{"id":1645,"date":"2012-05-18T12:15:00","date_gmt":"2012-05-18T12:15:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2279242"},"modified":"2012-05-18T12:15:00","modified_gmt":"2012-05-18T12:15:00","slug":"quantifying-reputation-loss-from-a-breach","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/quantifying-reputation-loss-from-a-breach\/","title":{"rendered":"Quantifying Reputation Loss from a Breach"},"content":{"rendered":"<p>It\u2019s really easy to quantify some of the costs associated with a security breach. Number of customers impacted times the cost of a first class stamp plus the cost of a sheet of paper plus the cost of ink divided by \u2026 you get the picture. Some of the costs are easier than others to calculate. Some of them are not, and others appear downright impossible.<br \/>\nOne of the \u201ccosts\u201d often cited but rarely quantified is the cost to an organization\u2019s reputation. How does one calculate that?<br \/>\nWell, if folks sat down with the business people more often (the ones that live on the other side of the Meyer-Briggs Mountain) we\u2019d find it\u2019s not really as difficult to calculate as one might think. While IT folks analyze flows and packet traces, business folks analyze market trends and impacts \u2013 such as those arising from poor customer service.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2279242\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s really easy to quantify some of the costs associated with a security breach. Number of customers impacted times the cost of a first class stamp plus the cost of a sheet of paper plus the cost of ink divided by \u2026 you get the picture. Some of th&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-1645","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/1645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=1645"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/1645\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=1645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=1645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=1645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}