P2P

summer20212

Peer to Peer: ILTA's Quarterly Magazine

Issue link: https://epubs.iltanet.org/i/1397188

Contents of this Issue

Navigation

Page 12 of 84

W ithin just the past two years, multiple companies fell victim to high-profile cyberattacks. Businesses such as James Fisher and the Desjardins Group as well as multiple Asian port cities (including in Japan, Malaysia, Singapore, South Korea, and China), were attacked by hackers around the globe. The results were billions of dollars lost in productivity and other substantial damages. The attacks also compromised sensitive data, eroding trust between the affected businesses and their clients. Every single business needs to learn how these attacks happen and what they can do to prevent them. With multiple factors involved in why and how these failures unfold, from simple negligence to campus access issues to insider threats, security incidents vary in cost depending on the nature of the flaw that caused them. Businesses may have some control over the outcome—or none at all. The strongest defense for modern businesses across all industries is a deep understanding of the world's most common security threats and an unwavering commitment to holistic security. The Three Largest Security Failure Touchpoints Regardless of sophistication, almost all cybersecurity risks stem from one of the following touchpoints: employee negligence, insider threats, or technology liability. There are several ways that businesses can address security at each of these points. Every vulnerability requires a distinct solution, but it is possible for savvy businesses to assemble comprehensive defenses. The Threat of Employee Negligence In 2018, security incidents caused by negligent employees cost businesses an average of $283,281. Employees who are good at their jobs aren't necessarily good at identifying security risks. Workers can easily expose their employers to multiple risks that cost large amounts of money and dedicated productivity to rectify, including by: • Downloading malware - Through email, compromised websites, or embedded code in PDFs. • Dictionary passwords – Creating common passwords that barely meet security requirements. • Falling for phishing scams - Through email, direct communication, or compromised websites. Dictionary passwords are less common in the modern workplace due to software and network restrictions that demand special characters, numbers, and multiple letter cases in passwords. Malware and phishing are closely related as both involve unwitting employees actively providing information or downloading files that generate threat. The results of these errors can be costly, such as the Pemex ransomware attack that shut down its Mexican computer center for several days. While Pemex removed the RYUK ransomware, if it had afflicted more sensitive computers, the company may have been reduced to a single option: paying the money that the hackers demanded in exchange for releasing its computers. How to Prevent Insider Threats Insider threats shake down businesses from the inside out through the intentional actions of current or former employees or partners. The average insider security threat is twice as costly as employee negligence: compared to the $283,281 that negligent employee actions cost businesses in 2018, malicious attacks from insider threats cost 13 I L T A N E T . O R G

Articles in this issue

Links on this page

Archives of this issue

view archives of P2P - summer20212