Boards Need To Step Up Or Risk Cybersecurity Fines

Protecting companies against the threat of cyber attacks used to be something that the IT department would be tasked with. Leaving tech to the tech experts seemed to make perfect sense. So long as the Board had appointed the right people for their job, many Board members felt their work was done, aside perhaps from hearing the occasional update from the IT department manager. 

What would be the point of interfering in matters that may be outside of their areas of expertise, after all? Let tech deal with tech, to free the Board up for more pressing matters.

The Daily Threat Of Cyber Attacks

But now, cyber attacks are not distant threats that happen to other organisations; they’re a daily reality, and no company is safe, regardless of their industry or size. A survey by the UK Government revealed that in 2022, 39% of UK businesses identified a cyber-attack. Out of the organisations who had reported attacks, 31% of businesses and 26% of charities estimated they were attacked at least once a week.

Fines - Insult To Injury Or Just Desserts?

On top of the sheer number of attacks, the costs to businesses can be staggering.  According to CISCO, data breaches are likely to cost, on average, 20% of a company’s turnover. There is also the high likelihood of businesses being hit with a substantial fine. Insult to injury? Perhaps, but when a Board has failed to take adequate preventative measures to safeguard their customer data, a fine may be viewed as appropriate punishment. A vital lesson in standing up and taking responsibility.

What Can The Board Do? 

If the recent £4.4m fine imposed on Interserve by the ICO has taught companies anything, it should be that understanding cybersecurity risks and investing in all the right technology is simply not enough to protect themselves from receiving a hefty fine. 

Like many firms, Interserve wasn’t ignorant to the real threat of an attack, nor was it reluctant to put the right tech in place. Where they failed was monitoring that tech and taking action when suspicious activity was flagged. They fell at the final hurdle and that cost them - big time.

Remaining resilient to the ever-evolving threats of cyber-attack requires a robust strategy driven by the Board that is constantly maintained and monitored. To put it simply, firms without watertight cyber resilience strategies are risking everything.

What is certain is that more eye-watering fines will continue to hit the headlines. 

There is a tendency for Boards to think that once they’ve invested in cybersecurity tech, they’ve done their job. This is a dangerous assumption. The vital part in a successful cyber strategy, which is still missing in all too many companies, is a security operations centre (SOC) service - experts who know how to monitor the tech, interpret the data and what to do when an alert is flagged.
 
Having all the tools but lacking a SOC service is only going halfway to protecting your organisation - which, in today’s cyber threat environment, isn’t nearly far enough. A SOC service provided by a trustworthy and reliable supplier means the difference between resilience and total vulnerability.”

Delivering Competitive Advantage

The Financial Times published the results of a survey by MIT Sloan and Proofpoint, a California cybersecurity company, which showed that Board members’ biggest fears on encountering a cyber attack, were data being made public, reputational damage and revenue loss

All these fears are well-founded, but what about the potentially devastating effects of being fined? Not to mention the cost of cyber insurance after a fine has been imposed. And then there’s losing out to competitors - many organisations are now refusing to work with partners who do not have a SOC service in place, as it means their data is vulnerable.

We have customers who came to us because they knew their cyber-attack resilience was weak and it was causing them to lose sleep. Having a SOC service in place gives Board members enormous reassurance that they’re doing everything they can to mitigate an attack - and can prove it if the ICO ever does come knocking.

Rob Demain is CEO & Founder of e2e-assure

You Might Also Read: 

How Do You Solve A Problem Like The Cyber Security Skills Gap?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« US Strategy Will Allow Hacking Criminal & Foreign Networks 
Choose the best web application firewall for you »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Pervade Software

Pervade Software

Pervade Software is a global provider of dedicated compliance tracking software with monitoring & reporting capabilities.

F-Secure

F-Secure

F-Secure defends enterprises and consumers against everything from opportunistic ransomware infections to advanced cyber attacks.

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

Astra

Astra

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

Netsparker

Netsparker

Netsparker provide a web application security scanner to automatically find security flaws in your websites, web applications and web services.

Milton Security Group

Milton Security Group

Milton Security develops products to provide security, visibility and control over your network to keep it Operational and Secure.

colCERT

colCERT

colCERT is the national Computer Emergency Response Team for Colombia.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

Commonwealth Cybercrime Initiative (CCI)

Commonwealth Cybercrime Initiative (CCI)

The CCI unites 35 international organisations contributing to multidisciplinary programmes in Commonwealth countries. These organisations form the CCI Consortium.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Pentest360

Pentest360

Pentest360 is a 24x7x365 Penetration testing service offered through a feature-rich, centralised platform on the cloud that delivers instant visibility during security assessments.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

Opus Security

Opus Security

Opus dramatically reduces cloud security risks by enabling teams to define, orchestrate, automate and measure remediation processes across the entire distributed organization.