In today’s complex digital landscape, the importance of configuration security a...
How Misconfigured Security Can End up Costing You
From compromised endpoints to disrupted workflows, misconfigurations are one of the leading causes of disruptions in complex IT environments. Their impact extends far beyond the technical realm — data breaches, downtime, regulatory fines, and lost customer trust can quickly turn a single oversight into a costly disaster.
In this article, we’ll explore the true cost of misconfigured security through real-world examples, clarifying the case for proactive management and how the right tools are integral to minimizing risks and safeguarding your organization.
Understanding Misconfigurations and Their Causes
Misconfigurations occur when systems, devices, or applications are set up or operated in ways that leave them susceptible to security threats. Unlike software bugs, these issues are not about design, but deployment – and they’re not defects as much as instances of dereliction. From default credentials to excessive permissions, unpatchable vulnerabilities to unnecessary ports and risky services, misconfigurations come in many forms.
Their diverse nature of misconfigurations adds to the complexity of detecting and correcting these issues. What is acceptable for one organization under one set of circumstances can be extremely problematic for another organization under different circumstances. And the fix will depend on the context, the business needs, and the operational dependencies. It’s for these reasons that configuration security is considered something of a moving target.
Why Do Misconfigurations Happen?
Misconfigurations arise for several reasons, reflecting the challenges of modern IT landscapes:
- Human Error: Missteps during setup or maintenance (due to oversight or lack of expertise) are among the most common contributing factors.
- The Complexity of IT Systems: Expanding cloud environments, hybrid infrastructures, and interconnected devices bring added intricacy, increasing the likelihood of errors.
- Evolving Environments: The popularity of remote work, cloud infrastructure, and distributed teams has complicated monitoring and security practices, further amplifying misconfiguration risks.
The Growing Problem
Misconfigurations are as costly as they are common. Studies have shown that 73% of organizations operate with severe misconfigurations that could expose sensitive data or systems. This prevalence comes with hefty consequences, as misconfigurations amount to annual revenue losses of some 9% in affected organizations. As operations scale and IT systems grow more complex, the frequency and severity of misconfigurations are only going to increase.
Endpoint security posture management remains vital to closing these critical gateways into larger systems.
The Financial Impact of Misconfigurations
Direct Costs
A leading driver of cybersecurity incidents, misconfigurations account for 35% of all cyberattacks. Attackers find misconfigured systems particularly appealing given their pervasiveness and ease of exploitation.
In 2023, the average cost of a data breach in the United States reached $9.36 million, with misconfigured security playing a significant role. Ransomware attacks tend to be among the most expensive and the most configuration-focused. In fact, it’s estimated that more than 80% of ransomware attacks are leveled via misconfiguration. And the costs go well beyond the ransom payments, including recovery expenses, legal fees, and regulatory fines - just to name the direct costs.
In heavily regulated industries, the resulting penalties can be steep:
- GDPR: Fines can reach up to €20 million or 4% of global annual turnover, whichever is higher.
- In 2020, for example, British Airways received a €20 million fine following a major misconfiguration-based data breach.
- HIPAA: Fines for improper handling of patient data average $1.5 million per violation.
- CCPA: Penalties range from $2,500 to $7,500 per violation, depending on severity.
The problem is that there are a million ways to misconfigure your devices and their services. And even minor configuration missteps can lead to substantial financial consequences. In 2021, Meta (then Facebook) experienced a significant global outage lasting approximately six hours, affecting all platforms, including Instagram, WhatsApp, and Messenger. The cause? Configuration changes on the backbone routers coordinating network traffic between data centers caused issues that interrupted their communication.
Compounding the problem, Facebook's Domain Name System (DNS) servers were designed to withdraw their Border Gateway Protocol (BGP) routes if they couldn't connect to the data centers, rendering Facebook's domains unreachable from the internet.
The six-hour outage resulted in a direct loss of over $60 million of revenue — a rate of $163,565 for every minute.
Indirect Costs
While somewhat harder to calculate, the indirect costs associated with a data breach are normally even more damning. In one way or another, most indirect losses revolve around damage to the organization’s reputation. Attacked businesses experience a significant erosion of customer trust and loyalty. Rebuilding trust is a slow and resource-intensive process — high-pressure sectors like healthcare have been observed to spend 64% more on advertising over two years post-breach. And those efforts aren’t always successful:
- Companies lose up to 20% of their customer base following security incidents.
- Over 57% of organizations are forced to increase prices post-breach,representing a potential deathblow for industries already struggling with severe inflation.
- 60% of small businesses close within six months of a major attack.
Dealing with Disruption
Misconfigurations are among the leading causes of unplanned downtime, with 23% of disruptions in 2023 attributed to configuration errors, according to a Databarracks report. These mistakes often go unnoticed until they trigger an outage.
In February 2017, Amazon Web Services (AWS) experienced a significant service disruption caused by human error in executing a maintenance command. An AWS engineer intended to remove a small number of servers supporting the S3 billing process but inadvertently executed a command that removed a larger set of servers than planned, leading to the shutdown of two critical subsystems.
Prominent companies like Slack, Trello, and Docker were caught up in the unexpected disruption. From delayed announcements to mobile banking, this complete halt was felt by enterprises and individual users alike. Cyence, a firm specializing in modeling the economic impact of cyber risks, estimated that S&P 500 companies lost approximately $150 million due to the four-hour AWS outage.
Proactive Misconfiguration Management
Regular audits are critical for identifying and addressing configuration issues stemming from system drift and improper settings. These audits should be scheduled routinely and conducted after significant events such as software updates or system expansions to ensure all devices remain aligned with security standards.
Continuous monitoring is another essential preventive tool; identifying issues as they arise makes it possible to take quick action. Of course, you’ll also need the right tools in place to empower quick, effective, and disruption-free remediation.
By prioritizing proactive strategies, organizations instill confidence across all levels. From Security personnel to IT teams and beyond, a proactive mindset supports business continuity, enhances compliance efforts, and fosters a tip-top culture that positions organizations to handle future challenges confidently.
Configuration security requires more than patchwork fixes carried out as issues happen to be encountered. It demands a systematic and proactive approach that integrates regular audits, continuous monitoring, and automation.
The best way to minimize exposure, ensure compliance, and maintain operational integrity is to invest in systems, processes, and technologies committed to prevention and hardening.
About Author
Eden Aizenkot
A Senior Marketing Manager at GYTPOL, Eden is a dedicated cyber communicator. With a keen eye for strategy, design, and branding, Eden drives growth through impactful campaigns education campaigns.
Subscribe to
our Newsletter
We are ready to help you until and unless you find the right ladder to success.
Related Posts
Join over 25,000 in beating the failure of strategies by following our blog.
Please join us as we take you on a journey through the looking glass and into th...
7 minute read
In evaluating endpoint posture and network integrity, configuration audits are e...
6 minute read
Endpoint configurations are essential to good security. That’s always been the c...
Comments