{"id":625,"date":"2021-11-27T13:59:58","date_gmt":"2021-11-27T13:59:58","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=625"},"modified":"2021-11-27T14:19:42","modified_gmt":"2021-11-27T14:19:42","slug":"cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/","title":{"rendered":"Cost of Cyber Attacks vs. Cost of Cybersecurity in 2021"},"content":{"rendered":"<p><b>Cost of Cyber Attacks vs. Cost of Cybersecurity in 2021<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If you think cybersecurity is expensive, just wait to see what lack of cybersecurity costs. The costs of cyber attacks vs the costs of cybersecurity has been debated for years, however it is now clear which one is the clear winner. According to IBM and the Ponemon Institute\u2019s 2020 \u201c<\/span><a href=\"https:\/\/www.ibm.com\/security\/digital-assets\/cost-data-breach-report\/#\/pdf\"><span style=\"font-weight: 400;\">Cost of a Data Breach<\/span><\/a><span style=\"font-weight: 400;\">\u201d report, it was determined that the average total cost of cybersecurity breaches in the US, between August 2019 and April 2020, was $8,640,000.\u00a0<\/span><\/p>\n<p><b>Types of Attacks &amp; Associated Costs<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The specific costs will depend on the sophistication of the attack and how well executed it was.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, a <\/span><a href=\"https:\/\/www.itgovernance.co.uk\/blog\/what-is-a-dos-denial-of-service-attack\"><span style=\"font-weight: 400;\">DDoS (distributed denial-of-service) attack<\/span><\/a><span style=\"font-weight: 400;\"> could knock systems offline for a few hours, creating a frustrated workforce and unhappy customers \u2013 but otherwise the cost would be comparatively low.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By contrast, an attacker who infects an organisation\u2019s systems with <\/span><a href=\"https:\/\/www.itgovernance.co.uk\/ransomware\"><span style=\"font-weight: 400;\">ransomware<\/span><\/a><span style=\"font-weight: 400;\"> could cripple them for days or even weeks. The cost of recovery, not to mention the ransom payment (if the organisation pays up) could result in losses in the millions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Malicious actors don\u2019t discriminate based on the size of an organization. The data breaches at eBay, Anthem, and Equifax might have garnered many headlines; however hackers also understand that small organizations also have smaller budgets for cybersecurity and therefore make easier targets. <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/06\/the-cost-of-cybersecurity-incidents-the-problem\/\"><span style=\"font-weight: 400;\">Multiple sources<\/span><\/a><span style=\"font-weight: 400;\"> have reported that the average cost per compromised customer\u2019s Personally Identifiable Information (PII) record was around $150 in the year 2019. This means that if only 10,000 customer records were compromised, a small business could face breach costs starting at $1,500,000. If we increase the number of breached customer records to 50,000, we are looking at costs in the neighborhood of $7,500,000.<\/span><\/p>\n<p><b>Compliance Mandates &amp; Fines<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Apart from the costs of obtaining access to your data, there are often regulatory fines for an organization for which they may be liable.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Compliance with mandates, such as the California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) are two of the most important regulations. Explicitly written on the official GDPR website, \u201cGDPR fines are designed to make non-compliance a costly mistake for both large and small businesses.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The GDPR explicitly states that some violations are more severe than others. These less severe infringements could result in a fine of up to $11,899,550 (\u20ac10,000,000) or 2% of an organization\u2019s worldwide annual revenue from the preceding financial year, whichever amount is higher. More serious GDPR infringements \u2014 those going against the right to privacy and right to be forgotten \u2014 could result in a fine of up to $23,799,100 (\u20ac20,000,000) or 4% of an organization\u2019s worldwide annual revenue from the preceding financial year, whichever amount is higher.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last year, a new set of regulations, the California Consumer Privacy Act were created. The CCPA fines are just as intimidating as GDPR. Each time a business is found to have an intentional violation, they can be fined up to $7,500. Even unintentional violations come with a price tag of $2,500. Violations can also stack up on one another. For example, if a business\u2019s website is using third-party cookies without leveraging a cookie banner for awareness and opt-in, that organization could be committing thousands (or more) of violations per day.