TalkTalk has experienced profit losses of nearly fifty percent over the past year, due in part to the steep cost of several data breaches they experienced in just one years’ time.

TalkTalk claims for FY16, pre-tax profits stand at roughly £14m; a significant decrease from £32m back in 2015. This is due in part to the firms 42m bill associated with covering incident response, external consulting, and increasing call volumes during the October 2015 breach, exposing four percent of its customers' data after a simple SQLi attack.

Even worse, TalkTalk claims that customer churn in FY16 is the lowest is has ever been, which could be because of the UK ISP’s stance on customers wanting to leave after the breach in October. In order for customers to leave their agreement with TalkTalk without paying a pricey leaving fee, customers were required to prove that money had been stolen from their bank accounts because of the incident. Needless to say, this bullish stance was not seen favorably among TalkTalk customers.

This nightmare should be seen as an unsettling wake-up call for organizations that are currently not taking cyber security as seriously as they should. Instead of thinking, “So glad that wasn’t us”, let’s begin thinking, “Wow, what if that was us? Would we be prepared to deal with this? Are we as prepared as possible for an intruder to hack into our systems?” By taking a proactive approach to information security,

NNT’s CTO- Mark Kedgley, claims, “Having a proactive attitude towards cyber defense is a proven asset in identifying before significant and lasting damage occurs. Little wonder that this is precisely what the underwriters want to see too- evidence of compliance with security best practices: manage vulnerabilities and maintain system integrity through change control.

All organization regardless of size need to understand the severe consequences associated with suffering from a cyber-attack. The financial losses and diminishing customer base coupled with reputational damage is a difficult hole to dig your organization out of, and in doing so, be prepared to spend millions of dollars along the way. A stringent set of cyber security controls in order to harden the data system would act as both a deterrent to attacks and protection to valuable systems and information.


 Read this article on InfoSecurity Magazine




The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.