{"id":701,"date":"2005-09-23T00:00:00","date_gmt":"2005-09-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/23\/report-security-slip-ups-dont-ding-stock-prices-for-long\/"},"modified":"2021-12-30T11:37:59","modified_gmt":"2021-12-30T11:37:59","slug":"report-security-slip-ups-dont-ding-stock-prices-for-long","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/23\/report-security-slip-ups-dont-ding-stock-prices-for-long\/","title":{"rendered":"Report: Security Slip-Ups Don&#8217;t Ding Stock Prices For Long"},"content":{"rendered":"<p>Most major security blunders don&#8217;t affect the company&#8217;s stock price for long, a researcher reported this week.  In fact, investors may be able to use the rebound to make money.  Kenneth Belva, who runs a security consulting company on the side and is an information security officer for Credit Industriel et Commercial in New York during the day, analyzed several prominent data breaches in 2004 and 2005 by comparing the negative press of the incident with the movement of the firm&#8217;s stock price.  &#8220;Why is it the case that information security incidents do not appear to have a greater impact on both investor confidence as well as the public at large?&#8221; asked Belva this week as he presented his research at the FiTech Summit on Long Island, N.Y. &#8220;If 40 million customer credit card numbers are exposed in a security breach at the credit card processor CardSystems, why do a significant number people not cancel their Visa and\/or Mastercard?&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To answer those questions, Belva charted stock prices before and after data losses at the likes of Polo Ralph Lauren, UPS, Choicepoint, Bank of America, and Citigroup; took into account other news during those time spans that likely affected the price; and also looked at the long range trends in each company&#8217;s stock.<\/p>\n<p>&#8220;[Stock prices are] the only publicly visible measure of confidence in a corporate institution,&#8221; said Belva.  Most security problems don&#8217;t effect the company&#8217;s stock price.  Although prices may dip temporarily on bad news of a data breach, the price rebounds quickly.  If Citigroup and UPS lost 3.9 million customer records every week and Bank of America&#8217;s employees were found to consistently sell customer information illegally, we would most likely change our minds about where we do business,&#8221; said Belva in his paper.<\/p>\n<p>In the Citigroup\/UPS incident, in which the latter lost a shipment of tapes containing nearly 4 million current and former accounts, Belva found that Citigroup&#8217;s stock price fell a puny .02 percent the day the financial firm put out a press release on the lost tapes, but that the stock actually rose 0.27 percent when the story made the media four days later.<\/p>\n<p>UPS&#8217; stock, meanwhile, climbed 0.22 percent the day after the story made the rounds.<\/p>\n<p>Only when a data loss impacts the core business of a company &#8212; such as when Choicepoint admitted to selling data to fraudsters, or when third-party credit card processor CardSystems was hacked, resulting in the exposure of nearly 40 million cards &#8212; does the stock, and thus the company, take a hammering, Belva said.  In Choicepoint&#8217;s case, its stock price fell 3.1 percent on the day the breach was reported, and then continued to fall.  <\/p>\n<p>&#8220;Based on the known cases, there is a good chance that the stock will decline in the short term and rebound soon after.  In effect, it may be possible to make money off the publicly reported breach.<\/p>\n<p>http:\/\/www.techweb.com\/wire\/security\/171200329<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-701","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=701"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/701\/revisions"}],"predecessor-version":[{"id":3188,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/701\/revisions\/3188"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}