Lessons from the “Cost of a Data Breach: A view from the cloud 2021” report.

The first step in keeping your data better protected is knowing what can go wrong. The answer is a costly data breach, and the response should be a proactive plan to protect your data.

The importance of this is emphasized with the annual publishing of the 2021 Cost of a Data Breach Report from IBM Security™. Produced with independent research by Ponemon Institute, the results are sponsored, analyzed, reported and published by IBM Security. Given the importance of this topic and its leadership in cybersecurity, IBM Cloud® has published an additional, specially focused version: Cost of a Data Breach: A view from the cloud 2021.

The research indicates that while there have been fewer breach incidents reported across the public and private sectors this past year, the impact and severity of these breaches to organizations has worsened. Depending on how the data was stored — cloud, hybrid or on-premises — and how mature or automated the system was configured and secured, the loss suffered was as high as 6.71 million USD per incident.

All the results point to a consistent conclusion — organizations using the cloud can help minimize threats with built-in capabilities that provide visibility, proactive monitoring and security intelligence across their cloud deployments. In short, clients can mitigate risk with a more comprehensive, end-to-end approach to cloud security.

Here are four steps you can take to build that more comprehensive level of protection.

Step 1: Go hybrid

The risk you face: The average cost of a public cloud-based breach was 1.19 million USD higher than hybrid cloud-based breaches.

Your solution: IBM Cloud provides an end-to-end hybrid cloud solution with one consistent platform for managing data, services and security features embedded at every step of the development lifecycle. This hybrid cloud solution features include the following:

  • A full range of services that enable confidential computing
  • Data protection services
  • An end-to-end data protection approach
  • The strategic benefits of a hybrid cloud model

IBM Cloud services also help ensure that your data is protected at all stages, from at-rest to in-flight. Of course, the effectiveness of these services is tied to the maturity of your cloud migration, leading to our next step.

Step 2: Mature migration

The risk you face: Those in a less-mature stage of migration took more time to locate and contain a security breach.

Your solution: As businesses push for application modernization through cloud migration, there is also a need to reach a mature stage of migration in a timely and secure manner. The IBM Cloud full-stack approach gives you the following:

  • The ability to reach maturity more quickly, efficiently and securely
  • End-to-end security management
  • Unified solutions
  • Built-in capabilities with visibility, proactive monitoring and security intelligence
  • Endpoint management and visibility with Tanium Comply integration

To reach a mature stage of cloud migration, it’s important to keep in mind the importance of correct configuration, as errors open you and your cloud-based data to potential threats. This leads us to our third step.

Step 3: The right security

The risk you face: Cloud misconfiguration is the third-most-common security breach risk, accounting for 15% of data breaches.

Your solution: The IBM Cloud Security and Compliance Center gives you centralized management tools, always-on compliance and up-to-date secure configurations and visibility.

The IBM Cloud Security and Compliance Center unifies all IBM Cloud security and compliance capabilities into a “secure-by-default” experience for end users of IBM public cloud and IBM Cloud Service Providers.

By seamlessly integrating security, configuration governance and compliance directly into the platform, we encourage a culture of end-to-end compliance that saves you time and money. You also gain efficiency with a unified dashboard, enabling you to view everything in one place. The use of these tools is made stronger by the artificial intelligence (AI) capabilities that you can get with IBM Cloud, leading us to our final step.

Step 4: Automate with artificial intelligence

The risk you face: The sole reliance on manual monitoring to prevent and find breaches is often ineffective and potentially costly.

Your solution: With the AI capabilities of IBM Cloud, you can shut down threats faster and gain a competitive advantage by seeing insights sooner. Such capabilities enable you to do the following:

  • Analyze with accuracy and speed
  • Detect threats in real-time
  • Make informed, critical decisions faster
  • Learn with each interaction
  • Gain actionable insights

The impact of confidential computing

The Cost of a Data Breach: A view from the cloud 2021 study found that many security needs can be addressed with confidential computing — a cloud computing technology that helps protect data in use by isolating sensitive data in a protected CPU and performing computation in a hardware-based trusted execution environment (TEE). The data is accessible only to authorized programming code and invisible or unknowable to anyone else.

The goal is to provide you and your company with technical and total privacy assurance that your cloud-based data remains confidential and secure — and not even your cloud service provider can access it.

Next steps

For more background on data breaches and their prevention, download the report from IBM Cloud and IBM Security: Cost of a Data Breach: A view from the cloud 2021.

Categories

More from Announcements

IBM TechXchange underscores the importance of AI skilling and partner innovation

3 min read - Generative AI and large language models are poised to impact how we all access and use information. But as organizations race to adopt these new technologies for business, it requires a global ecosystem of partners with industry expertise to identify the right enterprise use-cases for AI and the technical skills to implement the technology. During TechXchange, IBM's premier technical learning event in Las Vegas last week, IBM Partner Plus members including our Strategic Partners, resellers, software vendors, distributors and service…

Introducing Inspiring Voices, a podcast exploring the impactful journeys of great leaders

< 1 min read - Learning about other people's careers, life challenges, and successes is a true source of inspiration that can impact our own ambitions as well as life and business choices in great ways. Brought to you by the Executive Search and Integration team at IBM, the Inspiring Voices podcast will showcase great leaders, taking you inside their personal stories about life, career choices and how to make an impact. In this first episode, host David Jones, Executive Search Lead at IBM, brings…

IBM watsonx Assistant and NICE CXone combine capabilities for a new chapter in CCaaS

5 min read - In an age of instant everything, ensuring a positive customer experience has become a top priority for enterprises. When one third of customers (32%) say they will walk away from a brand they love after just one bad experience (source: PWC), organizations are now applying massive investments to this experience, particularly with their live agents and contact centers.  For many enterprises, that investment includes modernizing their call centers by moving to cloud-based Contact Center as a Service (CCaaS) platforms. CCaaS solutions…

See what’s new in SingleStoreDB with IBM 8.0

3 min read - Despite decades of progress in database systems, builders have compromised on at least one of the following: speed, reliability, or ease. They have two options: one, they could get a document database that is fast and easy, but can’t be relied on for mission-critical transactional applications. Or two, they could rely on a cloud data warehouse that is easy to set up, but only allows lagging analytics. Even then, each solution lacks something, forcing builders to deploy other databases for…