It only takes one loophole – Protecting your organization from cyber threats

Share Your Thoughts: Facebooktwittergoogle_pluslinkedin

In our continuing ‘life imitates art imitates life’ series on the hit Netflix show Black Mirror, we reiterate that although satirical in nature, aspects of every episode can be applied to today’s reality related to crisis and risk. The futuristic, sci-fi show often exposes the darker side of technology, including the vulnerabilities of Autonomous Drone Insects (ADI’s).

The murder-mystery plot of the final episode of season 3, “Hated in the Nation,” builds upon the hacking of ADI’s. The ADI’s are artificial substitute bees developed by a company to counteract a sudden colony collapse disorder in the bee population. The hacker programs the ADI’s to find and kill selected people, based upon the online hashtag #DeathTo (name).

Related: What Black Mirror and Cyber Security Have in Common

Hacked ADI’s may not be a big concern for your organization, however, system failures, cyber incursions, and other scenarios should be. One weakness in cybersecurity can allow a hacker entry into your organization’s system resulting in a crisis. Large, small, public, and private organizations are at risk. Understanding that a cyber breach impacts an organization on many levels (human, operational, reputational, and financial) is critical.

Constant Vulnerabilities and Long-term Consequences

The repercussions of a cyber-attack span for weeks, months, and years. We’re still learning more information about the 2017 Equifax Breach that impacted more than 147 million people. This week Equifax agreed to a number of data security rules under a consent order with eight state financial regulators:

The order describes specific steps the credit bureau must take, including conducting security audits at least once a year, developing written data protection policies and guides, more closely monitoring its outside technology vendors, and improving its software patch management controls. Equifax has said that the attackers gained access to its systems last year through a known software flaw that was inadvertently left unfixed for months.

The eight states include: Alabama, California, Georgia, Maine, Massachusetts, New York, North Carolina, and Texas.

Download the infographic: Cybersecurity is no longer optional – plan to prevent threats

Another recent attack targeted Singapore’s SingHealth. In what is Singapore’s largest breach, non-medical personal data of 1.5 million patients was extracted from the organization’s system on June 27th. An additional 160,000 patients’ data was compromised.

How is your organization prepared to mitigate a cyber attack?

Contact Firestorm Icon

Participants of our 3rd Edition IT Resiliency Planning Assessment Study revealed tools used to improve their IT Resiliency plans:

  • 88% utilize automated network monitoring
  • 82% monitor their network 24/7
  • 20% use artificial intelligence
  • 16% utilize machine learning

IT professionals understand the necessity of a robust resiliency plan, however, barriers exist when creating and maintaining plans. Indicated by participants in our IT Resiliency Planning Assessment Study, obstacles include a tight budget (31%), and lack of resources (27%). When justifying the importance of their resiliency program, professionals use regulations (70%), financial loss/cost analysis (70%), and industry standards (58%) to combat their planning challenges.

Learn more about Firestorm Cyber Risk Management

It only takes one loophole for a hacker to enter your system and cause a crisis. Stressing the importance of cyber security to senior leadership is essential. Find out how your IT Resiliency program stacks up against others in the industry by reviewing our 3rd Edition IT Resiliency Planning Assessment Report. Contact us to pre-order your report.

Share Your Thoughts: Facebooktwittergoogle_pluslinkedin