Eleanor Hawkins
May 27, 2016

Surviving the cyber attack of tomorrow

We have to change the way we think about cyber security - it's getting a lot worse ...

Robert Masse talks to workshop participants at the C2 conference
Robert Masse talks to workshop participants at the C2 conference
PARTNER CONTENT

Over the past year we’ve seen more businesses fall victim to security breaches. TalkTalk hit the headlines in late 2015 after an attack on its customer records saw thousands of files with personal information leaked. JP Morgan Chase, Target, TK Maxx, Home Depot, eBay — have all fallen victim to cyber attacks over the last two years.

Robert Masse, a partner at Deloitte, said you don’t put measures in place because you might get hacked, you prepare for the fact that you will. "Everyone gets hacked," he said. "We have to change our way of thinking to, ‘When will we get hacked? And how will we recover?’ "

Masse ran a workshop at the C2 conference in Montréal that took participants through the steps of a cyber attack. He also offered useful nuggets on how innovation and cyber security go hand-in-hand when it comes to protecting businesses.

Masse identified the root causes of infiltration as accidental, where things are published by mistake or by human error, hacking, or loss or theft of hardware; the "threat actors" are mainly hackivists; criminal rings; nation-states; insiders; or quite commonly, disgruntled employees.


See more C2 coverage


Here are the top 10 cyber challenges for enterprises:

  • Legacy systems that have not been patched or adequately secured

  • Operating without central security policies and standards

  • Lack of central management and monitoring of critical assets

  • Focus has been primarily on looking down the perimeter

  • Malware defenses are inadequate to address today’s threats

  • Cyber incident response capabilities are basic or nonexistent

  • Often ignoring or not considering insider threats

  • Siloed operating model: lack of enterprise risk awareness

  • Heavy reliance on technology without adequate operational processes and procedures

  • Supply chain vulnerabilities are not measured or managed

The impact of cyber attacks is damaging. Consumers lose trust in the business; reputations are left in ruins; and in serious cases, financial fraud has a devastating outcome for consumers — and the business. But although things may be getting worse, businesses are beginning to take action and ensure they have proper response plans in place.

Apart from the obvious resolutions such as encrypting data, securing hardware and ensuring proper procedures are followed, cyber security will come with culture changes in our businesses.

 
Source:
Campaign US
Tags

Related Articles

Just Published

6 hours ago

40 Under 40 2024: Mamaa Duker, VML

Notable achievements include leading VML through a momentous merger, helping to reel in big sales, and growing WPP’s ethnic and cultural diversity network by a mile.

6 hours ago

Will you let your children inherit a world without ...

A raw, unflinching look at the illegal wildlife trade, starring Ray Winstone, will force you to confront the horrifying truth... and act.

8 hours ago

Campaign CMO Outlook 2024: Why marketers still want ...

In the second part of the Outlook series, global marketers weigh in on Amazon Prime’s move into ad-tier streaming, how video-on-demand will reshape strategies, and where it's still falling short.

9 hours ago

Jaguar's identity crisis: A self-inflicted wound ...

Jaguar's baffling attempt at reinvention from feline grace to rock-based abstraction is a masterclass in brand self-sabotage, says Resonant's Ramakrishnan Raja—and it risks destroying the marque entirely.