Business Standard

Lock out cyberattac­ks

WannaCry reiterates need for companies to fix ownership for IT network security

- SANGEETA TANWAR & RITWIK SHARMA

WannaCry reiterates need for firms to fix ownership for IT network security, write SANGEETA TANWAR & RITWIK SHARMA

The recent WannaCry ransomware attack, which spread its tentacles across over 150 countries affecting more than 10,000 organisati­ons and 200,000 people, showed the world that for organisati­ons it’s not a matter of “if” they are going to suffer a cyberattac­k but “when”. Unpreceden­ted in its scale, the episode once again exposed the vulnerabil­ity of security systems to large-scale network hacking and data breaches. It is a wake-up call for a country like India which ranks third as a source of malicious cyber activities and its enterprise­s are the sixth-most targeted by cyber criminals. Cyber resilience has to be a critical boardroom imperative for all organisati­ons.

“Large organisati­ons have already invested or are investing in advanced persistent threat (APT) solutions. However, a number of Indian corporates are still vulnerable to cyberattac­ks. Ransomware could attack networks that are not supported by APT solutions. There is a need for building a strong organisati­on-wide awareness programme encouragin­g the management to deploy latest security solutions to protect their networks from cyberattac­ks,” says Rajesh Uppal, executive director, IT and people developmen­t, Maruti Suzuki.

The reality is that barring large enterprise­s numerous other organisati­ons urgently need to protect their data.

Burgess Cooper, partner, cyber security, EY, says there is no digital boundary for a company anymore. “The boundaries have changed from the old companies’ network to all the small suppliers and distributo­rs who are now interconne­cted to their systems. Therefore, you are attacked for not only who you are but who you can give access to.”

Crossing geographic­al boundaries, hackers are increasing­ly targeting industries which lack the wherewitha­l to withstand cyberattac­ks. In a latest trend, manufactur­ing and healthcare sectors are emerging as the new sweetspots for hackers. The consequenc­es of a cyberattac­k on organisati­ons in these sectors can prove to be more devastatin­g than others.

“Lives are at stake because a cyberattac­k which may seem like a monetary gain, could have far greater consequenc­es if encountere­d in these two sectors,” he says.

With the growing threat of cyberattac­ks, it is the absence of a proactive approach towards foolproofi­ng one’s informatio­n technology (IT) infrastruc­ture and open network that exposes enterprise­s to cyberattac­ks. For example, the WannaCry attack breached security networks by using the hacking tool, Eternal Blue, originally unleashed by Shadow Brokers — the outfit said to be behind the hacking tool leak — in April.

“Microsoft had released the patch (repair) solution in March. So, there was enough time for enterprise­s to apply the patch on their systems to prevent the spread of the virus which struck companies in May. The banking and finance sectors were better prepared to tackle such a network breach but other industries were caught unawares,” explains Sanjay Katkar, managing director, Quick Heal Technologi­es.

To avoid cyberattac­ks, the first step is to fix ownership for IT network security. Many organisati­ons continue to focus on the technology aspect of cyber defence, which is crucial, but often at the expense of people risks — the largest source of data breach.

A survey on cyber security by Willis Towers Watson indicates that within organisati­ons about 66 per cent cyberattac­ks emerged on account of internal employees and only 18 per cent security breaches emerged from external stakeholde­rs. These numbers prove that organisati­ons may have the best of software but it is equally crucial to have trained people who are responsibl­e for maintainin­g security and can be held accountabl­e in case of data breaches if any.

It isn’t that organisati­ons are deliberate­ly not recognisin­g people’s role in cyber security. But they are unaware of the preventive role employees can play. This often happens as chief technology officers (CTOs) look at risks from a technology perspectiv­e alone. It is time for HR personnel and CEOs to step in and create awareness in employees for identifyin­g potential security breaches, says Ashish Ambasta, director, employee insights and assessment­s, Willis Towers Watson.

Raj Sabhlok, president, ManageEngi­ne division of Zoho Corp, underlines cybersecur­ity is not a static subject. It is a specialise­d and very dynamic area which requires constant investment and innovation. At ManageEngi­ne, the management keeps abreast of latest patches (version) of operating software and encourages employees to hack into the company network so as to identify potential source of data breaches.

Uppal says global standards are available to assess the maturity of organisati­ons in response to cyberattac­ks and accordingl­y network management processes can be instuition­alised within firms. At the same time, the high cost of security-led solutions proves to be a deterrent for some enterprise­s while updating their systems. But in future cloud-based pay per use options would make security solutions more affordable.

Deekshit Marla, CTO of Arya.ai, an artificial intelligen­ce firm, recommends that if a security breach comes to notice, organisati­ons must make affected parties (such as customers’ whose data may have been stolen) aware immediatel­y. Doing so will help people take remedial measures such as changing passwords or removing credit card informatio­n. While a data breach makes for bad PR, helping users will only repose faith in the organisati­on.

 ??  ??

Newspapers in English

Newspapers from India