How to Combat Common Information & Collaboration Security Threats

According to the World Economic Forum, cyber attacks are perceived as the number two global risk of concern to business leaders in advanced economies. This is second only to fiscal crises. Forbes reports that 17.2 billion records have been lost in the fifty largest data breaches between 2004 and 2021 - including a huge data breach for LinkedIn in 2021. 

The news is full of reports of these InfoSec attacks - whether phishing; stolen credentials; access because of unpatched or misconfigured software or social engineering attacks in which individuals are targeted within an organisation.

The British National Cyber Security Centre, however, singled out Ransomware as “the most significant cyber threat facing the UK” in 2021. CEO Lindy Cameron wrote: “...it was assessed as potentially harmful as state-sponsored espionage.” Indeed, ransomware was one of the topics tackled at the G7 Summit in 2021. 

This year, the annual review will no doubt add another few threats; and more countries and groups will appear on the list of prevalent threat actors, not least because the world continues to become more and more ideologically polarised.

State-level actors - from Russia, China, Iran and North Korea amongst other countries - have become stronger and are being protected

IBM’s Cost of a Data Breach report stated that the average cost of a data breach globally reached an all-time high of $4.35 million in 2022. While this figure is staggering by itself, what is also notable is that this is a 2.6 percent increase from 2021. Financial gain is definitely a motivation but there are also the hackers who cause disruption just for fun with no monetary motivation. 

Every single business is a target and InfoSec attacks are only going to become more subtle and more frequent. The very building blocks of encryption could be smashed down by quantum computing, warned The Economist and that was in 2018. 

This article reads like a declaration of doom, but it is actually a call to arms. Companies can protect themselves, but they need to invest heavily in talent, knowledge and expertise in cybersecurity. There is a scramble for cybersecurity experts as demand surges with students getting snapped up even before they have completed their degrees. In a climate in which businesses are terrified about the economic future, investing in cyber security is essential to protect themselves from losing vast amounts of money, if not everything, in just seconds. 

A clear place to start is to accept cybersecurity is not just as protection but as a business enabler.

A shift in mentality is required. A Cisco report stated that thirty-one percent of the survey’s 1014 respondents, who were senior finance and line-of-business executives, believed that the primary purpose of cybersecurity is growth enablement. However, sixty-nine percent still saw its main purpose as risk reduction. This view of cybersecurity - that and time-consuming and ineffectual tools - stymies creativity. In the same report, it states: “...A stunning 71 percent of executives said that concerns over cybersecurity are impeding innovation in their organisations. Thirty-nine percent stated that they had halted mission-critical initiatives due to cybersecurity issues.” 

On top of this, the time lost to rectifying the issues caused by an attack is also a business inhibitor. For some organisations providing critical and emergency responses, like the NHS, which was attacked in August, it can even be life-threatening. 

Then there is the impact of an attack on customer confidence. A major breach can damage brand reputation and customer retention as well as operations and finances. By deploying a steadfast cybersecurity plan and showing it is incorporated within your business’ governance, you are showing clients that you take cybersecurity seriously. Understanding this, and all of the other potential economic drivers and business impacts, will help you formulate a plan. This must include educating employees on cybersecurity to reduce human error and employing best practices instead of inventing your own methods and processes.

Ultimately though deploying simple, frictionless, and easy to use cybersecurity tools is going to be the quickest and most effective driver of change. This will motivate behavioural change, build confidence - both in your staff and clients - and boost instead of impede productivity. The InfoSec attacks may be becoming more targeted and frequent; but a simple, robust solution will prevail. 

Onur Özen is Chief Executive Officer of RealTyme

You Might Also Read: 

Building a Threat-Ready Ransomware Response Plan:

 

« Cyber Security Predictions For 2023
Simplicity In Complexity: The Key to Successful Threat Exposure Management »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

ICTSecurity Portal

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

Forgepoint Capital

Forgepoint Capital

ForgePoint Capital is a premier venture investor for early stage cybersecurity companies.

VariQ

VariQ

VariQ is a premier provider of Cybersecurity, Software Development and Cloud services to federal, state, and local government.

Anvilogic

Anvilogic

Anvilogic provides a unifying experience for security professionals aimed at providing improved visibility, enrichment, and context across hundreds of alerting datasets and security tools.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

Riskonnect

Riskonnect

Riskonnect technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic, operational, and digital risks across the extended enterprise.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

SeeMetrics

SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Maltego Technologies

Maltego Technologies

Maltego is a comprehensive tool for graphical link analyses that offers real-time data mining and information gathering. Applications include cybersecurity threat intelligence and incident response.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.