Poorly designed processes 24%
Failure to follow a defined process 26%
Weaknesses in someone else's security 10%
Poorly designed technical configuration 14%
Failure to keep technical configuration up to date 19%
Failure of technical security control to mitigate effectively 12%
External attack specifically targeted at your organisation 17%
Indiscriminate external attack 7%
Portable media bypassed defences 2%
Politically motivated as a consequence of policies/clients etc 2%
Other 5%
!None of the above 2%
!Don't know 5%
!Not applicable -
Table 58 ""
Not set Not set
Q2_2_6. What made this incident the worst of the year? Not set
Not set Not set
Total
Not set Not set
Total 42
Business disruption 21%
Cost to investigate and fix 14%
Value of lost assets 10%
Reputational damage 38%
Other 10%
Not applicable 7%
Table 59 ""
Not set Not set
Q2_2_7. Who was this breach reported to? Not set
Not set Not set