Democratizing Cybersecurity Protects Us All
Akshay Bhargava
Product leader | GM | Board Advisor | Investor | Speaker | ex-McKinsey, 1Password, Oracle
Cybersecurity is a sophisticated art. It can truly consume the time and resources of IT teams as they work to safeguard valuable data from the growing risk of cyberattacks and data breaches. The technical nature of it, along with the specific expertise it requires, has created a workforce gap that many fear is nearly impossible to bridge.
In fact, the cybersecurity workforce gap has been reported to be over four million globally, causing an alarming void of security experts who are fit to protect business and consumer data. This gap is particularly painful for small and midsize businesses (SMBs) where recruiting cybersecurity expertise may be particularly costly or challenging. Unfortunately, with the average cost of a breach weighing in at a hefty $3.92 million, cybersecurity is not something any business – no matter the size – can afford to get wrong. This is especially concerning for SMBs where estimates have found that as many as 60% are forced to shut their doors after a cyberattack.
But the damage caused by a successful attack can extend beyond the SMB itself.
Not only will the SMB suffer in the event of a cyberattack, but the larger enterprises it partners with are also put at risk. Take the 2019 Quest Diagnostics data breach as an example. Nearly 12 million patients were exposed after hackers took control of a payments page for one of Quest’s billing collection vendors, AMCA, exposing account data, social security numbers and health information. The same attack also impacted 7.7 million customers of LabCorp. AMCA has since filed bankruptcy.
It’s also been reported that it was an email attack on a vendor of Target Corp. that exposed the credit card and personal data of more than 110 million consumers in 2013. The Target breach has been traced back to network credentials stolen from an email malware attack on a heating, air conditioning and refrigeration firm used by Target.
In each instance, the exposure of a smaller organization put a much larger enterprise at risk. There is hope though, that if we can democratize cybersecurity, SMBs could realize the same protections enterprises require, and we’d all be much safer as a result.
So, what can be done? How can SMBs achieve a cybersecure environment like their enterprise competitors? The key lies in automation and empowering employees.
Automation Unlocks Cybersecurity Democratization
Adopting security automation is an effective way to achieve cyber resilience without adding staff or cost burden. It’s the core of cybersecurity democratization. In fact, companies that fully deploy security automation realize an average $1.55 million in incremental savings when handling a data breach. Not only will automation relieve the pressure from continued staff and skills resource constraints, it’s also dynamically scalable, always on, and enables a more proactive security approach that makes the business exponentially more secure. When applying automation, consider each of these three critical security process areas:
1. Threat detection and prevention. Technologies including advanced analytics, artificial intelligence and machine learning give SMBs the ability to apply adaptive threat detection and prevention capabilities so that they can stay one step ahead of cybercriminals without added staff. By automating threat detection, powered by strong threat intelligence, SMBs can detect new, emerging threats while also increasing the detection and prevention of known threats that may have previously slipped past corporate defenses. Furthermore, they can reduce the noise from incident alerts and false positives from detection systems, improving overall threat detection and prevention success rates.
2. Incident response. If a successful cyberattack does break through, it can move throughout an environment like wildfire. Incident response time is critical to mitigating the severity of the damage, and for those SMBs impacted by the security skills shortage, having the response team needed to react fast is likely a problem. By automating incident response, organizations can greatly improve their cyber resilience. Adopt solutions that will automatically isolate, remediate and recover from a cyberattack:
· Isolate. By automating endpoint isolation SMBs are able to rapidly contain an infection while also minimizing disruption to the user. Effective isolation includes the automated containment of network, device and process levels. Advanced solutions will also impede malware from “phoning home” which will restrict further damage to the environment.
· Remediate. Automating remediation will quickly and effectively restore systems without requiring staff resource time or expertise. It will also allow CISOs to remediate endpoints at scale to significantly reduce the company’s mean-time-to-response.
· Recover. Finally, incident response should also provide automated restore capabilities to return endpoints to their pre-infected, trusted state. During this recovery process it’s also wise to enable automated detection and removal of artifacts that may have been left behind during the incident. This is essential to preventing malware from re-infecting the network.
3. Security task orchestration. To further relieve security staff while ensuring cyber resiliency, low-level tasks should be automated, including the orchestration between complex, distributed security ecosystems and services. This will ensure a more nimble and responsive environment in the event a cyberattack is successful. Cloud-based management of endpoints can help, specifically if it provides deep visibility with remediation maps. This allows CISOs to better coordinate response efforts and track the impact if a successful incident occurs.
Enterprise-grade security protection should be available for every company, not just those that have the large staff and resources to fund and apply it. Instead, cybersecurity technology needs to be easier to use and more affordable so that companies, regardless of their size or resources, can defend themselves from a growing influx of cyberthreats. By democratizing security through automation, we will all benefit from a safer, more secure world.
*Article originally published by CISO Magazine
VP of Marketing @Platforce, need help with ABM? let's help you orchestrate your first campaign! For free! Dm for details. #Pharma#ABM#SaaS#b2b
4 年Wow, great article! I am literally learning about cybersecurity from your posts Akshay Bhargava
Founder | CEO at Lensa Inc. | Passionate advocate for recruiting & HR tech that puts people first | Forbes Tech Council
4 年Really like these sentiments! Every company deserves a seat at the cyber security table.
Chief Operating Officer at ACT Community
4 年Hey Akshay, saw an article (on Beyond Trust, if I’m not mistaken) the gist of which was: studying the cyber-attack chain model by Lockheed Martin offers a means of minimizing losses and safeguarding information. Any thoughts on that specific approach? In my opinion, it’s always important to remember that IT environments vary from company to company and every organization’s strategy will need to be tailored to those specifics.
Naukri Maestro Certified Recruiter | Talent Acquisition | Making Hiring Less Tiring with Turing ?? | Full Lifecycle Recruitment
4 年Entrepreneurs put time and love into building a business, only to have it destroyed. I’m sure many business owners would be relieved to see cybersecurity democratized.
Lead and Demand Generation Consultant | Product Marketing | Account-Based Marketing | Marketing Automation
4 年Honda’s servers recently got hit - a disruption in their computer network that caused a loss of connectivity and really impacted their daily operations. Honda employees were sent home, it was that bad! Though Honda didn’t disclose the severity of the damage, enough details leaked to various tech websites to make it clear that daily operations were severely affected. Anyway I completely agree with you, Akshay - there’s never been a better time to make cyber security available to a broad spectrum of companies.