When the first skyscrapers were built, they had between 10 and 20 floors. Today, skyscrapers have over 100 floors and are thousands of feet tall. Though many engineering and technological advances have contributed to this progress, modern reinforced concrete frameworks are most critical to the strength and stability of these superstructures, fortifying them against strong winds and earthquakes.
Similarly, the information technology systems and networks that support our society's infrastructure require solid frameworks to ensure their security and stability. This infrastructure, from government services to utilities to privately held companies, relies increasingly on such systems and networks. If not secured, these systems could be targeted by hackers and suffer devastating consequences.
To secure and protect your assets, electronic or otherwise, you must address three general areas of cybersecurity: prevention, detection and response. Yet, in spite of the fact that data breaches are an increasing threat to the viability of businesses, most do not have a cybersecurity plan in place and are not prepared to handle the costs and consequences associated with a data breach.
It’s not a matter of if, but when a cyber incident will occur. Here’s what you need to know to weather the storm.
Why perform a cybersecurity risk assessment?
The key to prevention is understanding your risks and matching the appropriate prevention tactics to each. Otherwise, you won’t know what you’re protecting and why, and your strategy may not meet the need. You must:
The results of this assessment will be different for each organization, as will the solutions.
An assessment is particularly important if there are defined requirements or regulations for the information you’re protecting. If you don’t have the right safeguards in place, you could face higher fines and penalties in the event of a breach.
Detection of Cybersecurity Incidents
Preventing all attempted security breaches is impossible. To defend against future attacks, you must implement a strategy to monitor your network and detect those attempts as early as possible. Most incidents begin with events that appear on system and network logs. If you can identify events from technical sources and reports that pose threats to your security and operations, you can then determine what, if anything, needs to be done to prevent a full security breach.
Monitoring and assessing the network, logs and reports should be a regular and ongoing task. And you must implement a technical strategy for detection that includes everyone in your organization. Establish regular training for cybersecurity awareness, deploy malicious code detection to your entire network, harden your network environment against vulnerabilities, and use firewalls to block unauthorized activity on your network.
Here's what you should be looking for when it comes to cybersecurity risk.
Response to Cybersecurity Incidents
Developing an incident response plan can be compared to running a strategy game. You want to position the right people in the right places for the best outcomes should an issue arise. Such planning is not just for expansive and complex companies. Cyber incidents happen to companies of all sizes and incident response is relevant to every business. The same technology that continues to revolutionize industries can easily cripple any organization. In fact, there’s a chance your company has had a data breach within the last year.
To navigate an incident safely and successfully, you must establish an incident response plan for key personnel to follow in the event of a breach or attack. For this plan, you should:
What are the key roles on an incident response team?
Each person on your incident response team will have a role to play in keeping everything organized and under control during a data breach. In terms of strategy, each member should have a specific responsibility in getting the company through the response. There are four primary roles to assign, though larger incidents could require more complex combinations of skills. These individuals make up the backbone for any incident response plan:
The Veterans: When it comes to incident response, IT professionals are the champions of their company’s security. When an end-user finds a potential cybersecurity threat, the IT professional confirms the threat based on the incident response plan. They then work to mitigate the incident. They must also practice restraint, as mishandling information during an incident could leave the company responsible and liable for spoliation of data.
The Investigators: After several cybersecurity incidents, you’ll want assistance from a third-party forensic team, who can provide extensive expertise, tools and resources you may not have available within your company. You may also need a third-party forensic team to conduct an impartial review or report for insurance reasons.
The Internal Lead: It is important to have a person in charge of controlling the dissemination of information throughout the company. This role is typically filled by either the Chief Security Officer or head of Public Relations. They will maintain and report information and results to the company as needed. Other team members will defer to the internal lead for guidance and authority. Ideally, this person should have some technological experience or insight into the company’s technical makeup. And they should rank high enough to deter suspicion over delegating orders or taking possession of devices. However, keep in mind that an effective security defense requires a solution operating 24/7. According to an analysis conducted by Arctic Wolf, 35% of cyber threats appear after typical office hours.
