Cybersecurity Script
Cybersecurity Script
changed in the last 30 years, but a lot of security is built in, and it’s not sexy until the
moment it saves your life. You’ve got bits that are hidden – airbags – and bits there to remind
you to be safe like seatbelts…Some of it is about good behavior and good attitude, some of it
is about physical security to remind you there is a risk, and some of it is baked in to save
you.”
Technology has become more than a supplement to a company’s operations, and in many
cases, the assets living on their network are their core operations. This is compounded by
the fact that hacks are becoming commonplace due to the rise of mobile usage and internet
What Is a Cybercrime?
Put simply, a cybercrime is a crime with some kind of computer or cyber aspect to it. It can
Categories of Cybercriminals
Financially motivated organized crime groups: Most of these groups are located in Eastern
Europe
sensitive information and disrupt enemies’ capabilities. They are generally the most
Activist groups, or “hacktivists”: Are not usually out to steal the money. They’re out to
operating from within a company. However, they may not engage in cybercriminal activities
intentionally; some might simply take a contact list or design document without realizing the
volumes of data or traffic through the network until it becomes overloaded and
stops functioning. The incoming traffic flooding the victim originates from many
PHISHING
Often posing as a request for data from a trusted third party, phishing attacks are
sent via email and ask users to click on a link and enter their personal data. It
There are a couple concerning factors. First, phishing emails have become
sophisticated and often look just like legitimate requests for information. Second,
demand phishing services and off-the-shelf phishing kits. Perhaps most concerning
is the fact that dark web services have enabled cybercriminals to refine their
campaigns and skills. In fact, phishing emails are six times more likely to be
MALWARE
stripe data from a payment card (e.g., ATMs, gas pumps, POS terminals). It’s
relatively quick and easy to carry out an attack like this, with the potential for
Costs to Firms
Three years ago, the Wall Street Journal estimated that the cost of cybercrime in
the US was $100 billion. Other reports estimated that the figure was as much
as ten times higher than this. In 2017, the average cost of a data breach is $7.35
damage. Beyond monetary concerns, a cyber breach can also ruin intangibles,
by 18%.
Cybersecurity Challenges
criminal attack groups now echo the skill sets of nation-state attackers. They have extensive
resources and a highly-skilled technical staff that operate with such efficiency that they
maintain normal business hours and even take the weekends and holidays off…We are even
seeing low-level criminal attackers create call centre operations to increase the impact of
compromising employee information. For example, the 2013 Target data breach
credentials being stolen from a third-party heating and air conditioning vendor.
A 2013 study indicated that 63% of that year’s data breach investigations were
Due to a growing number of online targets, hacking has become easier than ever.
In consumer banking, usage of mobile devices and apps have exploded. According
to a 2014 Bain & Company study, mobile is the most-used banking channel in 13 of
weigh the potential fraud losses with losses from a more inconvenient user
these added security risks, allowing customers to access their accounts via voice
if your alarm rings at 7:00 a.m., it could automatically notify your coffee maker to
are over one billion IoT devices in use today, a number expected to be over 50
billion by 2020. The issue is that many cheaper smart devices often lack proper
security infrastructure. When each technology has high risk, the risk grows
REAL-TIME INTELLIGENCE:
Real-time intelligence is a powerful tool for preventing and containing cyber
A 2013 study by the Ponemon Institute revealed that IT executives believe that
COMPLEMENTARY ACTIONS:
entire enterprise, all endpoints, mobile devices, applications, and data. Where
who and what others can access. Make it a habit to review the use of
credentials with third parties. You could even take it a step further with a
parties comply with your company’s security policies. Your SLA should give
ransomware, which freezes computer files until the victim meets the
servers get locked because you wouldn’t need to pay for access to your data.
software. They are often temporary fixes between full releases of software. A
patch may fix a software bug, address new security vulnerability, address
Anti-hacker Insurance
For an organization to determine how much cyber insurance it needs, it should measure its
cyber risk. It must understand how their assets are impacted by a cyber attack and how to
prioritize them.
Bug Bounty Programs
Another new idea in the industry is something called a bug bounty program, where
Management, “There are still a lot of people sitting astride larger companies
who still regard it as something the geeks look after, rather than it being a
A Deloitte white paper suggests creating a dedicated cyber threat management team and
chief information security officer (CISO). For example, neither JPMorgan nor Target had
(being careful around opening email attachments, where they are surfing),
Parting Thoughts
is, “What, then? Are we just supposed to stop innovating for fear of attacks?” The
answer is, not exactly. However, it could be helpful for companies to view
cybersecurity as a matter of ethics. That is, cybersecurity should not merely be a
matter of technology, but one of morality as well. After all, is it ethical to create
and sell technology that leaves consumers vulnerable? With Silicon Valley’s
attitude.
However, there is precedent in other sectors. For example, the American Medical
respective ethical codes. Doctors must pledge the Hippocratic oath, one of the
oldest binding documents in history, which mandates that doctors vow to protect
their patients. Similarly, lawyers follow a Model Rules of Professional Conduct,
We’d all do well to remember that though technology may come and go, right and
wrong never changes.