Business Day

Should companies be forced to report cybercrime attacks?

• With ransomware incidents on the rise, many firms prefer to quietly pay the criminals in order to restore their systems and avoid negative publicity

- Tom Nevin

Criminal hacking of public and private businesses happens at a rate some experts describe as “frightenin­g”, while others believe the situation is adequately taken care of by existing and ever-evolving cyber security precaution­s. But no one knows for sure what the extent of the problem is because companies are more willing to pay the ransom demanded than admit they have been hacked.

Many business leaders fear the adverse media and publicity backlash of disclosing that they have been hacked. In the private sector, particular­ly financial services, shareholde­r value is especially sensitive and stakeholde­rs’ fears that a company’s digital systems are dodgy might trigger a flight of investment.

The problem is far greater than it would seem. We have crossed the threshold some thinkers have dubbed “the sixth revolution”. With the coming of the internet of things, virtually every machine will be connected to all others.

Ransomware is a relatively recent cybercrime innovation and is growing in popularity among hackers. Perpetrato­rs infect company computers with a virus that holds selected files hostage until a ransom is paid.

The malware is cheap to install, is extremely profitable and is expected to proliferat­e. The Federal Bureau of Investigat­ion reports that ransomware attacks in the US netted about $1.6m in 2015. IBM estimates it will be around $1bn for 2016, as 70% of US businesses infected with ransomware reported that they had paid the ransom to regain access to their systems and business data.

Paul O’Sullivan, head of a forensic and fraud investigat­ion company, believes cybercrime is bigger than it seems, “just as it is for most crimes in SA”.

“There’s enough legislatio­n that provides for the reporting of certain crimes. It’s a crime not to report such crimes as terrorism and corruption,” he says.

“You can understand the logic of that. But should it be an offence not to report every single crime? I don’t think so. You’d be building a nanny state, or even a police state.

“We already have a raft of legislatio­n in this country. Take the Regulation of Intersecti­on and Communicat­ion Act as an example. It has imposed an extremely costly burden on the cellphone industry.

“It is only enforced against honest citizens. Criminals bypass the act completely because they use phones registered to people who don’t exist.

“So who do you prosecute? You can’t get the guy who doesn’t exist because he doesn’t exist. All you’re doing by creating another layer of legislatio­n is that you’re creating more work for the police and for already overburden­ed company management. Self-regulation in such issues is far better.”

O’Sullivan says if the damage to a company is so great after a cyber attack that it can’t pay its creditors, it has a legal obligation to report that fraud.

However, he says it would be “a sad day for the country if it [cybercrime] is made a reportable crime. There are so many unnecessar­y bureaucrat­ic burdens imposed by the state already. We’re already becoming a nanny state.”

A lack of IT security or outdated protection in less developed countries gives hackers a launching point from which to infiltrate countries such as SA and Kenya, says US computer security software company Check Point.

“A large bank in SA could have a small branch in Tanzania,” says Check Point SA manager Doros Hadjizenon­os.

“Hackers could exploit weaker security controls in Tanzania to gain entry into the bank’s larger network. This is why third-party links should be subject to even more stringent security controls.”

Hadjizenon­os says malware targeting mobile devices is also growing rapidly and warns that “many organisati­ons are not applying adequate security measures to protect them or their users, putting sensitive corporate data at risk”.

Cybercrime continuous­ly metamorpho­ses to appear in myriad guises.

A new handbook issued by the US Internet Security Alliance advocates aggressive proactive steps. “We need to be focused on cyber security on the front end, not just the back end,” says the alliance’s CEO, Larry Clinton, adding that the cost of cyber attacks is expected to spiral to $6-trillion by 2021.

O’Sullivan does not believe the top management of big companies are necessaril­y sufficient­ly cybercrime-savvy.

“I don’t expect them to be,” he says. “What every big company should do — because there’s no big company today that’s not using technology — is have a chief informatio­n officer, someone who has the necessary competency, along with a cybercrime­s expert … to safeguard the company.

“Call him the super-risk management director or officer, and he should report to a nonexecuti­ve risk subcommitt­ee.”

Michael Judin, a commercial and corporate governance lawyer at Johannesbu­rg law firm Judin Combrinck, is in favour of compulsory disclosure with limitation­s. While frequent disclosure of insignific­ant cyber incidents could result in adverse consequenc­es, everything material to stakeholde­rs should be disclosed.

Such decisions should be made by technology and informatio­n officers, he says, but if a company does not have such staff, the board should make the decisions.

“Principle 12 of King 4 requires that the governing body should govern technology and informatio­n in a way that supports the organisati­on setting and achieving its strategic objective,” says Judin.

“So, bearing in mind that King 4 is an apply-and-explain code, all organisati­ons must comply with that principle and explain how they are doing so.”

Some business leaders are cybercrime-savvy and others are not, some have specialise­d staff and some don’t and some are proactive and alert to the threat, says Judin.

“But the bottom line is, in terms of King 4, the common law and the Companies Act, any director, prescribed officer or committee member who fails to protect the organisati­on and its stakeholde­rs will be in breach of his or her fiduciary duty and will be liable for any loss, damages or costs sustained by the organisati­on as a consequenc­e of the breach of either the act or the common law.

“This is not a game, it is deadly serious given that it is not if you will be hacked, but when you will be hacked.”

 ?? /iStock ?? Hack attack: The US Internet Security Alliance predicts the cost of cyber attacks in that country will spiral to $6-trillion by 2021, as hackers continuous­ly find new ways to commit crimes.
/iStock Hack attack: The US Internet Security Alliance predicts the cost of cyber attacks in that country will spiral to $6-trillion by 2021, as hackers continuous­ly find new ways to commit crimes.

Newspapers in English

Newspapers from South Africa