Cyber Security Is A State Of Mind

Cyber security incidents have never been more  frequent and company Directors have a responsibility to ensure their organisation is resilient in ways that make it much harder for cyber criminals to put the business at risk. 

Although the IT department plays a crucial role in protecting the company against cyber threats, it is a serious mistake to think that cyber security is the exclusive responsibility of the IT department. 

In reality, safeguarding the company against cyber attacks is a shared responsibility amongst all employees, regardless of their role or position. The awareness and collaboration of the entire team are vital in preventing and mitigating cyber risks. 

Boards can be overwhelmed by the complexity of cyber security and the vast array of detailed management presentations addressing compliance, heat maps, penetration testing and the like without understanding their context.  However, in the past, the complex nature of cyber risk has caused many board members to shy away from cybersecurity and to not devote the time and energy required to fully understand and deal with the issue. This is unsustainable as incidents and regulatory pressures mount. 

Adding cyber security expertise to the board can be a partial fix for this problem so long as these additions are not viewed as a tick-box solution which relieves the rest of the board from its responsibility to take measures to achieve cyber resilience.

Today,  are now beginning to see signs of a broader solution wherein the entire board is digging in and devoting the time and energy to understand this systemic risk to their business. Here are some of the  questions that board members should be asking:

  • Is the board adhering to its fiduciary governance responsibility or delegating it to management?
  • Does the board have a sufficient understanding of the enterprise’s business functions and interactions to contextualise cyber risk?
  • Is the board and management properly structured and organised to deal with cyber risk?
  • Has the enterprise adopted a robust cyber security framework it adheres to rigorously?

How does the framework fit into overall enterprise risk management?

  • What criteria is used to make changes to cyber security spending?
  • Does the board understand risk tolerance, and does it interact with management to develop a risk appetite?
  • Does the board understand cyber security presentations by management or are they presented using tech jargon?
  • Do cybersecurity policies and procedures include customer, third party, operational and software interfaces?
  • How do cybersecurity compliance audits relate to governance?
  • What procedures are in place to respond to and report cyber breaches?
  • Does the board participate in tabletop exercises to train for responses to cyber incidents? Boards want to avoid closing the cybersecurity barn door only after an incident. To do so, they need to transform their perception of cyber security governance into reality.

Effective cyber security requires organisational changes necessary to govern and manage complex digital systems, educational changes to develop a common contextual “systems” understanding amongst the board and risk experts, and cultural changes to imprint upon the enterprise the importance of shared responsibility for cyber security.

There are no shortcuts or easy solutions for effective cyber security. The time for an enterprises-wide understanding of systemic cyber risk is right now. Here are some reasons why every employee has a significant role in the company's cyber security:

First Line of Defence:    All employees, from executives to interns, are the first line of defence against cyber threats. Most cyberattacks start with social engineering tactics like phishing or spear-phishing, which aim to exploit users' trust and naivety. By being vigilant and identifying suspicious messages and links, employees can prevent successful attacks.

Internal Threats:    Not all cyber threats come from outside the company. Inadvertent or malicious actions by employees can pose a significant risk to the company's security. Therefore, all staff members should be aware of their responsibilities concerning information security and follow best practices to protect confidential data.

Passwords and Authentication:    The proper choice and management of passwords are individual responsibilities. Weak passwords and password reuse are common security failures that can lead to data breaches. Employees should follow strong password policies and use two-factor authentication whenever possible to ensure the protection of their accounts.

Personal and Remote Devices:    With the increasing adoption of remote work and the use of personal devices for business purposes, employees must ensure that their devices are protected and updated with the latest security measures. They should also be aware of the risks of public Wi-Fi connections and use a secure VPN connection when accessing sensitive information.

Security Awareness Training:    The company should provide regular security awareness training for all employees. This will help educate them about the latest cyber threats, how to identify suspicious activities, and how to report potential security incidents.

Security Culture:    A strong security culture is built through the commitment of all employees to protect the company's assets. Employees should feel encouraged to report potential security issues and share their concerns. In summary, cyber security is a collective responsibility and should not be neglected by any team member. Collaboration between the IT department and all employees is essential for effective protection against cyber threats. 

Only through teamwork and  constant vigilance ca organisations strengthen their security posture and significantly reduce the risks associated with growing cybersecurity threats.

Oodaloop:    @Ooda:      EmpireTechnologies / LinkedIn:       Jo. of Cubersecurity:       ScienceDirect:   

Risk Academy

Image: Cottonbro Studio

You Might Also Read: 

How Does Your Board Measure Cyber Resilience?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 




 

« US Space Force Has Plans To Use Artificial Intelligence 
Fujitsu Knowingly Supplied Faulty Data To The British Post Office  »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Voyager Networks

Voyager Networks

Voyager Networks is an IT solutions business with a focus on Enterprise Networks, Security and Collaborative Communications.

Cloud53

Cloud53

Clolud53 is a Manchester based Managed Cyber Security & Cloud company providing solutions focused around you.

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER) - USA

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER) - USA

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

Resec Technologies

Resec Technologies

Resec provides total protection against all types of known and unknown malware threats including viruses, Trojans, ransomware and phishing, regardless of their delivery method.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

Nanitor

Nanitor

Nanitor is a powerful cybersecurity management platform focusing on hardening security fundamentals across your global IT infrastructure.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

Cambridge International Systems

Cambridge International Systems

For more than 25 years, Cambridge has been fighting bad actors in both the cyber and physical worlds.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Karthik Consulting (KC)

Karthik Consulting (KC)

Karthik Consulting is a technology service provider specializing in IT services for the U.S. federal government.