SHARE
Facebook X Pinterest WhatsApp

Channel Partners Could Cost Customers More in Data Breach Incidents

Your security mistakes could cost your clients even more than those they make themselves, according to new results released today by the Ponemon Institute in its fifth annual Cost of Data Breach study. After surveying data breaches from around the world for its 2010 study, the research organization found that data breaches caused by third […]

Jan 25, 2010
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Your security mistakes could cost your clients even more
than those they make themselves, according to new results released today by the
Ponemon Institute in its fifth annual Cost of Data Breach study.

After surveying data breaches from around the world for its
2010 study, the research organization found that data breaches caused by third
parties such as channel partners cost client organizations $217 per record
versus the $194 per record cost of breaches caused by internal-only breaches.

The $21 difference likely stems from a number of additional difficulties in
coordination that crop up when third parties are involved, says Larry Ponemon,
chairman and founder of the Ponemon Institute.

"We find that, year in and year out, third-party mistakes are a major
cause of data breach," Ponemon says. "When third parties lose data,
it becomes more expensive, typically because the detection and escalation is
more difficult. Notification sometimes is haphazard when deciding who’s
responsible for what, and the ex-post response normally is a little bit more
complicated deciding who’s responsible for dealing with questions and
concerns."

Sponsored by PGP, the annual survey showed that the average cost of breaches
edged up again this year, from $202 to $204 per compromised record. The average
organizational cost rose from $6.65 million in the 2009 study to $6.75 million
in 2010.

According to the study, 42 percent of breaches were made up of those caused by
third-party mistakes, which include not only flubs by IT service providers, but
also by other solution partners such as payment card processors and other
acquirers of data.

Ponemon says that his research is showing that third-party data acquirers could
well be in the crosshairs of criminal attackers, who understand that they are
often not as well-protected as the organizations that actually own the data.

"We’ve also found that third parties in some cases had security
infrastructure that was not as comprehensive or not high as quality as the
company that was outsourcing to them," he says. "We especially saw
this with third parties offshore, and that could be an easy access point for
the malicious or criminal hackers. The bad guys knowing this might actually
look at the path of less resistance, and they may actually turn to third
parties more often as a result."

This could actually offer solution providers with a distinct security advantage
a big competitive differentiator if they play their cards right, Ponemon says.

"We’re starting to see third parties, especially companies in IT hosting,
IT operations and even cloud computing vendors, starting to sell their
customers and prospective customers on security," Ponemon says. "I
had not seen this before in my entire life, and I’ve been in security for like
35 years."

Recommended for you...

SentinelOne Debuts Wayfinder Threat Detection and Response Services
Jordan Smith
Nov 6, 2025
NETGEAR’s “Drive” Redefines Partner Success
Cisco Targets Critical Infrastructure Needs for AI Era
Cork Marks Three Years Linking MSPs to SMB Cyber Resilience
Victoria Durgin
Oct 31, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.