Time to Secure - Everything

Time to Secure - Everything

Never before has cybersecurity been so important to our daily lives. Breaches effect everyone, and failure to protect personal information is no longer acceptable. Yet we see companies of all sizes continue to make the same mistakes.

First, investment in cybersecurity tools and resources needs to be a priority. What we see in various surveys and reports is that the boardroom is actually reducing their investment in tools, focusing on profits instead. However, the old approach of risk management needs to be recalculated. It is no longer a question of if the company is breached, but when.

After a breach occurs, it is too late for making investments, as the impact to a company is substantial. A loss in consumer trust and confidence has a direct impact on the companies bottom line, and usually in drastic proportions. There needs to be more focus on preventing breaches to begin with, rather than taking the risk and doing as little as possible.

Investment in new tools is paramount. Studies have shown that many of the tools used today are obsolete and insufficient for the types of breaches we are currently seeing. According to the Mandiant "Security Effectiveness Report 2020"; only 9% of security events generated an alarm of some sort in current tools. Some 53% of events were missed by security controls. This is unacceptable by any standards, and can be resolved through more investment in tools and training.

Speaking of training, many of the attacks seen in the last year have started as phishing attacks. Hackers are getting more and more sophisticated in their tools and whether through email or text messaging, it is becoming harder and harder to determine if a message is legitimate or not.

One example hitting Asia and Europe right now is the Flubot malware. Text messages telling the recipient that their package is out for delivery and providing a link for delivery status is the most commonly used, but Europe recently reported text messages declaring the recipient's picture has been posted on a website, providing a URL to a rogue website. Most people do not know how to recognize the tell-tale signs of a phishing message, and hit the links delivered.

A training program teaching employees how to recognize the signs of phishing emails and text messages should be something every organization is doing on a regular basis (I just went through one here at Oracle and it was excellent!). And while we are at it, we should be training employees about basic hygiene as well (cyber hygiene that is .... rest assured we don't have to train them on personal hygiene).

Passwords continue to be a problem everywhere. If the passwords are not obtained through phishing, its usually because default passwords are not changed, or because passwords are so easy that hackers do not need help in figuring them out. Passwords are a pain. They are difficult to manage and it requires a real discipline to remember to write down when you change a password.

Password managers are fine, but when you are accessing things through multiple devices, password managers don't help. Not to mention if a password manager gets hacked, you are exposed (full disclosure ... I have not seen any reports of this happening, but it still concerns me). Eliminating passwords is key, but we are still a ways off from that becoming reality in all networks.

Governments are now getting involved through regulation that will require reporting and possibly demonstration that adequate security controls have been put in place. A new bill circulating around the US Senate requires companies to disclose in their SEC filings who in their management team possesses cybersecurity skills and experience (S.808). I anticipate other countries will follow this trend to ensure that companies hire qualified Cybersecurity professionals as part of the management team. Its a good time to be a CSO/CISO!

We have seen a tremendous amount of activity in the last few years around security breaches. Many are not reported, or very little is shared. This has prompted the US Government to consider legislation that would require companies providing critical infrastructure to report to the Government within 72 hours all breaches (S.2407).

Likewise, the EU is pushing legislation requiring companies to report within 72 hours (NIS2). This legislation is being proposed in an effort to learn more about breaches in real-time rather than weeks or months afterwards, and provide a mechanism for sharing of information about breaches to a broader community.

And finally, all of this is happening so fast, while there is a shortage of cybersecurity professionals available to do the job. The last report I saw cited +4000 positions globally left unfilled because of a lack of qualified candidates. This is alarming, because it means our educational institutions are not delivering graduates in this area.

To solve this issue, the educational institutions around the world need to offer more programs and incentives for students to follow this path. But that will only work if companies incentivize through better pay and a path for promotions.

According to an (ISC2) 2020 Cybersecurity Workforce Study, 40% of cyber professionals polled had salaries cut and hours reduced. In addition, 23% were furloughed, and 9% moved to part time or contractor roles. This is the wrong direction for cyber investments.

As we continue to see threats and breaches increase dramatically, we can only hope that companies will finally realize that cybersecurity is just as important to their companies bottom line as product, if not more important. Investment in security should come before investment in R&D, and must be part of the equation whenever discussing new product introduction.

Failure to invest in cybersecurity tools and people will result in the collapse of many companies large and small. Hackers are highly educated and well funded, and they are coming after you next. Time to recognize the threat for what it is and ensure our networks and the data they hold are secure.

These viewpoints are my own and do not necessarily reflect the opinion of my employer. However I will say that Oracle puts security first, in every product. We take security very seriously around here.

Charles DeRoller

RF/ EMP and Infrastructure Resilience Advocate @ Armag

3 年

What if we just assume everything is compromised? We're in a race against cybercrime and the bad guys are ahead. Phishing emails get through screening daily, and I've been told a dozen times my SS#, banking info, etc. may have been taken; I know my credit card has been hacked twice. Not to say we want to do away with cyber defense, but wouldn't it make sense to position, both personally and corporate, with a presumption that critical, proprietary data has been or can be stolen?

回复
Clemmie Scott

CEO - A Change of Heart Ministries, INC

3 年

Travis, great article and informative at a professional level. I would like more information about how to detect current phishing attacks which are indeed more sophisticated. Retired folks who are out of the loop, are sitting ducks with diminished security acumen. Social media platforms, emails, and text messaging, are more challenging than ever for the average “retired” user to protect themselves, due to the sheer volume of phishing attacks.

回复

要查看或添加评论,请登录

Travis Russell的更多文章

  • The Price of Convenience

    The Price of Convenience

    My grandparents were sharecroppers in Dallas Texas. When they first married as young orphans, they lived in a covered…

    5 条评论
  • Why is 5G so important?

    Why is 5G so important?

    Wow. We have truly come a long ways in this industry.

    5 条评论
  • How I Learned to Learn

    How I Learned to Learn

    When I first started attending college (a very long time ago) I majored in music (yep, I was going to be the next rock…

    4 条评论
  • Stop and smell the roses

    Stop and smell the roses

    This past week I took some much needed vacation and spent some time with my daughters step-kids (which would make them…

    1 条评论
  • Encryption is not the answer

    Encryption is not the answer

    I am at Black Hat this week, enjoying the summer heat of Las Vegas while enduring death by Powerpoint. It seems that…

    9 条评论
  • Ahhhhh the life of convenience

    Ahhhhh the life of convenience

    That is my scale. The thing I step on every morning, so it can tell me the obvious - I am fat (it does tell me with…

    2 条评论
  • Germany should have been a wake-up call!

    Germany should have been a wake-up call!

    The latest attack at O2 Germany should have served as a strong wake-up call to the entire telecommunications industry…

    2 条评论
  • Get your product right

    Get your product right

    Went to TGI Friday's tonight for dinner. There was a sign as we walked in advertising their steak and lobster dinner…

  • That Wily Fox

    That Wily Fox

    I went to Best Buy yesterday, and roamed the store looking (and lusting) at all of the new gadgets and gizmos. I…

    3 条评论
  • Let's Fix the Real Problem!

    Let's Fix the Real Problem!

    There has been a lot of discussion of late around security of wireless networks. It seems that researchers have turned…

    4 条评论

社区洞察

其他会员也浏览了