Cybersecurity – The #1 Risk Business Leaders Can’t Afford to Ignore

The risk of cybercrime to businesses of all sizes is very real, with significant costs, and can no longer be ignored. Planning ahead is essential to ensuring business continuity. Cybersecurity Ventures, a leading researcher and online resource for the global cyber economy projects global cybercrime costs to increase by 15% per year, reaching $10.5 trillion annually by 2025. And according to global cybersecurity leader Trend Micro Inc., in their Cyber Risk Index Report, an annual survey of 2,800 IT managers and practitioners from the US, Europe, and Asia/Pacific, 26% of global corporations fell victim to 7 or more cyberattacks in the past year, and over 80% of these expect such attacks to be “somewhat” or “very likely” to succeed.

Coronavirus Drives Pivot in Cybersecurity Response

Since COVID-19, the demand for enhanced cybersecurity across industries has increased exponentially, with specific needs to address the new realities of a world in pandemic mode. As companies shut down and employees worked from home in unprecedented numbers, chief information security officers (CISO’s) had to create secure connections for this extensive new remote workforce. Also, the surge in online commerce required significant systems upgrades. CISO’s had to reallocate budgets to cover COVID-related costs, putting planned security improvements on hold and possibly exacerbating already identified risks and existing threats.

Identifying Vulnerabilities, Understanding Consequences Essential to Cyber Defense

The first step in defending against cybercrime is understanding risks and identifying where your systems are susceptible. According to Trend Micro’s Cyber Risk Index, top cyber threats include:  

  • Ransomware (malware that cryptically blocks access unless a ransom is paid)
  • Social engineering/phishing (techniques to trick people into providing personal data)
  • Clickjacking (concealed hyperlinks trick people into unintended actions revealing personal data and allowing control of one’s computer)
  • Fileless attacks (tools built into software that allow attack and leave no code, file, or traceable footprint)
  • Botnets (unsuspecting network of computers infected by malware and controlled by a hacker)
  • Man-in-the-middle attacks (attacker intercepts communications between users, able to “eavesdrop” or alter the communications)

Certain situations present particular vulnerabilities: In automated buildings, every system and device are unique yet connected, each with its own unique cyber risks; and connected devices are easy to infiltrate. Healthcare facilities are high-value targets, with hackers launching constant attacks; medical records are “best sellers”, fetching up to $1,000 per record on the dark web (Forbes.com 1/8/2021).

When developing a cyber defense plan, organizations should also consider potential problems, which could include:

  • Loss of confidential employee and customer data
  • Access to intellectual property and financial information
  • Customer churn/loss of existing customers
  • Interruption of operations
  • Damage to critical infrastructure
  • Stolen or damaged equipment

Ransomware Makes for Expensive Holidays

Ransomware, the most common form of cybercrime, is expensive. It encrypts files, locks out users, potentially corrupts data, and can cost companies millions in ransom payouts. Attacks have tripled since 2013 (Economist.com 6/19/2021).

Companies should be particularly vigilant during holidays, when IT staff is reduced, systems are more vulnerable, and protective responses delayed (Fortune.com 7/6/2021). The recent Kaseya hack occurred over the July 4th weekend, affecting nearly 1,500 businesses, and last year’s SolarWinds hack occurred just before Christmas, attacking over 100 private companies, think tanks, and branches of the US military.

Employee Training and Cybersecurity Policy

An essential component of a good cybersecurity plan is an up-to-date, readily available cybersecurity policy. All employees, from entry level to the C-suite, should understand the policy and be trained to recognize and avoid security risks. Mitch Berger, Managing Partner of IMSA Search Global Partners USA and IMSA Board Member, relates, “Many of our clients in the C-suite and HR departments have told us that cybersecurity is now a prominent part of employee onboarding, with hands-on training about online information sharing, passwords and security questions, two-factor authentication for account access, and what to look for in emails and other communications which would signal a cyber threat.”

Prevention is the Best Policy

The effects of any cyberattack can be catastrophic, resulting in business disruption, harm to company or brand image, customer loss, data theft, and in some rare cases, loss of life. The costs can be catastrophic as well. Experts recommend companies get ahead of the problem, addressing vulnerabilities before cyberattacks occur, by implementing the following preventive measures:

  • Identify and assess risk areas across applications, devices, and people
  • Implement the ability to automate responses to abnormal activity
  • Adapt systems to remotely resolve issues
  • Create policies and action plans for quick and effective response in the face of an attack
  • Empower CISO’s with appropriate budgetary and human resources to provide proper planning, training, and continual monitoring and upgrading of systems

In today’s business environment, where online and digital are the way business gets done, cybersecurity is a top priority. And in the words of Benjamin Franklin, “An ounce of prevention is worth a pound of cure.”