<\/span><\/p>\n<p><b>Reputational Damage<\/b><\/p>\n<p><span style=\"font-weight: 400;\">According to AON\u2019s 2019 Global Risk Management Survey, UK businesses rate brand damage and cyber attacks in the top three risks. The reality is that cyber attacks have enormous potential to damage the reputation of a business, conflating the two risks. The negative impact can be tangible \u2013 a 2019 study reported by Forbes found that a breach can lower a company\u2019s <\/span><a href=\"https:\/\/www.clydeco.com\/en\/insights\/2021\/05\/data-and-reputational-risk\"><span style=\"font-weight: 400;\">share price by 7%<\/span><\/a><span style=\"font-weight: 400;\">. It can be hard for the organisation to regain customers\u2019 trust, particularly if the breach was widespread or caused by basic security errors.<\/span><\/p>\n<p><a href=\"https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity-privacy-forensics\/cyber-and-privacy-innovation-institute.html\"><span style=\"font-weight: 400;\">PricewaterhouseCoopers (PwC)<\/span><\/a><span style=\"font-weight: 400;\">, an audit and assurance company that works in cybersecurity, reported that 69% of consumers surveyed believe that the companies they use are vulnerable to being hacked and attacked by cyber criminals. The same survey found that 87% of consumers are even willing to walk away and take their business elsewhere if, or when, a data breach occurs. These numbers highlight that consumers are not only skeptical of the organizations that have their critical assets, but that they are willing to leave a company who goes through a data breach. <\/span><a href=\"https:\/\/www.securelink.com\/blog\/reputation-risks-how-cyberattacks-affect-consumer-perception\/\"><span style=\"font-weight: 400;\">With consumers being cognizant<\/span><\/a><span style=\"font-weight: 400;\"> of both of these, organizations must implement standards to protect its network from bad actors while also preserving its relationship with consumers.<\/span><\/p>\n<p><b>Don\u2019t Neglect Your Security Budget<\/b><\/p>\n<p><span style=\"font-weight: 400;\">While there is no one-size-fits-all answer when trying to decide what a \u201ctypical budget\u201d looks like for cybersecurity operations, there are a few studies that have been done that can provide some insight. A <\/span><a href=\"https:\/\/www.pionline.com\/article\/20190501\/ONLINE\/190509988\/financial-services-firms-spend-6-to-14-of-it-budget-on-cybersecurity-survey\"><span style=\"font-weight: 400;\">recent study by Deloitte and the Financial Services Information Sharing and Analysis Center<\/span><\/a><span style=\"font-weight: 400;\"> found that financial services on average spend <\/span><b>10% <\/b><span style=\"font-weight: 400;\">of their IT budgets on cybersecurity. That\u2019s approximately <\/span><b>0.2% to 0.9%<\/b><span style=\"font-weight: 400;\"> of company revenue or <\/span><b>$1,300 to $3,000<\/b><span style=\"font-weight: 400;\"> spent per full time employee.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Other factors to consider:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Size of company: The more employees you have = more opportunities for a cyber attack to occur (more computers, workstations, and devices are vulnerable to attacks).\u00a0 More employees also result in more possible opportunities for successful phishing attacks and business email compromise. As a result, larger organizations tend to require more in their cyber security spending than smaller businesses.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Type of data: Businesses that collect more sensitive data will need additional security layers to ensure they are compliant with industry-standard legal compliance.\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Your data needs to be secured under the Health Insurance Portability and Accountability Act (HIPAA) if you\u2019re a medical provider.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Businesses in commerce or professional services that store credit card information need to ensure they are following the Payment Card Industry Data Security Standard (More cybersecurity measures in place for HIPAA compliance, PCI compliant if they\u2019re storing credit cards and complying with Sarbanes-Oxley for financial reporting.)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Products &amp; Services: The more protection you have in the form of products and services, the higher the overall cost. Businesses that choose both cybersecurity products and services should expect to pay more than if they just select security products.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Self-Install vs. Professional Install: Cyber security companies can sell you security products to set up yourselves, or you can contact a security vendor to help install the product (usually for additional setup fees).\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Professional Audits: Organizations can periodically conduct third-party audits to ensure they are updated with the latest security and compliance standards.