Search
Close this search box.

Avoiding the catastrophic cost of lax cyber security

With Sony recently setting aside $15M to investigate the reasons for and remediate the damage caused by last year’s data breach, many organisations, from large enterprises to small business, are wondering what they need to do make sure they aren’t the next big data breach headline.

With Sony recently setting aside $15M to investigate the reasons for and remediate the damage caused by last year’s data breach, many organisations, from large enterprises to small business, are wondering what they need to do make sure they aren’t the next big data breach headline.  

The good news is that most data breaches can be prevented by a common sense approach, coupled with some key IT security adjustments. 

Please see below for commentary from Benny Czarny, Founder and CEO, OPSWAT.

Employee security training is an absolute necessity.

 I cannot emphasize this point enough. Even the most sophisticated security systems can be compromised by human error. The Sony breach started with phishing attacks. People still use USB devices from unknown sources, which is allegedly how the Stuxnet worm was delivered. Your network is only as safe as your most gullible employee.

Access to executable files should be limited to those who need them to complete their duties.

Many threats are borne via self-extracting files, therefore limiting the number of employees who are allowed to receive this file type limits your exposure. Your IT department absolutely needs the ability to work with executable files. Bob in accounting? Not so much!

MSOffice documents and PDFs are common attack vectors.

Vulnerabilities are identified in MSOffice and Adobe Reader on a regular basis. While patches are typically released very quickly, if the patches are not applied in a timely fashion the vulnerability can still be exploited. As an everyday precaution, document sanitization is recommended to remove embedded threats in documents.   

Data workflow audits are essential

Data can enter your organisation through many different points—email, FTP, external memory device, etc. Identifying your organization’s entry points and taking steps to secure them is a critical step in avoiding data breaches. At a minimum, scanning incoming and outgoing email attachments for viruses and threats and implementing a secure file transfer solution should be considered. 

Store sensitive data in separate locations.

Simple data segregation could have mitigated the impact of the Sony breach. The hack exposed both internal communications and unreleased video files. Had the videos and emails been stored on two separate systems some of the damages may have been prevented.

Internal and external penetration tests are critical.

Internal testing is valuable tool, but hiring an outside party to attempt to breach your network will identify security holes your team may have missed.

Keep your security architecture confidential.

You may be excited about your innovative networking solution or new cloud-based storage system, but think twice about making any of that information public! The more your attacker knows about your systems the easier it is for them to tailor the attack.

Remember that traffic generated internally to your security system may still be suspect.

The Sony malware connected to an internal security system to impersonate legitimate traffic to disguise its malicious nature.

Multilayer defense is needed. 

I like to describe defense in depth by comparing it to the defense systems you might see at a castle; it could be defended by a large stone wall, followed by a deep moat, followed by a draw bridge, followed by an Iron Gate, etc. A single layer of defense is not sufficient for your data – it must be protected by multiple systems working in parallel. That way if one layer of defense is breached your data is not exposed.

Finding your weakest security link is your top priority.

Every office has one, and it will vary wildly from organization to organization. It might be that employee with their passwords taped to their monitor. It might be the deprecated Linux server everyone seems to have forgotten about. You might not be looking for those weak links – but rest assured that cyber attackers are. The question is: Who will find them first?

Read more

Latest News

Read More

Work-related stress and burnout are costing the UK economy £28bn a year

15 April 2024

Newsletter

Receive the latest HR news and strategic content

Please note, as per the GDPR Legislation, we need to ensure you are ‘Opted In’ to receive updates from ‘theHRDIRECTOR’. We will NEVER sell, rent, share or give away your data to third parties. We only use it to send information about our products and updates within the HR space To see our Privacy Policy – click here

Latest HR Jobs

University of Reading – Human ResourcesSalary: £27,979 to £32,982 per annum

Trust Head of Human Resources. Grade 11 SCP 31-34 £45,416 – £48,706. Full Time, 36 hours per week, Full Year. The main purpose of the

Come and join the NCA Family. This is the place where we support colleagues to be their professional best so they can provide excellent patient

Salary Scale £44,000 – £50,000. Responsible to Director of Finance and Workforce. Closing Date 28th April 2024. Interviews Planning for w/c 13th May 2024. £44,000

Read the latest digital issue of theHRDIRECTOR for FREE

Read the latest digital issue of theHRDIRECTOR for FREE