Four Steps To Managing Cyber Security Better

Around the world 2016 was a somewhat successful year for attackers and consequently a challenging year for defenders.

Organisations around the world are now more aware of the risks and know they must take deliberate steps to address the threats. But how?

While high-profile breaches are not new news, the growing list of victims including Yahoo, Wendy's, the University of Central Florida and the Bangladesh Bank illustrate the continuing threat of cyber-attacks, 2016 demonstrated that the threats are ongoing and can target every type of organisation in every industry. No sector or group is immune.

Here are four approaches that companies can embark on immediately to more effectively mitigate risks and respond to the threats that they face:

1.    Double down on the basics.

Many organisations insufficiently invest in and execute on the fundamentals or “the basics” of cyber-security, identifying the assets that they need to protect and ensuring that the most recent patches and updates have been applied shortly after vulnerabilities are announced.

Each organisation needs to answer some basic questions: What is our strategy? Who owns the responsibility? What is their specific process and plan? Without a clear framework, dedicated resources and accountability, problems are inevitable.

In 2017, every organisation should commit to a strategy and adopt a cybersecurity framework to help them more effectively understand their current level of maturity and what the desired state should be. 

A framework should help an organisation identify key assets, how those assets are going to be protected and monitored, and how they would respond and recover should a breach occur. The NIST Cybersecurity Framework (CSF) is one option that is gaining momentum and adoption, as it is designed to be within reach of any organisation regardless of their current level of cyber-security maturity.

2.    Watch and secure the supply chain.

One of the fastest growing trends in recent breaches is for attackers to gain access to their victim’s sensitive data through unsuspecting third parties. 

For example, the intrusion into the US Office of Personnel Management in 2015 that resulted in the compromise of personal information on approximately 21.5 million people began in the network of a third-party OPM contractor.

While companies need to build and execute on their own internal security programs, they cannot neglect the “extended enterprise” composed of all of the of third parties, law firms, payroll agencies, marketing firms, etc. with whom they share sensitive data or privileged relationships that can be exploited.

The growth of outsourcing and online services has blurred or completely dissolved the boundary of the traditional network. The day has arrived where it is no longer sufficient for organisations to protect themselves. They also have to actively monitor and manage the security risks of those with whom they do business.

It is important to keep in mind that the management of third party risk is increasingly becoming part of new regulations and it is certainly necessary to check with your government information concerning the cyber regulations and requirements. 

3.    Invest in employee training.

It is almost a cliché now that when a breach is announced, the company states that the attack originated from an inbound malicious email or phishing attempt. An employee opened an email from an attacker and either downloaded a malicious attachment or was tricked into revealing sensitive system passwords.

For example, Snapchat revealed in February “with real remorse and embarrassment” that attackers obtained confidential data about 700 current and former employees by tricking an employee into opening an email that impersonated the CEO and clicking on a link that installed malware.

It has been widely reported that John Podesta, Clinton campaign chief, fell victim to a phishing scheme, a fake “account reset” email purporting to be from Google.

Technical controls should be put in place to neutralise some of these attacks (such as multi-factor authentication against password theft); however, technical controls are not sufficient. 

Organisations need to educate employees on the risks and how to respond. Humans make mistakes and will click on links and fall victim to attacks. A combination of technical controls and trained employees may be able to more rapidly identify issues and respond in order to limit the damage.

Employees should learn about potential threats and how to report suspicious activity within the company. Additionally, organisations need to make sure they have a detection and recovery plan in place for when, despite the training, the mistakes happen.

4.    Track metrics and work as a team.

Effectively mitigating against cyber risks requires a collective effort. The responsibility cannot simply fall on a single individual or group.

Having established a framework, organisations should set and track benchmarks to help them assess the effectiveness of their own efforts as well as of their critical third parties. Corporate risk and information security teams should be actively involved in developing and tracking performance metrics.

Cyber-security also should be a high-priority matter at the board level. Senior leaders should actively engage the board in discussing the strategy, the initiatives and the company’s progress and performance over time against its objectives. Performance and key benchmarks should be a regular item on board meeting agendas.

Given the risks and its fiduciary responsibility, the board must understand the need for and then support the development and maintenance of a robust cybersecurity program.

Boards cannot abdicate this responsibility or simply assume that senior management is taking care of everything. History has taught us that the reputational damage and financial impact associated with failing to execute is high.

The threats will continue unabated in 2017 and defenders will continue to be challenged. Organisations will be much better positioned by taking these steps in the year ahead.

Information Management

Directors Report January 2017. Cyber Security Checklist For Management (£):

Are Employees Your Weakest Link When It Comes To Security?:

Board-level Cyber Literacy Is Low, Discomfort High:

Cybersecurity Breaches Cost UK Businesses Close To £30bn Last Year:

 

 

« Geolocation, Russian Hackers & False Flag Operations
Google Lawsuit Could Be Fatal For Uber »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Delphix

Delphix

Delphix is the industry leader for DevOps test data management.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

DomainTools

DomainTools

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

ACPL Systems

ACPL Systems

We offer leading-edge technology solutions, expert professional and managed services and proven methodologies to ensure your data is protected and business risks are reduced.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber Resilience Centre (WMCRC)

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Cydea

Cydea

Cydea are an optimistic cyber security consultancy of experts in security, data, technology and design that want to build a safer, more secure world where more things go right.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

Airbus Protect

Airbus Protect

Airbus Protect is an Airbus subsidiary bringing together the Company’s expertise in cybersecurity, safety and sustainability-related services.