How to Combat Common Information & Collaboration Security Threats

According to the World Economic Forum, cyber attacks are perceived as the number two global risk of concern to business leaders in advanced economies. This is second only to fiscal crises. Forbes reports that 17.2 billion records have been lost in the fifty largest data breaches between 2004 and 2021 - including a huge data breach for LinkedIn in 2021. 

The news is full of reports of these InfoSec attacks - whether phishing; stolen credentials; access because of unpatched or misconfigured software or social engineering attacks in which individuals are targeted within an organisation.

The British National Cyber Security Centre, however, singled out Ransomware as “the most significant cyber threat facing the UK” in 2021. CEO Lindy Cameron wrote: “...it was assessed as potentially harmful as state-sponsored espionage.” Indeed, ransomware was one of the topics tackled at the G7 Summit in 2021. 

This year, the annual review will no doubt add another few threats; and more countries and groups will appear on the list of prevalent threat actors, not least because the world continues to become more and more ideologically polarised.

State-level actors - from Russia, China, Iran and North Korea amongst other countries - have become stronger and are being protected

IBM’s Cost of a Data Breach report stated that the average cost of a data breach globally reached an all-time high of $4.35 million in 2022. While this figure is staggering by itself, what is also notable is that this is a 2.6 percent increase from 2021. Financial gain is definitely a motivation but there are also the hackers who cause disruption just for fun with no monetary motivation. 

Every single business is a target and InfoSec attacks are only going to become more subtle and more frequent. The very building blocks of encryption could be smashed down by quantum computing, warned The Economist and that was in 2018. 

This article reads like a declaration of doom, but it is actually a call to arms. Companies can protect themselves, but they need to invest heavily in talent, knowledge and expertise in cybersecurity. There is a scramble for cybersecurity experts as demand surges with students getting snapped up even before they have completed their degrees. In a climate in which businesses are terrified about the economic future, investing in cyber security is essential to protect themselves from losing vast amounts of money, if not everything, in just seconds. 

A clear place to start is to accept cybersecurity is not just as protection but as a business enabler.

A shift in mentality is required. A Cisco report stated that thirty-one percent of the survey’s 1014 respondents, who were senior finance and line-of-business executives, believed that the primary purpose of cybersecurity is growth enablement. However, sixty-nine percent still saw its main purpose as risk reduction. This view of cybersecurity - that and time-consuming and ineffectual tools - stymies creativity. In the same report, it states: “...A stunning 71 percent of executives said that concerns over cybersecurity are impeding innovation in their organisations. Thirty-nine percent stated that they had halted mission-critical initiatives due to cybersecurity issues.” 

On top of this, the time lost to rectifying the issues caused by an attack is also a business inhibitor. For some organisations providing critical and emergency responses, like the NHS, which was attacked in August, it can even be life-threatening. 

Then there is the impact of an attack on customer confidence. A major breach can damage brand reputation and customer retention as well as operations and finances. By deploying a steadfast cybersecurity plan and showing it is incorporated within your business’ governance, you are showing clients that you take cybersecurity seriously. Understanding this, and all of the other potential economic drivers and business impacts, will help you formulate a plan. This must include educating employees on cybersecurity to reduce human error and employing best practices instead of inventing your own methods and processes.

Ultimately though deploying simple, frictionless, and easy to use cybersecurity tools is going to be the quickest and most effective driver of change. This will motivate behavioural change, build confidence - both in your staff and clients - and boost instead of impede productivity. The InfoSec attacks may be becoming more targeted and frequent; but a simple, robust solution will prevail. 

Onur Özen is Chief Executive Officer of RealTyme

You Might Also Read: 

Building a Threat-Ready Ransomware Response Plan:

 

« Cyber Security Predictions For 2023
Simplicity In Complexity: The Key to Successful Threat Exposure Management »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Security Compass

Security Compass

Security Compass, the Security by Design Company, enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows.

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

InterGuard

InterGuard

As the pioneer for Unified Insider Threat Prevention and productivity monitoring tools, InterGuard offers on premise and SaaS-based services that are easily available and affordable.

Ostendio

Ostendio

Ostendio is a cybersecurity and information management solutions provider that develops affordable compliance solutions for digital health companies and other regulated entities.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

Centre for Cyber Security Research & Innovation

Centre for Cyber Security Research & Innovation

The Centre for Cyber Security Research & Innovation is Nepal's First Academic Research Institute to focus on understanding the overall Information Security of Nepalese Organizations.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

SPYROS Information & Technology Consulting

SPYROS Information & Technology Consulting

SPYROS specializes in providing highly qualified professionals in Computer Network Operations, Signals Intelligence, Technical Training and Certifications, Network Administration and Security.

Business Communications Inc (BCI)

Business Communications Inc (BCI)

BCI is a leading technology company known for its exceptional team of experienced engineers with a focus on providing top-notch technology and security products and services.

Trinsec 7

Trinsec 7

Trinsec 7 is the first security firm to integrate cybersecurity, electronic security, and identity protection into a single, intelligence-driven solution for growing businesses and modern families.