How to Combat Common Information & Collaboration Security Threats

According to the World Economic Forum, cyber attacks are perceived as the number two global risk of concern to business leaders in advanced economies. This is second only to fiscal crises. Forbes reports that 17.2 billion records have been lost in the fifty largest data breaches between 2004 and 2021 - including a huge data breach for LinkedIn in 2021. 

The news is full of reports of these InfoSec attacks - whether phishing; stolen credentials; access because of unpatched or misconfigured software or social engineering attacks in which individuals are targeted within an organisation.

The British National Cyber Security Centre, however, singled out Ransomware as “the most significant cyber threat facing the UK” in 2021. CEO Lindy Cameron wrote: “...it was assessed as potentially harmful as state-sponsored espionage.” Indeed, ransomware was one of the topics tackled at the G7 Summit in 2021. 

This year, the annual review will no doubt add another few threats; and more countries and groups will appear on the list of prevalent threat actors, not least because the world continues to become more and more ideologically polarised.

State-level actors - from Russia, China, Iran and North Korea amongst other countries - have become stronger and are being protected

IBM’s Cost of a Data Breach report stated that the average cost of a data breach globally reached an all-time high of $4.35 million in 2022. While this figure is staggering by itself, what is also notable is that this is a 2.6 percent increase from 2021. Financial gain is definitely a motivation but there are also the hackers who cause disruption just for fun with no monetary motivation. 

Every single business is a target and InfoSec attacks are only going to become more subtle and more frequent. The very building blocks of encryption could be smashed down by quantum computing, warned The Economist and that was in 2018. 

This article reads like a declaration of doom, but it is actually a call to arms. Companies can protect themselves, but they need to invest heavily in talent, knowledge and expertise in cybersecurity. There is a scramble for cybersecurity experts as demand surges with students getting snapped up even before they have completed their degrees. In a climate in which businesses are terrified about the economic future, investing in cyber security is essential to protect themselves from losing vast amounts of money, if not everything, in just seconds. 

A clear place to start is to accept cybersecurity is not just as protection but as a business enabler.

A shift in mentality is required. A Cisco report stated that thirty-one percent of the survey’s 1014 respondents, who were senior finance and line-of-business executives, believed that the primary purpose of cybersecurity is growth enablement. However, sixty-nine percent still saw its main purpose as risk reduction. This view of cybersecurity - that and time-consuming and ineffectual tools - stymies creativity. In the same report, it states: “...A stunning 71 percent of executives said that concerns over cybersecurity are impeding innovation in their organisations. Thirty-nine percent stated that they had halted mission-critical initiatives due to cybersecurity issues.” 

On top of this, the time lost to rectifying the issues caused by an attack is also a business inhibitor. For some organisations providing critical and emergency responses, like the NHS, which was attacked in August, it can even be life-threatening. 

Then there is the impact of an attack on customer confidence. A major breach can damage brand reputation and customer retention as well as operations and finances. By deploying a steadfast cybersecurity plan and showing it is incorporated within your business’ governance, you are showing clients that you take cybersecurity seriously. Understanding this, and all of the other potential economic drivers and business impacts, will help you formulate a plan. This must include educating employees on cybersecurity to reduce human error and employing best practices instead of inventing your own methods and processes.

Ultimately though deploying simple, frictionless, and easy to use cybersecurity tools is going to be the quickest and most effective driver of change. This will motivate behavioural change, build confidence - both in your staff and clients - and boost instead of impede productivity. The InfoSec attacks may be becoming more targeted and frequent; but a simple, robust solution will prevail. 

Onur Özen is Chief Executive Officer of RealTyme

You Might Also Read: 

Building a Threat-Ready Ransomware Response Plan:

 

« Cyber Security Predictions For 2023
Simplicity In Complexity: The Key to Successful Threat Exposure Management »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

Atomicorp

Atomicorp

Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

AlertEnterprise

AlertEnterprise

AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT Security, Physical Access Controls and Industrial Control Systems.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

Narf Industries

Narf Industries

Narf Industries are a small group of reverse engineers, vulnerability researchers and tool developers that specialize in tailored solutions for government and large enterprises.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.

ClamAV

ClamAV

ClamAV is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security.

SECUREU

SECUREU

At SECUREU, we protect growing businesses against cyberattacks by proactively implementing best security practices, fixing existing security vulnerabilities, and increasing cyber awareness.

Raven

Raven

Raven are on a mission to help companies protect their cloud native applications by focusing on runtime.