Breach Impact Calculator

Breach Cost Calculator

Most probable risk scenario for : Finacial

DATALEAK

 

Insurance companies are prime targets for data leaks because of the wealth of sensitive personal and financial data they hold. Attackers understand that leaking such data can result in significant financial gains, either by selling the data on the dark web or by using it for fraudulent activities. Furthermore, the reputational damage to the insurance company can lead to competitive advantages for others.

Most probable risk scenario for : Industrial

Deny of services (D-DOS)

 

Attackers often target industrial enterprises, including manufacturing plants and factories, with DDOS attacks because they understand the high reliance on continuous operations. A successful DDOS attack can halt production, causing immediate operational setbacks. The motive is often not just disruption, but also to exert pressure, perhaps for ransom or to benefit a competitor indirectly.

Most probable risk scenario for : Healthcare

Ransomware Attacks

 

Attackers frequently target the health care sector with ransomware due to the critical nature of medical data and the immediacy of patient care requirements. They understand that hospitals and health care providers cannot afford prolonged downtimes, as lives could be at stake. This urgency makes health care entities more likely to pay ransoms to restore access to their systems. Additionally, the wealth of sensitive patient data held by these institutions can be sold or exploited, providing another lucrative motive for attackers

Most probable risk scenario for : Public Sector

Deny of services (D-DOS)

 

The public sector is a strategic target for DDOS attacks. By disrupting government websites or public service platforms, attackers can make a political statement, create public unrest, or divert attention from another covert operation. Such attacks on the public sector aren't just about immediate disruption; they aim to undermine public confidence in government institutions and their ability to protect citizens' digital interactions.

Last known Cyber attaques for this scenario in Quebec: Hôpital général juif

Last known Cyber attaques for this scenario in France: Les hôpitaux de Vittel et de Neufchâteau , Le centre hospitalier de Brest

Last known Cyber attaques for this scenario in Quebec:  Investissement Québec

Last known Cyber attaques for this scenario in France: Somagic

Last known Cyber attaques for this scenario in Quebec: Hydro-Québec

Last known Cyber attaques for this scenario in Quebec: DESJARDINS , BENEVA

Last known Cyber attaques for this scenario in France:  l’Assemblée nationale

Last known Cyber attaques for this scenario in France:  AssurOne

 

Loss Exposure  

$

0
0

Scenario Amplification Factor

 

The loss Exposure cost include : as Lost Business activities cost  that attempt to minimize the loss of customers, business disruption and revenue losses, including , as Detection and Escalation activities cost that enable a company to detect the breach , as Post-Breach Response activities cost to help victims of a breach communicate with the company and conduct redress activities to victims and regulators and  Notification activities cost  that enable the company to notify data subjects, data protection regulators and other third parties .

Loss Exposure  

$

Projected Loss

$

 

 

Cost of Security Initiatives

$

Loss Decrease

$

 

Scenario Mitigators Factor

0
0
0
0

Simplified assessment (Mitigation/Amplification)

Road Map

Executive Dashboard

Collaboration