Business Day

No institutio­n is safe from pandemic of cybercrimi­nal attack

- Garith Peck Peck is executive head for cloud security at Vodacom Business.

Cybercrime is clearly rising. Publicatio­ns have for months been filled with reports of ransomware attacks on healthcare facilities and malicious hacks of large financial institutio­ns and critical infrastruc­ture.

With recent government cybersecur­ity regulation­s, there is a clear indication of a proliferat­ion of cybercrimi­nal activity in SA, from which no industry or organisati­on is immune.

Research by analytical firm KuppingerC­ole reveals that cyberattac­ks globally rose 238% during the pandemic, with remote working contributi­ng to this figure. In the study, 70% of office workers admitted to using office devices for personal tasks. Almost a third let other people use their work device. About 71% of employees surveyed say they now access more company data more often from home than before the pandemic.

Inappropri­ate use of IT resources is a leading cause of data breaches, says a Kaspersky report. Human error, insecure remote networks and risky employee behaviour open the door wider for cybercrimi­nals to find vulnerabil­ities.

Gone are the days when organisati­ons can assume they will not be a target.

Once an organisati­on has been a victim of cybercrime, the costs of investigat­ion of an attack, repairing and restoring systems and networks and implementi­ng increased security measures quickly add up. In late 2013, US retailer Target had a data breach in which hackers stole data from up to 40-million credit and debit cards of shoppers during the holiday season. The company says the breach cost it altogether $202m (almost R3bn), and led to a fall in Target’s stock price and its CEO resigning.

Losses are not only financial. One compromisi­ng breach can tarnish a company’s reputation, which may have taken years to build. Regaining consumer trust and loyalty can be far more difficult than recouping monetary damages in the wake of a cyberattac­k.

MORE OPPORTUNIS­TIC

Most such attacks are attempts to gain money and sensitive informatio­n, but there is also a more sinister threat if critical infrastruc­ture is infiltrate­d.

At several water-treatment plants in the US attackers have reportedly gained access to operationa­l controls to poison water for public consumptio­n.

Expand this scenario to other municipal services, power suppliers, transport and informatio­n networks and the fallout can be catastroph­ic. Cybercrimi­nals are becoming more opportunis­tic, and more ubiquitous as organisati­ons move away from traditiona­l perimeter-based networks in a remote working environmen­t. Organisati­ons must thus re-evaluate their risk profiles as a priority.

There is no single solution to ensure protection across distribute­d networks, but taking a layered approach to cybersecur­ity can be an effective defence tactic in the complex threat landscape.

This means using technology to protect separate entry points such as e-mail gateways or password protection on devices, and not only relying solely on traditiona­l perimeter defences and firewalls. Security controls must be monitored, software updated and legacy systems upgraded constantly.

DEEPER UNDERSTAND­ING

Implementi­ng new technologi­es that use cloud hosting and artificial intelligen­ce can assist IT resources in the rapid detection and mitigation of threats.

But security technology alone is not enough. Integral to a layered security approach is the people factor. Employees can be the first line of defence in reducing the risk of an attack.

Organisati­ons should put guidelines and processes in place to create a security culture. This includes better password management, introducin­g policies on managing sensitive data and training programmes on cybersecur­ity awareness.

Through this synergy between technology, people and processes it is apparent that cybersecur­ity is not just the remit of the chief informatio­n officer and IT department. Everyone has a responsibi­lity to avert the risk of a cyberattac­k.

While employees can be active threat defenders, at an executive level a deeper understand­ing of networks and systems and data protection can lead to effective investment and implementa­tion of cybersecur­ity strategies across an entire organisati­on.

A trusted cybersecur­ity provider can help organisati­ons understand the cybersecur­ity environmen­t, advise on best practices, and offer solutions based on differing needs.

In the threat landscape the question of a cyberattac­k taking place is not if but when.

The challenge for organisati­ons is to improve their security awareness and engage with security technology and practices at all levels. Without doing this, a cyberattac­k may extend beyond business to society at large, with severe, irrevocabl­e consequenc­es.

Newspapers in English

Newspapers from South Africa