<\/span><\/li>\n<\/ul>\n<p><b>Ignoring Security Monitoring<\/b><\/p>\n<p><span style=\"font-weight: 400;\">User Activity Monitoring allows you to monitor users to verify that their actions meet good security practices. If a malicious outsider gains access to their log-in information, or if an insider chooses to take advantage of their system access, you will have a record of the suspicious activity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If your organization is like most others, you don\u2019t have the budget to stand up your own security operations center. But that doesn\u2019t remove the need for around-the-clock monitoring and intelligence that will help you investigate incidents and minimize attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the spirit of preserving your data, session recording software offers a way to protect your organization. Visit <a href=\"https:\/\/www.tsfactory.com\/\">www.tsfactory.com<\/a> to learn more about how we can help you prevent data insider threats and theft.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cost of Cyber Attacks vs. Cost of Cybersecurity in 2021 If you think cybersecurity is expensive, just wait to see what lack of cybersecurity costs. The costs of cyber attacks vs the costs of cybersecurity has been debated for years, however it is now clear which one is the clear winner. According to IBM and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":627,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-625","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cost of Cyber Attacks vs. Cost of Cybersecurity in 2021 - Blogs<\/title>\n<meta name=\"description\" content=\"If you think cybersecurity is expensive, just wait to see what lack of cybersecurity costs. The specific cost of cybersecurity will depend on the sophistication of the attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cost of Cyber Attacks vs. Cost of Cybersecurity in 2021 - Blogs\" \/>\n<meta property=\"og:description\" content=\"If you think cybersecurity is expensive, just wait to see what lack of cybersecurity costs. The specific cost of cybersecurity will depend on the sophistication of the attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-27T13:59:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-27T14:19:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/11\/hacker-g689c79182_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/\",\"name\":\"Cost of Cyber Attacks vs. Cost of Cybersecurity in 2021 - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/11\/hacker-g689c79182_1280.jpg\",\"datePublished\":\"2021-11-27T13:59:58+00:00\",\"dateModified\":\"2021-11-27T14:19:42+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"If you think cybersecurity is expensive, just wait to see what lack of cybersecurity costs. The specific cost of cybersecurity will depend on the sophistication of the attack.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/11\/hacker-g689c79182_1280.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/11\/hacker-g689c79182_1280.jpg\",\"width\":1280,\"height\":853,\"caption\":\"costofcybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cost of Cyber Attacks vs. Cost of Cybersecurity in 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cost of Cyber Attacks vs. Cost of Cybersecurity in 2021 - Blogs","description":"If you think cybersecurity is expensive, just wait to see what lack of cybersecurity costs. The specific cost of cybersecurity will depend on the sophistication of the attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/","og_locale":"en_US","og_type":"article","og_title":"Cost of Cyber Attacks vs. Cost of Cybersecurity in 2021 - Blogs","og_description":"If you think cybersecurity is expensive, just wait to see what lack of cybersecurity costs. The specific cost of cybersecurity will depend on the sophistication of the attack.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2021-11-27T13:59:58+00:00","article_modified_time":"2021-11-27T14:19:42+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/11\/hacker-g689c79182_1280.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/","name":"Cost of Cyber Attacks vs. Cost of Cybersecurity in 2021 - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/11\/hacker-g689c79182_1280.jpg","datePublished":"2021-11-27T13:59:58+00:00","dateModified":"2021-11-27T14:19:42+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"If you think cybersecurity is expensive, just wait to see what lack of cybersecurity costs. The specific cost of cybersecurity will depend on the sophistication of the attack.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/11\/hacker-g689c79182_1280.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/11\/hacker-g689c79182_1280.jpg","width":1280,"height":853,"caption":"costofcybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cost-of-cyber-attacks-vs-cost-of-cybersecurity-in-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Cost of Cyber Attacks vs. Cost of Cybersecurity in 2021"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=625"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/625\/revisions"}],"predecessor-version":[{"id":626,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/625\/revisions\/626"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/627"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}