Page 14 - IMDR Journal 2025
P. 14

Research Article
            planning,  technical  controls,  vendor  management,   practical  way  to  balance  is  to  treat  security  dollars  as
            budgeting, and communication. Each would be guided by   insurance: determine a reasonable budget to reduce risks to
            best practices (e.g., NIST and ISO guidelines) to ensure the   an acceptable level. For critical systems (like customer data
            company is more resilient to future attacks.      portals),  higher  security  investment  is  justified.  For  less
            3. How would transparency and timely disclosure help in   critical functions, basic controls may suffice. Regular risk
            a breach situation?                               assessments  can  help  reallocate  resources  as  priorities
                                                              change.
            Transparency  is  crucial  for  maintaining  trust.  Legal
            frameworks  like  the  EU’s  General  Data  Protection   In summary, companies should not view cybersecurity as a
            Regulation (GDPR) require companies to report breaches to   burden  but  as  protecting  a  key  business  asset.  Decision-
                                                              makers can use models (e.g., FAIR – Factor Analysis of
            authorities  within  72  hours.  By  promptly  informing
                                                              Information Risk) to estimate expected losses from cyber
            regulators  and  affected  individuals,  companies.  Comply
            with  regulations,  avoiding  additional  fines,  and  also   events and compare them to security program costs. When
            demonstrate responsibility. For example, BA reported the   done  transparently,  boards  can  integrate  cybersecurity
            breach to the ICO on September 6, 2018, meeting the 72-  budgets into overall strategic planning. This way, security
            hour  notification  window.  This  adherence  helped  limit   investment  is  balanced  with  other  priorities  in  line  with
            regulatory penalties (though BA still received a fine, the   quantified risk.
            process aligned with the rules).                  5. What is the reputation impact of breaches, and how do
            Beyond compliance, public trust is at stake. Customers feel   organisations manage them?
            betrayed if a breach is hidden or covered up. Studies suggest   Breaches can severely damage an organisation’s reputation.
            that  evasive  or  delayed  responses  can  severely  erode   Customers expect companies to safeguard their data; when
            consumer confidence. A clear, honest admission—even if   this trust is broken, they may lose confidence in the brand.
            bad  news—can  mitigate  panic.  For  instance,  BA  issued   The BA breach generated widespread media coverage and
            formal  apologies  and  offered  affected  customers   negative press. Immediately after BA disclosed the attack,
            compensation, which, while costly, was necessary to show   its parent company’s share price fell by about 2%, reflecting
            accountability. Forbes notes that losing customer trust can   investor concern. News articles emphasised BA’s apology
            have long-term costs to brand value. By contrast, transparent   and the unprecedented nature of the hack, highlighting a
            handling can preserve some goodwill. Quick disclosure also   blow to the airline’s image. Similarly, the SFO’s incident
            empowers  customers  to  take  protective  actions  (e.g.   raised  questions  about  the  airport’s  security  competence
            cancelling cards) and prevents rumour-driven speculation.   among employees and contractors.
            In  short,  transparency  is  part  of  crisis  management  best   To manage reputational harm, organisations typically take
            practices: it satisfies legal duties and can reduce reputational
                                                              several steps. First, they publicly acknowledge the incident
            harm.  Companies  should  thus  develop  communication
                                                              and apologise, which humanises the response. BA’s CEO
            plans that ensure rapid, honest notification of stakeholders,   issued apologies and offered credit monitoring, signalling
            regulators, and the public when breaches occur.   care for customers.
            4. How to balance cybersecurity investment with other   Second,  they  implement  remedial  measures  and
            priorities?                                       communicate  them:  after  the  BA  hack,  the  company
            Balancing security spend against other business needs is   announced  system  upgrades  and  waived  some  fees  to
            essentially  a  risk  management  question.  Organisations   compensate affected passengers. Third, PR campaigns and
            should adopt a risk-based approach, aligning cybersecurity   advertisements  may  be  used  to  rebuild  trust  over  time.
            budgets with the value of assets and the level of threat. The   According to Forbes, preventing loss of customer trust is
            NIST CSF endorses this approach, allowing companies to   extremely hard—
            tailor  security  “appropriately”  to  their  risk  environment.   “Rebuilding a brand’s reputation is a complex and expensive
            This  means  analysing  potential  breach  costs  (fines,   endeavour”. Therefore, proactive reputation management is
            remediation,  lost  sales)  versus  the  cost  of  preventive   essential.
            controls.  Studies  show  that  severe  breaches  can  inflict
            millions of dollars in losses; for example, industry estimates   In practice, companies often set up dedicated web pages or
            put  the  average  breach  cost  in  the  multi-million-dollar   hotlines for breach inquiries, update customers via email or
            range.  In  a  Forbes Technology  Council  analysis,  experts   media,  and  engage  with  regulators  and  law  enforcement
            argue  cybersecurity  should  be  viewed  as  a  strategic   publicly  to  show  compliance.  They  also  monitor  social
                                                              media and the press to counter misinformation. Over the
            investment that protects revenue and brand value.
                                                              long  term,  firms  invest  in  highlighting  security
            Empirical data indicate that many organisations underinvest   improvements and may obtain third-party assurances (like
            in security. A 2025 report found only 3% of companies felt   security certifications) to reassure stakeholders. Ultimately,
            their budget fully covered all cybersecurity needs.  managing reputation after a breach requires transparency,
            Meanwhile,  52%  wanted  more  funding  for  security   empathy, and concrete actions to demonstrate learning and
            personnel  and  57%  for  new  technology. This  suggests  a   improvement.
            disconnect between perceived risk and spending. Boards   6. Are existing cybersecurity measures at SFO and BA
            must  recognise  that  underfunding  security  to  save  costs   adequate given evolving threats?
            often leads to far greater losses when an incident occurs. A



                                                                                                    5
   9   10   11   12   13   14   15   16   17   18   19