Data/Cyber

More money, more problems

BY Richard Summerfield

Barely a week goes by without a major cyber attack making global headlines. Indeed, in recent weeks, the ‘WannaCry’ and ‘Petya’ ransomware attacks have caused chaos across a spectrum of organisations the world over. And, although many companies are beginning to respond to the threat, often the response is misguided, according to a new report from KPMG and BT.

The report, 'Securing the digital enterprise: The cyber security journey – from denial to opportunity', notes that too many companies are treating cyber security as a siloed issue, which can be dealt with simply by “throwing money” at the problem. While companies must ensure they have, for example, adequate and updated firewalls and antivirus protection, it is equally as important to pool shared resources and treat cyber security as a conventional operational risk issue. This requires greater ‘buy-in’ on cyber issues from the board and a better integration of cyber issues into overall business strategy.

David Ferbrache, Technical Director in KPMG’s cyber security practice, said: “The recent spate of cyber-attacks is keeping cyber risk at the top of the business agenda, and as such investments are being made. The business community needs to avoid knee-jerk reactions as cyber security is a journey – not a one size fits all issue, and getting the basics like patching and back-ups right matters. It’s important to build a security culture, raise awareness amongst staff, and remember that security needs to enable business, not prevent it.”

There must be a better acknowledgement, at board level, of the threat posed by cyber attacks. As such, organisations must have the right security provisions in place. These include, companies making sure they know where they are on their journey to cyber security, which, according to the report, involves five key stages: denial, worry, false confidence, hard lessons and true leadership.

Mark Hughes, CEO of BT Security, said: “The global scale of the recent ransomware attacks showed the astonishing speed at which even the most unsophisticated of attacks can spread around the world. Many organisations could have avoided these attacks by maintaining better standards of cyber hygiene and getting the basics right. These global incidents remind us that every business today - from the smallest sole trader through to SMEs and large multinational corporations - needs to get to grips with managing the security of their IT estate, as well as their people and processes.”

Report: Securing the digital enterprise - The cyber security journey – from denial to opportunity

‘Petya’ cyber attack affects thousands

by Richard Summerfield

Fresh off the heels of the ‘WannaCry’ ransomware attack, a fresh global cyber attack disrupted computers across the world on Tuesday and Wednesday. Russia's biggest oil company, Ukrainian banks and multinational firms across Europe, the US and the Asia-Pacific region were affected.

The latest attack, known as ‘Petya’ or ‘GoldenEye’, included code known as 'Eternal Blue', which cyber security experts believe was stolen from the US National Security Agency in April and was also used in WannaCry. It is the Eternal Blue code which facilitated the speed of the assault. Indeed, the attack spread rapidly, affecting machines running Microsoft’s Windows operating systems, encrypting hard drives and overwriting files before demanding $300 in bitcoin payments to restore access. "We are continuing to investigate and will take appropriate action to protect customers," a spokesman for Microsoft said.

Globally, Russia and Ukraine were most affected by the thousands of attacks, according to Kaspersky Lab. In Ukraine, government systems as well as banks, state power utilities and Kiev’s airport and metro system were all affected. Elsewhere, advertising giant WPP, French construction materials company Saint-Gobain, Danish shipping giant Maersk, US pharmaceutical company Merck, Russian steel and oil firms Evraz and Rosneft, and the Australian manufacturing facilities of the Mondelez owned Cadbury’s chocolate factory, along with many others, were all affected. In total, more than 2000 organisations are believed to have been hit.

The effectiveness of this latest attack, and the speed at which it has spread, so soon after the WannaCry attack, is cause for alarm among companies, cyber security professionals and the general public.

After the WannaCry incident, governments, security firms and industrial groups advised businesses and consumers to make sure all their computers were updated with Microsoft patches to defend against the threat. This latest attack, believed to be smaller than WannaCry, could be more harmful than its predecessor as it renders computers unresponsive and unable to reboot. The resourcefulness of the attackers is also a concern for cyber security professionals, particularly as Petya does not appear to have the same ‘kill switch’ which was used to neutralise the WannaCry attack.

Though they are not a new development, ransomware attacks are becoming more frequent. The Petya attack is yet another reminder that many organisations are neglecting to patch their systems, allowing malicious actors to exploit weaknesses. Companies must do more to protect their networks, their data and, ultimately, their cash.

News: New computer virus spreads from Ukraine to disrupt world business

IoT breaches hit US firms

BY Richard Summerfield

Nearly half of all companies in the US using an Internet of Things (IoT) network have been the victims of recent security breaches, according to a new survey from Altman Vilandrie & Company.

The survey, ‘Are your company’s IoT devices secure?’, which included nearly 400 organisations, notes that security systems protecting 48 percent of organisations’ IoT networks have been breached at least once in the last two years. Overall, the cost of the IoT security breaches represented 13.4 percent of smaller companies’ annual total revenues. For larger companies – those with annual revenues in excess of $5m – the cost of a breach can run into the tens of millions.

“While traditional cybersecurity has grabbed the nation’s attention, IoT security has been somewhat under the radar, even for some companies that have a lot to lose through a breach,” said Altman Vilandrie & Company director Stefan Bewley, who co-directed the survey. “IoT attacks expose companies to the loss of data and services and can render connected devices dangerous to customers, employees and the public at large. The potential vulnerabilities for firms of all sizes will continue to grow as more devices become Internet dependent.”

