Cybersecurity risk management is a fundamental business technique that requires an investment of both time and technology.
Believing you are protected against cyberattacks or worse believing it won’t happen to you because of the nature of your business or size, is a foolish mentality. Anyone or more specifically, anything connected to the internet is at risk of a cyberattack 100% of the time.
When it comes to cybersecurity, there are often two sides to the spectrum. Large, high-profile enterprises believe they are protected enough and beach-ready with solid business continuity plans in place, but on the other side small organizations tend to believe that their size makes them not a valuable enough target for cyberattacks and no one with nefarious intentions will hack their systems. It may be true that it is harder for small to medium enterprises (SMEs) to conceptualize that all data has value to someone or the exercise of hacking a vulnerability on a small system is good practice.
A simple search for “massive data breaches” returns an interesting list of hits – go ahead and search for yourself. The first hit is from CSO online, “The 17 biggest data breaches of the 21st century.” Spoiler alert!: the list is topped by Yahoo, with a data breach that resulted in all 3 billion user accounts being compromised, which enabled Verizon to save $350 million on the purchase of Yahoo. The large companies that fill out the rest of this list are familiar to most people reading this and the next time the news cycle reports a new cyberattack this will render cybersecurity as a prominent (but brief) topic of discussion at the office.
With each new cyber event we learn the cyberattacks are attributable to evolved tactics of increasingly smart hackers. But is that the primary cause of the problem? After the investigations are complete, nearly all of the major events can be directly blamed on the lack of efficient policies, practices and protocols on the part of the affected organizations (with exceptions like Heartbleed).
Key findings from Verizon’s 2018 Data Breach Investigations Report (DBIR) showcase that 58 percent of data breach victims are small businesses. It highlights that although small businesses do not receive the same attention like their big counterparts, they are equally in line for criminals who are ready to hit them just as hard. The DBIR cites that there over 53,000 cyber incidents this year, including 2,216 confirmed data breaches.
According to the DBIR, the top five industries suffering the most breaches are: healthcare; accommodation; public administration; retail; and finance. While 62 percent of external data breaches stemmed from organized crime groups; 25.9 percent of internal data breaches were caused by system admins; and 19.6 percent of the breaches targeted databases, making them the top targeted enterprise asset. The three most common types of data compromised were: Personally identifiable information (PII) – 36 percent of breaches; payment card info – 34 percent of breaches; and banking info – 13 percent of breaches.
In such a scenario, every organization should consider itself a potential victim, irrespective of size and industry. Therefore, it is imperative that organizations take efficient measures to preserve cybersecurity.
To clarify, we believe there is a difference between cybersecurity and information security and you can read about it here. for the purpose of this article we want to focus on cybersecurity, because the term is a hot buzz word in business today.
Malware is malicious software that is intended to disable or damage computers. By employing worms and viruses, hackers can easily access your personal information once infected.
The use of malware from January 2018 – June 2018 has outpaced the first half of last year by 102%. In fact, there have been 5.99 billion reported malware attacks from January through June alone. Plus, over 12,000 new malware variants have been discovered in that same time span.
Ransomware is a type of malware that encrypts your files and demands a ransom to unlock them. There has been an astounding 229% increase in ransomware attacks in the first six months of 2018 (compared to 2017). The dramatic increase combined with new ransomware variants is a great incentive to keep your network secure.
Encryption is the process of converting data into scrambled code. It is meant to allow authorized personnel to view data and can be applied to files or information transferred over the internet.
Most known websites are encrypted through TLS or SSL connections, but bad actors have found ways to get around these security measures. That is, hackers use encryption to bypass security precautions on computers. This form of hacking has become widely popular and has increased by 275% in the first half of 2018. That’s 1.4 million encrypted cyberattacks in just six months. Comparatively, the first six months of 2017 only had 509,000 recorded attacks. This has set a record high that is quickly drawing concern.
A newer form of computer hacking, cryptojacking, is when a bad actor breaks into a computer network, infects it with malware, then uses the computing power of the network to illegally mine for cryptocurrency.
Statistics show that cryptojacking is quickly becoming common within the dark web. In fact, Q1 of 2018 showed that compared to the previous quarter, there has been a 629% rise in coinmining malware. Furthermore, in June of 2018, a cybersecurity team discovered over 40,000 devices infected by malware as part of a cryptomining scam. These devices were spread across industries such as finance, education, and government. The good news is, cryptojacking doesn’t steal data, just computing power. But an attack will slow down your processing speeds and permanently wear down your battery; subsequently affecting the lifetime of your device.
Here are few essential tactics enterprises can employ to limit the likelihood of a cyberattack:
Companies, big or small, must realize that the first step is to acknowledge the existing cybersecurity risks that expose the organization to malicious hackers. A single successful attack could seriously damage your business and cause financial burden for you and your customers, as well as affect your business’s reputation. No matter the size of your customer information database, they are a treasure for hackers. Therefore, it is important that you keep it safe. Aside from being a huge blow to your organization’s reputation, there will be legal and financial consequences as GDPR has taken effect.
You have policies and processes in place that outlines what is the accepted standard when accessing the technology. However, it is of paramount importance to keep revisiting the policies and practices to access the immediate and future relevance. Re-examination and revision of protocols helps your organization stay up-to-date to challenge the innovative ways hackers employ to steal data.
The defense framework you have put up is only as effective or weak as the protocol following consistency of your workforce. Therefore, companies must arrange orientation and refresher training of staff on cyber security measures. The training program must also include insights on the dynamic risk environment, the risks involved and potential consequences due to non-participation in security practices. Employee participation in your organization should reflect that the aspect security is weaved into the culture of your organization.
In view of the increased threat landscape, organizations globally are likely to invest more than $95 billion, estimated Gartner. Sadly though, much of the spending will likely be reactive rather than on implementation of prevention-focused measures, leaving them vulnerable to breaches. So the need of the hour is to invest in all-encompassing cybersecurity risk management software. Also, it is important to note that protecting your organization doesn’t take a huge investment; what’s required is the selection of most robust and comprehensive solutions at an affordable cost for any organization. Choosing a technology partner who understands business priorities and helps in aligning risk and strategy will act as a valuable contributor to achieving objectives, in terms of technology risk and specific vulnerabilities.