Actual Cyber Breach Costs: Small Business Case Study

1. Background

This information is compiled from a company that WebSafeStaff trained for Staff Cyber Security Awareness. By working with them to analyse their monthly IT invoices, the following information and conclusions were able to be extracted.

How to Steal a Car

Weird thing happened today - I worked out how to steal cars. Expensive ones. And you can just get someone to hand you the keys and drive away with it no questions asked. Not that I'm into that sort of thing though.

Disclaimer: Please don't steal cars.

"A blind person with a taser just shot my forklift driver!"

Scenario 1

"Hi Bob, welcome to the warehouse. How's your first day going?"
"Yeah great. So what do you want me to do?"
"Well I guess we'll start you on the forklift."
"Um, ok sure."
"So you've driven things with wheels before?"
"Yep, I'm good to go!"

What are Typical Cyber Security Breach Costs?

Cyber security breaches can come in many different shapes and forms. Essentially someone has either done damage to your systems, has stolen your information, or has locked you out of your own information. Let's have a look at those three categories in a bit more detail:

Why Onsite Instructor Led Training?

While we can deliver webinar style training, we always find it more effective to be onsite at your premises and teach people face to face. There are a number of reasons why we've taken this approach.

Get in Touch

Contact Details

qassure logo