Home » Capita cyber-attack costing up to £20 million in recovery costs

Capita cyber-attack costing up to £20 million in recovery costs

by Cass Donovan
10th May 23 3:31 pm

Following the news that the Capita cyber-attack is costing the outsourcing firm and contractor between £15m and £20m in recovery costs Steve Bradford, Senior Vice President EMEA, SailPoint points out the importance of using AI security.

Steve Bradford, Senior Vice President EMEA, SailPoint  has suggested that in order to fully reinforce cyber defences, there needs to be further steps taken for businesses to protect all identities within an organisation’s network.

Highlighting the importance of using AI-enabled identity security to clearly see, manage, and control all variations of identity – contractors, suppliers, and temporary workers alike.

Steve said, “No industry is untouchable when it comes to cybercrime, and Capita has taken positive steps to recover the data stolen by malicious actors and to prevent any further issues arising from the incident.

“However, with ransomware attacks like this potentially costing as much as £20 million in recovery and remediation costs, this serves as a reminder to businesses that protection against cyber-attacks doesn’t simply stop at employees. All identities within an organisation’s network must be protected – whether it’s contractors, suppliers, or temporary workers.

“Now, nearly half of workforces comprise a variety of non-employee identities – meaning different individuals, all with different access requirements, are tapping in and out of networks, often unchecked. Without proper visibility and protection in place, organisations are leaving themselves vulnerable in the face of attack.

“AI-enabled identity security is key in allowing organisations to see, manage, control, and secure all variations of identity, knowing who has access to what, and why across their entire network – employees as well as non-employees.

“Having this centralised visibility is crucial for organisations to deal effectively with any suspicious behaviour well ahead of a breach occurring.”

Leave a Comment

You may also like