Lessons Learned: With sophisticated cyber and ransomware attacks on the rise, don't lose sight of the basics

Lessons Learned: With sophisticated cyber and ransomware attacks on the rise, don't lose sight of the basics

We’ve witnessed a growing trend with hundreds of companies around the world falling victim to ransomware attacks. Hackers have targeted everyone from schools to grocery store chains to health care providers. The Colonial Pipeline incident demonstrated how these attacks can cause significant disruptions for businesses, customers, and even society at large.

As the former CEO of IBM, I know how important it is for companies to protect their systems and their customers’ data. Companies need to constantly raise the bar on taking preemptive action to address cybersecurity rather than waiting until it is too late. This lesson should be applied by governments and businesses in every industry, not just tech.

Most discussions about cybersecurity assume that the victims have succumbed to sophisticated government attacks and hackers. But that isn’t always the case. Many of the issues are caused by a failure to keep up with the basics.

The key to cybersecurity is to be proactive. Here are the three lessons everyone should keep in mind to protect their businesses/networks.

1.Keep revisiting the basics

For as sophisticated a problem as cybersecurity is, it is often an individual mistake that opens the door. Therefore, it is critical that you are routinely training your teams and reviewing access.

Most people already focus on the basics while they’re at work. Now, they need to think about it while at home, and their family members, too. Hybrid work environments have blurred the lines between the home and office, and the lines between work and personal technology.

Identity access — controlling who can access what, and granting access permission — is a constant issue. People coming and going from jobs, and sharing passwords in the process, is the number one way to create a situation — either intentionally or accidentally — that allows for bad actors to gain access to your network.

2. Accelerate the use of AI in Cybersecurity

Artificial Intelligence can be used to help spot the early warning signs of bad actors and prevent them from spreading trouble. AI can fill the gaps when there isn’t enough human training and capacity to address the issue. New talent pools can also be opened to you, when AI is used to help new employees do their cyber job.

Most times, you won’t see that your company’s network is infected, even though it could have happened a year in advance. It’s too complex for the human mind to do, and even too complex to write a program that can identify the issue. But AI can connect the unrelated dots and allow you to see early patterns.?

Our future is not man versus machine, but man with machine. You must fight tech with tech.

3. Put your effort into recovery and resilience?

Once you’ve revisited the basics to protect your network and adopted tools like AI to help you identify threats early, the next best thing you can do is have a plan to get back up and running as fast as possible.?And, be sure your plan has actually been tested.

Think about it like germs in your body. Good hygiene can limit your risk of getting sick. But if you do come down with the flu, what’s important is trying to stop it from turning into pneumonia. Early detection helps improve your odds of recovery.

For example, one common mistake people make on resiliency basics is failing to properly segment their network. If you have a flat network, something bad can easily move across the whole company. Network segmentation is like pruning a sick branch before it has a chance to infect the whole tree.

The best way to respond to a ransomware attack is to stop it from happening in the first place. By consistently revisiting the basics, accelerating the use of AI to supplement your security, and putting your effort into recovery and resilience, governments and businesses will be better prepared to resist potential cyber threats.

Bente Acking

Senior Consultant | Agile Delivery | SAFe certified | Founder CEO | NWiTA 2020 Role model | Winner of 400,000 in Call for Code | Speaker at IBM Think 2021 | COP27 Judge Youth Hackathon | ex-IBM

3 年

Just first Ginni, you taught me so much! I listen to you and learned from you at IBM for so many years. Thank you! ?? I have now started my own company. "Think Big!" Yes this is so wise! We use AI to filter toxic use of our service and stop anyone with a toxic intent, so we will contribute to combat crime with AI wherever our web app is used.

回复

Very Wise words, I hope many will heed them and take appropriate action

回复
Rob Dyson

Global OT / IoT Security Services Business Development Leader at IBM

3 年

Really great to see a prominent?industry leader such as Ginni Rometty address one of the biggest risks to governments and businesses which is the cyber security risk. Still an area needing more leadership attention and proactive company investments based on risk and not IT budgets. With attacks increasing in areas of critical infrastructure that can significantly impact entire economies and livelihoods this can no longer be an afterthought. I agree with all the comments about Board Room Cyber Security representation. There needs to be someone with these skills at the table.

回复
Andrea Sayles

Information Technology ? Resiliency ? Global Leadership ? Security Services ? Business Transformation

3 年

Ginni - Glad to see that you added Recovery and Resilience to your list. As we all know, no matter how good your prevention and detection tools/processes are, it's only a matter of time before corporations will be attacked, so there needs to be additional focus and investment on how to recover critical systems, infrastructure and processes WHEN the attack happens.

Leesa S.

李莎·索洛德尔 | 创始人兼管理合伙人 | R3i资本 | 深科技成长与早期风险投资 | 她爱科技 | SG、LU、TX的元宇宙加速器中心 | 教育者 | 老兵

3 年

Ginni Rometty in my experience too often Corporations still take a point in time bandaid approach to cybersecurity leaving them completely exposed with a long list of remediations that they often are least willing to invest in, for the balance for the year. What flaws or benefits do you see in a lifecycle risk management approach to cyber risk governance in order to acquire and maintain an adequate cybersecurity risk posture? In Asia, we are still facing more than 300 days time to detection. The hackers are already living with us, it's just a matter of when, and how they will strike. As a Director, I have found the NACD oversight handbook invaluable in the work that we do at the R3i Ventures, and the House of DeepTech and House of MedTech . https://www.oas.org/en/sms/cicte/docs/ENG-Cyber-Risk-Oversight-Handbook-for-Corporate-Boards.pdf

回复

要查看或添加评论,请登录

Ginni Rometty的更多文章

社区洞察

其他会员也浏览了