One in 7 information technology companies have not reported data breaches or losses to outside government agencies, authorities or stockholders. One in 7 information technology companies have not reported data breaches or losses to outside government agencies, authorities or stockholders.In addition, only 3 out of 10 said they report all data breaches and losses suffered related to intellectual property, while 1 in 10 organizations will only report data breaches and losses that they are legally obliged to report, and no more. Six in 10 said they currently “pick and choose” the breaches and losses of sensitive data they decide to report, “depending on how they feel about them.”MORE ON DATA BREACHES: The Ponemon Institute’s data-breach calculatorThose were some of the key findings from a McAfee and Science Applications International Corp. (SAIC) survey that queried 1,000 technology managers in the U.S., United Kingdom, Japan, China, India, Brazil and the Middle East on questions about intellectual property and security. The report, entitled “Underground Economies: Intellectual Capital and Sensitive Corporate Data Now the Latest Cybercrime Currency,” said the main reasons for not disclosing data breaches are fear of media coverage, damage to the brand and shareholder value. “The admission of a significant vulnerability could flag other attackers so very few companies are willing to be public about intellectual capital losses,” the report says (see “‘Political’ cyberattacks hit half of large companies“). John Dasher, senior director of data protection at McAfee, said that “losing some of your crown jewels” would in theory be considered a matter that should be disclosed to shareholders as important information of material interest or for other legal reasons. “But most of them aren’t reporting,” says Scott Aken, vice president for cyberoperations at SAIC, who called the survey results surprising. Another finding of the survey, that about 25% of the organizations “had a merger or acquisition or product rollout stopped by a data breach,” was also a surprise to Aken. “Sometimes companies don’t know they had a data breach and only find out months later,” he said. It disrupts operations.The report also says the economic recession has impacted how organizations are looking at where they store sensitive data such as intellectual property, proprietary information and trade secrets.“More than half of organizations studied are reassessing the risks of processing data outside of their home country due to the economic downturn, compared to 4 in 10 in 2008,” the report states. Countries that have “leniency in privacy and notification laws” are attractive to organizations. But 9 out of 10 organizations that store sensitive information abroad do view some countries as safer than others. China, Russia and Pakistan were considered the least safe, while the U.K., Germany and the U.S. were seen as the safest.The McAfee/SAIC report argues that the target of cybercriminals is shifting from stealing things like credit cards and Social Security numbers to sensitive and proprietary content that can be sold on the underground market to foreign competitors or governments (see “‘Night Dragon’ attacks from China strike energy companies“).Read more about wide area network in Network World’s Wide Area Network section. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe