By Paul Jolliffe - Lead SDM: Security, T-Systems South Africa.
- 2018 set to be a challenging year for cybersecurity professionals.
- Understanding security maturity against current security landscape is key to adapting accordingly.
- Regular assessments and simulations help to understand security maturity.
- Awareness is critical to preventing cyber attacks.
Cybersecurity was a massive concern for most organisations in 2017, and looks to continue to be a headache for CIOs in 2018. Symantec recently re-leased their cybersecurity predictions for 2018, listing the many concerns that CIOs and InfoSec specialists may have in store for them this year. The outlook is bleak, and there is not sufficient knowledge of the threat landscape to pre-vent attack. Organisations need to act so as to avoid potential threats as well as be prepared in the event of a breach.
It is vital that organisations understand their own current security maturity, taking into account the existing cyber threat landscape and the industry in which they operate. This cannot be a generic check. Different parameters exist for various industries and every industry has a different threat or risk profile. A financial services provider for example, which deals with sensitive information on a daily basis will have different security requirements to say, a glass manufacturer.
Despite different threat profiles, every industry also has exposure to the same types of threats that are out there. As the Symantec report evidences, there are several distinctive threats to be cognisant of. Ransomware was the most talked about threat last year, however lesser publicised threats such as data theft, identity theft and financial trojans are also leaving considerable damages in their wakes.
A cyber-attack can do a lot of damage. Beyond the financial impact of lost data, compromised identities or having to pay a ransom to recover data- there is also reputation damage to consider. People are more reluctant to do business with an organisation known to have suffered data losses.
Cybersecurity maturity evaluation
The first port of call for any organisation should be to evaluate and understand where their weak points are, not just currently but in line with their business strategy too. Current security controls need to be reviewed frequently in line with the business trajectory, while also incorporating any possible digital trans-formation strategies. Current and potential gaps should be identified and priori-tised, and a security roadmap should be implemented for remediation- incorporating whatever changes are required, budget permitting.
Any planned digitalisation needs to be measured against current security controls to evaluate their suitability and sustainability. New technologies, applications and programs open up new vulnerabilities, and therefore existing security controls may not be sufficient.
One key factor to consider when planning a security strategy or roadmap is the shortage of proper cybersecurity skills- particularly in South Africa. An organisation planning on executing a complex digital strategy with equally complex cybersecurity demands, should consider outsourcing its security to a reputable and knowledgeable partner. This will ensure that security remains current and equipped to handle the myriad of threats out there.
Awareness, awareness, awareness
So important, it needs to be repeated frequently. Many security breaches occur simply because employees are not aware of how to work securely and responsibly. While assessing the security threat landscape and an organisation’s security maturity, they should also continually assess their internal awareness of both.
Frequent training and awareness programs can go a long way to reducing the risk of attack. Mindful employees are empowered with the knowledge of how to identify risk areas, handle any security incident and the appropriate reporting channels in the event of a breach.
A simple way to assess an organisation’s security maturity, identify weak points and evaluate internal awareness levels - is to conduct cybersecurity simulation exercises. Similar to a fire drill, by simulating a cyber-attack, such as ransomware and implementing the relevant procedures in response, a business can clearly spot the gaps and remedy its reaction plan.
A simulation addresses the entire response process- including the technology, skills and capabilities within the organisation to ascertain whether or not they are geared to handle the real deal. It also looks at the suitability of a business’ crisis communication plan and whether or not the breach is properly communicated to stakeholders and correctly managed from a remediation point of view.
Simulations can teach the employees within a business a lot about whether or not they are properly prepared to tackle a security threat, and what can be reasonably changed to ensure success.