The Legal Representative: The company attorney or legal representative will manage public and private perception of the company and ensure that there are no legal repercussions when the incident is resolved. They organize a plan based on the information to best help the company and they give insight into legal nuances of incident response, such as when to reveal your cards and when to call an investigation to a close. This role is especially critical if your company is dealing with protected information beholden to regulatory bodies.
As you can see, each member of the team has a specific and vital responsibility. Going through any incident without a complete team could end up costing more money and bringing confusion and unnecessary stress to an already precarious security situation.
Potential Consequences of Being Unprepared
Investigation Expenses and Litigation
Every business maintains proprietary data in the form of customer lists, trade secrets and Personally Identifiable Information, or “PII,” which is protected by law. In the event of a data breach, you’ll have to factor in the initial expense incurred by investigating the breach, as well as costs associated with potential litigation. If you understand your cyber risk ahead of time, however, you can be prepared to make efficient and effective decisions should malicious activity occur.
While it’s important to keep up with new regulations around handling personal and confidential information, the regulations aren’t designed to protect your business and operations. Ultimately, it’s an organization-wide issue and the responsibility falls to owners, executives and board members. By taking a holistic approach to cybersecurity management, you can reduce weakness in your cybersecurity defenses.
Here are a few tips for developing a defensible process:
Infrastructure Vulnerability and Chaos
Beyond data security, a breach at your company could have disastrous consequences if hackers got a hold of key operations – especially physical infrastructure operations. In March of 2016, a group of foreign nationals were charged with hacking attacks on a dam in Westchester County, N.Y. They were able to perpetrate the attacks by installing malware on computers around the world and then using those tools remotely to launch cyber assaults. They never took control of the dam or caused disruptions. They instead examined its operating system to determine its defenses against cyberattacks. A follow-up investigation determined that, in theory, the hackers could have caused flooding and created chaos by hacking into the dam’s control system.
Industry-Specific Consequences
Though many cybersecurity risks are common among industries, certain sectors will face varying consequences due to the nature of their data and/or condition of their systems. For instance:
Higher Education: There are strict regulations for handling and protecting personal information retained through the financial aid system. The responsibility falls to several parties, including institutions and third-party services. Compliance is audited and, if a risk is identified, consequences range from disabled access to information systems to fines and other actions deemed appropriate by the Department of Education.
Automotive Sales: Auto dealerships collect a significant amount of consumer information and are prime targets for hackers. Common cyber incidents for this industry include breaching Wi-Fi networks, phishing scams, fraud and installing malware via email. One of the biggest consequences of such activity is reputation damage. Nearly 84% of consumers would not buy another car from a dealership that had a security breach.
Manufacturing: A recent study found that nearly 40 percent of manufacturers don’t have a cybersecurity plan, and it’s also true that many manufacturers operate using outdated technology. These conditions increase their vulnerability to cyberattacks. Plus, manufacturing is an industry that has to protect a special type of data: intellectual property. Trade secrets and build lists set companies apart and drive brands and could be stolen or held for ransom.
The Importance of Implementing a Cybersecurity Plan
Cyber threats and cyberattacks have increased dramatically over the past decade. These attacks have exposed sensitive personal and business information, disrupted the critical operations of organizations and imposed high costs on the economy and businesses. It is imperative you stay informed about the continuously changing forms of cyber threats and develop appropriate, cost-effective controls to safeguard your business from data breaches.
On average, it will take 277 days to identify and contain a cyber threat. Are you prepared to wait that long?
Schedule a consultation.
Stay current on your favorite topics
Learn More
See what more we can bring to organizations just like yours.
Construction & Real Estate Healthcare Critical Access Hospitals Health Systems Medical Practices Senior Living Dealerships