Why Multi Party Losses are Greater than Single Incidents

Download Now

To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

This whitepaper analyzes independent data gathered on over 800 multi-party cyber-incidents observed over the last decade. These so-called ‘ripple events’ are different to traditional security breaches because they don’t just impact a single organization, but spawn secondary loss events affecting thousands of organizations downstream in the supply chain.

Multi-party losses are increasing in frequency and losses incurred by these ripple events are much higher than single-party incidents.

Key takeaways of this research:

  • The median financial loss from multi-party cyber incidents is 13-times larger than losses from single-party incidents
  • Multi-party incidents are becoming more common over time
  • While the average ripple event impacts fewer than 10 firms beyond the original victim, they can swell much wider than that
  • Collection agencies, banks and lenders, credit bureaus, government offices and IT firms account for half of organizations that generate ripple events
  • SMBs are more likely to be on the receiving end of multi-party incidents originating from larger enterprises

Brought to You by

Should you download this content your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.