The survey also highlights a connection between the amount companies spend on IoT security and the likelihood that they endure a breach. Typically, those companies that have not been breached have invested as much as 65 percent more in IoT security than their counterparts. Preparedness is key, though the risks for companies of all size, and at all levels of preparedness, will continue to grow as more devices become internet-dependent.

“We see it being critical for security providers to build a strong brand and reputation in the IoT security space. There are lots of providers developing innovative solutions, but when it comes to purchasing decisions, buyers are looking for a brand and product they trust,” said Ryan Dean, a principal at Altman Vilandrie & Company, who co-directed the survey. “Price is a secondary concern that buyers tend to evaluate after they have narrowed their options down to a few strong security solutions.”

Report: Are your company’s IoT devices secure?

Detection and understanding: getting cyber security off the back burner

BY James Williams

A “worrying” number of UK businesses have no formal plan to protect themselves from a cyber attack – a position that has improved little since last year – according to a new survey from the Institute of Directors (IOD) and Barclays bank.

The survey, ‘Cyber security: Ensuring business is ready for the 21st century’, reveals that although 94 percent of UK businesses believe that the security of their IT software is crucial for protection, only 56 percent have a system in place to preserve their data and devices.

In addition, only 44 percent of survey respondents said their company provided cyber awareness training schemes for staff, a figure deemed to be a “significant problem”. Pointedly, the survey states that the key cyber security vulnerability is human error, and that such errors become ever more likely in the absence of training or clear guidelines as to what constitutes appropriate good practice.

Furthermore, despite the number of cyber attacks that over the last year, as many as 40 percent of survey respondents admitted that they would not know who to contact to report online fraud – an unawareness which will become much more acute in May 2018 when the new General Data Protection Regulation (GDPR), which makes companies much more accountable for their customers’ data, comes into force.

“Cyber criminals attack systems, data and networks virtually without intervention and traditional defences are no longer adequate”, said Troels Oerting, group chief information security officer at Barclays. “For the financial sector in particular, the game has changed. Barclays has already implemented a strong protection for our business and we will continue to adapt to the rapid change in cyber space.

As part of its bid to tackle the cyber security issue, the UK government has taken a number of positive steps in the last year to protect business and consumers, with the opening of the National Cyber Security Centre (NCSC) one of the more high-profile initiatives. By bringing together several different agencies and placing the NCSC within the Government Communications Headquarters (GCHQ), the aim is that UK authorities will be well-placed to detect and understand cyber threats. That said, the survey makes clear that the ultimate responsibility for businesses in the UK will always lie in the boardroom.

Mr Oerting concluded: “For centuries, society and banks have steered through unprecedented events. Cyber crime is another challenge, and it too can be managed by implementing a strong strategy built on resilience and intelligence.”

Report: Cyber security: Ensuring business is ready for the 21st century                    

Millennials key to worldwide cyber security workforce shortage, says new study

BY Fraser Tennant

A severe shortage of talent in the information security workforce is looming, with employers needing to look to millennials to fill the gap, according to new research from the Center for Cyber Safety and Education, published this week.

The research, part of the Centre’s eighth Global Information Security Workforce Study (GISWS), which includes feedback from over 19,000 information security professionals worldwide, indicates that employers must look to millennials to fill the projected 1.8 million information security workforce gap that is estimated to exist by 2022. This is a 20 percent rise from the 1.5 million worker shortfall forecast by the GISWS in 2015.

The publication of the GISWS coincides with a major initiative to tackle the UK skills deficit due to a lack of millennials recruited into the field: the National Cyber Security Centre, which was officially opened this week in London.

"Supporting and developing the next generation of cyber security talent is essential to the future of the industry,” said Richard Horne, cyber security partner at PwC. “We are on track to recruit more than 1000 technology specialists over the next four years at both graduate and experienced levels. It is important to help graduates experience the many different paths a career in this field could follow by offering a rotation programme around our teams, ranging from threat intelligence and incident detection and response to security transformation programmes and legal and regulatory compliance.”

The 2017 GISWS features a series of reports and analyses focusing on millennial respondents, with key takeaways for employers and hiring managers as to how they should go about attracting and retaining the millennial workforce. These include: (i) millennials value career development opportunities and are more likely to pay for them, if not offered by their employers; (ii) they are more likely to aspire to become security consultants than move into managerial roles within an organisation; and (iii) salaries were not the highest priority for millennials, but they do receive higher salary increases than other generations.

Mr Horne continued: “Cyber security roles can often be seen as purely technical but today's well-rounded cyber security expert has a diverse skillset, with not only technical knowledge but also wider business skills like creativity, organisation, relationship-building and communication."

With addressing the impending information security workforce shortage clearly a major concern, David Shearer, chief executive of the Center for Cyber Safety and Education, is confident that millennials “are the future of cyber security and hold the key to filling the information security workforce gap".

Report: Meet the Millennials – the Next Generation of your Information Security Workforce

©2001-2025 Financier Worldwide Ltd. All rights reserved. Any statements expressed on this website are understood to be general opinions and should not be relied upon as legal, financial or any other form of professional advice. Opinions expressed do not necessarily represent the views of the authors’ current or previous employers, or clients. The publisher, authors and authors' firms are not responsible for any loss third parties may suffer in connection with information or materials presented on this website, or use of any such information or materials by any third parties.