BreachExchange mailing list archives
Is your enterprise breach-proof?
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Mon, 27 Apr 2015 18:29:39 -0600
http://www.financialexpress.com/article/tech/is-your-enterprise-breach-proof/67081/ Do you think your work related data is safe and beyond the reach of hackers? Do the news headlines on frequent breaches, hacks and heists worry you? It will be surprising, if your answers to the above questions are not in negative. The reality is that breaches are happening all around us. In this scenario, the question we need to ask is not whether your company’s digital assets will be attacked or not, but how ready you are to face the consequences as and when it happens. The situation is alarming and the threat seems believable when we put the some statistics into perspective. As per a recent survey conducted by PwC, in 2014 the total number of cyber security incident detected grew by 48% as compared to last year and most of these data breaches happened from within the organisation. Globally, the annual estimated reported average financial loss attributed to cybersecurity incidents was $2.7 million, a jump of 34% over 2013 as per PwC report. These numbers may not tell the full story as many organisations are unaware of attacks, while others do not report detected incidents for strategic reasons. However, the fact of the matter is that breaches are becoming extremely common in today’s connected world and organisations need to prepare urgently to deal with such situations. Simple acts of an employee’s mobile phone theft or a misplaced office laptop, have the potential to spur a series of complex cyber-attacks. As more and more devices make way to our workplaces and assets move to digital platforms, data breaches need to be assessed not as a threat but as a reality of our times. Today, an attacker does not necessarily need to break into a physical bank vault to rob it, he/she just needs to find a vulnerability in the bank’s digital armour. Data is the most valuable asset for any organisation and a loss can cause irreparable damage to brand reputation, trust and wealth. From an enterprise perspective, one needs to understand that data is at risk as much within the organisation as from external as well. It is also important to remember that third parties are often source of security risks. As the saying goes ‘prevention is better than cure’, enterprises need to focus on a prevention strategy against data breaches. The following factors are critical to assess how well-prepared an organisation is: * Fastness in identifying that your organisation has been breached * Extent of data loss and assessment of damage results * Time to recover and get back to business Security must be built in at every layer of the organisation—hardware, software, and network infrastructure—to ensure end-to-end protection. It is imperative for enterprises and consumers to adopt a streamlined, collaborative and end-to-end approach to data security. In order to mitigate the risks involved with data breaches, enterprises must adopt the following steps: Data audit: Just like a financial audit of bank accounts, assets, investments are critical to determine an organisation’s well-being, it is equally important to assess and review the most important asset of an organisation—data. But most businesses ignore this key component. The starting point in the data audit process could be analysing data storage points and modes of accessing the same. It is equally important to understand access controls, encryption and other defences. The next step is to make a list of current defences, costs, vendor and technology deployed. Vulnerability assessment: Organisations must perform security and vulnerability assessments on a regular basis against the entire digital architecture of an organisation. While assessments can be performed internally on an on-going basis, it is also recommended that third parties should be retained periodically to ensure highest standards of coverage. Diversify assets: Diversification helps to mitigate the impact of attacks and breaches. Just like a sound financial strategy, it is important to diversify an organisation’s digital assets. With due diligence and a robust diversification plan, one can prevent attackers from causing collateral damage. Breach-up sessions: Just like preparing for the big pitch or a business proposal, a breach is like a high pressure test and an organisation needs to be prepared adequately to handle the situation. Regular mock breach sessions will help develop a ready response to different breach situations.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- Is your enterprise breach-proof? Audrey McNeil (May 01)