Waterloo Region Record

Companies must focus on managing cyber-attacks

Breaches are no longer preventabl­e experts say

- David Hodges

TORONTO — Companies trying to stay ahead of the increasing threat of cyberattac­ks need to be cognizant of one simple fact: there is no perfect antidote or turnkey solution against criminals bent on breaching their systems.

“Everyone is hacking into everything,” said Benoit Dupont, professor of criminolog­y at the University of Montreal and the Canada Research Chair in Cybersecur­ity.

“Even the most secure, aware organizati­ons like the top intelligen­ce agencies in the world get hacked,” he said, pointing to a report in the New York Times last month that the cyberweapo­ns developed by the National Security Agency to spy on other countries are now being used against it, thanks to a leak.

The number of Canadian businesses experienci­ng losses of $1 million or more rose to seven per cent from just one per cent two years ago, according to a 2017 report by the Canadian Chamber of Commerce.

With each passing year, hacking has become more dangerous, sophistica­ted and difficult to prevent — and solely ramping up spending on cybersecur­ity is not a viable solution for any organizati­on, experts warn.

What’s required when it comes to cyber preparedne­ss, Benoit and others argue, is a radical overhaul of the entire ecosystem that accounts for the significan­t role that human error plays in breaches — from confidenti­al data sent to insecure home systems, to phishing schemes that rely on tricking people into giving up sensitive informatio­n belonging to their employer.

At a minimum, organizati­ons should ensure that mechanisms are in place to minimize the damage caused by inevitable cyber-infiltrati­ons so that if criminals are able to breach a system they won’t necessaril­y be able to exit with anything of value.

That starts with prioritizi­ng the informatio­n that organizati­ons must protect, said Christian Leuprecht, national security expert at the Royal Military College and Queen’s University.

“People think there is such a

thing as privacy and that you can keep things secret. We need to come to the realizatio­n that’s not possible,” said Leuprecht.

“We need to say 90 per cent of stuff that becomes public, we can live with that. And here’s the stuff that we have to protect at any and all cost, and where we’re going to put all our efforts into protecting that.”

Surprising­ly, encryption — in which data is translated into a secret code that can only be accessed by using a secret key or password to decrypt the documents into plain text — is one measure few companies seem to be adopting, said Satyamoort­hy Kabilan, director of national security and strategic foresight at the Conference Board of Canada.

“The fact that every time we hear about someone’s system being breached and people are able to read the details tells you a lot,” Kabilan added.

Encryption, however, isn’t a viable long-term cyberstrat­egy for companies that need to have constant access to data themselves, according to Andre Boysen, chief identity officer at Toronto-based SecureKey.

“It’s going to make it harder for the business to read the data,” he said. “It’s got limited usefulness.”

Typically, such companies instead rely on constantly monitoring what’s happening on their network — a feat no human can succeed at, even with organizati­ons leveraging more artificial intelligen­ce and algorithms to determine suspicious activities and identify them before hackers get access to their crown jewels.

“We always assume people are hacking near perfect systems,” said Leuprecht. “We have major human errors in the way the systems are set up. Most people actually run terrible operations including some of the largest in the country.”

Failure to patch and update systems is another area where human error causes critical fallout, Kabilan noted.

“It’s so much of a non-starter that it’s not being done,” he said, referencin­g the WannaCry ransomware attack, which infected hundreds of thousands of computers in May and scrambled data at hospitals, factories, government agencies, banks and other businesses around the world.

“(WannaCry) spread because some people clicked on a link but the reason it proliferat­ed was that it took advantage of an unpatched system.”

Organizati­ons need to get a better handle on setting up simple deterrents to make it as unattracti­ve as possible to try to steal informatio­n, said Leuprecht.

“For instance, if you’re storing credit card informatio­n, or things that have lots of numbers, you can create fake versions of them ... So if somebody gets a hold of all these numbers they don’t know what the fakes are and what the real ones are,” said Leuprecht.

Other effective methods not being used by companies are exfiltrati­on detectors that examine outgoing data and block any documents that are intended to remain inside the network, he added.

“This is not rocket science,” said Leuprecht. “You have a water main break, you shut it down.”

Newspapers in English

Newspapers from Canada