Cybersecurity and responsible data use – critical issues for a digitising world
Shailesh Haribhakti [GCB.D]
Chartered Accountant | ESG | Doctor of letters - ITM University | Board of Director | Hyper curve of DAQ emerging
As the world remains on the path of aggressive digitisation, post COVID, attention is rapidly shifting to Cybersecurity and Responsible Data use. Data sets are being created and are moving economic activity in a completely different way. Virtually the entire physical world is being represented digitally and all work, movement of goods, people and services are proceeding virtually. Every human being is in search of an Occulus headset to participate in this revolution.
VR-AR are taking wing, news wars are erupting and being extinguished all over the world. New relationships are being crafted and old norms and businesses are unravelling! In this milieu, Boards are reaching out to identify cyber risks and are overseeing data protection and responsible use( prevention of misuse of data obtained under an NDA or that which is copyrighted). Even Medium-sized businesses are victims of 40%+ of cyberattacks today, and this number continues to increase. Hackers, are finding it tougher and tougher to attack larger companies due to the cyber fortresses they are building and so their attention is turning to SMBs.
The threat arena comprises critical data leaks, unacceptable interface controls with digitised upstream customers, Trojan horse attacks to larger ecosystems by penetration through weak SMB systems, non- entombed data, causing duplicate payments. The most common cyber threat delivery mechanisms are phishing, malware, ransomware, denial of service, and impersonation. This can result in huge financial losses, business continuity disruptions, data losses, and employee demotivation.
A framework to consider:
1. Protection: establish infrastructure to capture data sets and sharpen Internal Financial controls to support the business model. Also spread awareness about responsible data use so that reputation of the enterprise remains protected. Use the COSO framework. The aim is to contain the impact of breaches and to build resilience.
2. Early Detection: Choose Auditbots that will monitor and detect unusual data patterns. Deploy them on a weekly cycle. Implementing the right strategy can auto-detect suspicious activities before they spread. Pro action is better than correction!
3. Response& Recovery (R&R): An agile response & recovery system is very important, especially in today’s remote employee workforce model. A clear response plan, with well-defined processes, clear roles and responsibilities, and an adequate communication plan are critical to R&R.
4. Compliance: This area has become very important especially as all processes are moving online. For instance, the EU’s General Data Protection Regulation (GDPR) and NYFDS have several compliance requirements when it comes to data storage, breaches, and response plans. Digitise all compliance with laws, regulations and protocols. Staying compliant not only is mandatory but also will make business stronger and less susceptible to threats.
5. Build employee awareness: Make password refreshment a religion. Unaware employees are the most vulnerable to threats such as phishing, social engineering, etc. Creating a well-informed cybersecurity culture is important.
6. Customise: decide on the basis of a risk analysis, the specific tools to deploy.
It is critical to consider:
1. Inventory of all business-critical assets, information, data, and reports. Data is your most valuable asset. Capture data sets as they occur.
2. Extend cyber security to vendors, partners, customers and employees. The APIs that connect you to them must be encrypted.
3. Prioritise external-facing online systems e.g., eCommerce websites, vendor portals, etc. if applicable. Ensure that you install protective software.
4. Ensure all digital devices (like laptops, devices, phones) are in scope, especially given that several of us are working from home today.
5. Conduct a detailed audit/assessment to identify potential gaps and understand levels of severity.
6. Build a plan to address the gaps; use planning services/tools, like threat modeling to help you plan better.
7. Do not be constrained by lack of in-house expertise – work with partners who are experts in this space and can provide a complete range of security solutions.
8. Managed services are a great way to resolve the skill gap issue. They are cost-effective with better, tried-and-tested solutions.
9. Continuous monitoring and regular testing of the cybersecurity setup is important. Very much like testing your home security system.
10. Execution of the plan is-key.
Cybersecurity is not as expensive as it once was. Neither is it as intimidating as it was. It is easy to get started. Get an audit done and understand where you stand and what options you have.
at
3 年Thanks for the great insights. We have an excellent report on Inwood Research on Cyber security which you might want to look at
Advisor at ENQUBE Collaborations
3 年Excellent very informative and with clear cut action plans for Cyber Security. Regards
“WHAT IF ??” ARTIFICIAL INTELLIGENCE CONSULTING as applied to Real Estate Customers and Agents and to Businesses ????
3 年Cyber security requires airtight architecture of data systems, continuous twicking to address new threats, auditing to make sure it works and oversight to make sure appropriate Human Resources are involved.
CA | CISA | CFE | Dip IFRS (ACCA UK)
3 年Great insights!!! Audit plays a critical role in ensuring overall cybersecurity. BCP capabilities in R&R for organisation and it's vendors too plays an important role.
Former MD & CEO, BSE & ICEX, Independent Director, Founder, Advisor, Business Growth Strategy, Mentor
3 年Looking forward to a new insight from you. As always.