Cyber Attacks Should Be The #1 Concern For Business Leaders

Every business is at risk of a cyber attack and these attacks and data loss are the top risks facing business leaders, with COVID-19 and the forced change in working practices serving to increase concerns.

Cyber risk is a broad concept that encompasses all risks that arise from the use of technology and data, has recently undergone a surge in prominence. 

This is in part because of a number of high-profile cyber incidents that have placed the issue of cyber risk to the forefront of public attention.

Cyber attacks should be the number one concern for Board Directors according to new research from McGill and Partners, the specialist re-insurance broker. 81% of board directors surveyed by McGill and Partners and NEDonBoard, the professional body for non-executive directors and board members, identified cyber attacks as the biggest threat that their business currently faces.

The number of large-scale cyber attacks has grown in recent years, with several high-profile examples making headlines across the world just this year, from the Colonial Pipeline ransomware attack in May 2021 to the T-Mobile data breach in August.

Despite an apparent lack of board-level input, it is undeniable that cyber risk affects practically every business. According to a survey commissioned by the British government, nearly nine out of ten large organisations have suffered some form of cyber security breach.  The cost of a major cyber incident is likely to be significant. For example, studies have shown that the estimated average cost of a data breach in the UK financial services sector is in excess of $4 million. 

In addition, the global shift towards a digital economy means that cyber security and the protection of personal data are subject to increased legal and regulatory scrutiny.

Cost is not the only factor that Board Directors must consider in regard to cyber attacks. On average it can take between two to four weeks to recover from an attack, with some businesses taking much longer to return to normal. This can have a significant financial and reputational impact for businesses unable to trade during these periods.

With more businesses embracing hybrid working, as well as an increasing amount of technology used across all sectors from manufacturing to healthcare the risk associated with a cyber attack is only growing.

There are measures that boards can employ to protect against an attack.

  • Cyber insurance can play a role, supporting businesses in the face of a threat as well as protecting the balance sheet. Well-crafted coverage, uniquely suited to the organisation can provide access to fully vetted, post-incident vendors aiding in the efficiency of the response.
  • Furthermore they should encourage the adoption of market-leading cyber security protections as a means to broader coverage and support board members in evidencing the organisation’s commitment to cyber security following an incident.
  • The impact of a ransomware attack on an organisation can be devastating.Business leaders and board members must be proactive to make sure that their organisation is prepared for such a ransomware attack. 
  • Every organisation should establish a plan to mitigate the risk of key people being unavailable in the event of a system failure. Keep a list of contact details for backup technicians. Document the configuration of hardware and software applications and keep this up to date so that a new technician can quickly rebuild the system.

While prevention is always the first priority, business leaders and board members should think hard about the  processes and procedures they have in place are good enough to ensure the business’ resilience when an attack takes place.

NCSC:     Norton Rose Fulbright:     IFAC:      Business Leader:    Insurance  Post:    Clyd&Co:    CyberGuard:

You Might Also Read: 

Directors Must Understand Their Organisation’s Cyber Risks:

 

« A Short Guide To Building Cloud-Based SaaS Applications
Multiple Location Supermarket Suffers Supply Chain Attack »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

General Dynamics Information Technology (GDIT)

General Dynamics Information Technology (GDIT)

General Dynamics IT delivers cyber security services to defend critical information and infrastructure.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

PartnerRe

PartnerRe

PartnerRe provides multi-line reinsurance to insurance companies on a worldwide basis. Services include Cyber Risk.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

XM Cyber

XM Cyber

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

QuantiCor Security

QuantiCor Security

QuantiCor Security is one of the world’s leading developers and manufacturers of quantum computer resistant security solutions for IT infrastructures and the Internet of Things (IoT).

IMQ Group

IMQ Group

IMQ is one of Europe’s top players in the field of conformity assessment. We offer certification services to support all the major sectors of the manufacturing and service industries.

GrayMatter

GrayMatter

GrayMatter provides Advanced Industrial Analytics, OT Cybersecurity, Digital Transformation and Automation & Control services to clients across the U.S. and Canada.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

Cyvore Security

Cyvore Security

Cyvore combines cutting-edge AI, machine learning, and behavioral analytics to detect, investigate, and neutralize threats before they compromise your organization.