How to Improve Cybersecurity for Your Business

Monday, December 11, 2017
How to Improve Cybersecurity for Your business

This article originally appeared in October on Clutch.co
https://clutch.co/it-services/cybersecurity/resources/how-to-improve-cybersecurity-for-business

Cybersecurity occupies a dark place in the public conscious. There are rarely (read: never) news stories that celebrate the strength of a company’s information security. Instead, we consistently hear about cybersecurity attacks, threats, and the failures of businesses in their attempts to respond.

Clutch spoke with Billy Cripe and Tim Roddy, the respective Vice Presidents of Global Marketing and Product for Fidelis Cybersecurity. They discussed how recent cyber attacks and the responses to them, particularly the Equifax breach that blew up in September, expose fundamental flaws in information security and shape the public’s dubious perception of cybersecurity. 

To Cripe and Roddy, the impact of cybersecurity simultaneously carries pain and gain. Companies suffer but (ideally) learn from their mistakes.

“The big, unfortunate piece about the headlines is that they haven’t been about innovation or forward progress. They’ve been about exploitation and harms and hacks,” said Billy Cripe, VP of Global Marketing for Fidelis Cybersecurity. “You never want organizations to have to learn their lessons by taking their lumps. That being said, learning still has to take place.”

The pain and gain associated with cybersecurity are unequal–there is much more pain than gain. However, the heightened awareness around cybersecurity caused by large-scale cybersecurity events provides an opening for businesses to make actual progress toward improving their cybersecurity.

This article explores four actions businesses can take to improve their cybersecurity using insights from Cripe and Roddy and Clutch's 2017 Cybersecurity Survey:

  1. Recognize cybersecurity as a core business process
  2. Understand the current information security landscape
  3. Build policy to combat internal risk
  4. Integrate response and automation to security operations

Use these four actions, and associated insight, to learn how to strengthen your business’s cybersecurity to combat an increasingly complex threat landscape.  

Recognize Cybersecurity as a Core Business Process

Failures in cybersecurity start with the structure and framework of a business. Many businesses view cybersecurity as existing under the umbrella and function of IT, instead of as an independent, core business function.

"We want to burst the myths about cybersecurity as esoteric software in the IT silo. Cybersecurity is something that helps a business run, just like a CRM system is something that helps a sales operations systems run," said Cripe. "Similarly, cybersecurity needs to be in that same mindset as other sorts of business operation systems." 

Your business should be prepared to respond to a cyber attack just as you would to an otherwise non-cyber related incident.

“Just like any large organization has a disaster preparedness plan and a crisis communication plan, a cyber attack response and communications plan are absolutely imperative,” said Cripe.

Understand The “Adversary:” Information Security is Complex

Businesses need to recognize the complexity of contemporary information security threats.

Businesses should view cyber threats as highly intelligent adversaries. An adversary takes advantage of security vulnerabilities and uses a multi-pronged approach to penetrate a business’ defenses.

“I’m not aware of any [victim of a cyber attack] that didn't have [defenses] in place,” said Tim Roddy, Head of Product at Fidelis Cybersecurity. “These adversaries are smart, talented, and well-educated. They’ll find a way in.”

One thing that makes these security adversaries so dangerous is that they currently outpace information security in the level of automation they use in their malware and attacks.

“The adversary is radically automated – they can create new variants of attacks, malware, and signatures, in microseconds through automation,” -Billy Cripe, VP of Global Marketing, Fidelis Cybersecurity

For businesses that have been victims of cyber attacks, simply having defenses is not enough for an adversary that possesses a high level of technical complexity.

Address Cybersecurity Threats With Policies That Reduce Internal Risk

Businesses need strong policies that recognize and address the mounting complexity of the information security threats and accounts for the internal security risk created by employees.

“Internal errors serve as vectors for entry. Internal threats that wreak havoc are usually driven by either a lack of training or awareness,” said Roddy.

The internal risk produced by a lack of training and awareness increases with an “expanding attack surface” that is created by the increased use of mobile networks and devices to access company data.  

“When you talk about internal threats, there’s training, awareness, and understanding that needs to happen," said Cripe. At the end of the day, the most secure computer is one that is turned off and unplugged, but that’s not tenable. Consequently, really rigid or brittle policies are prone to fracture and fail.”

Effective cybersecurity policies incorporate training and communication to raise employee awareness of an automated adversary.

According to Clutch's survey, companies are making progress with training and communicating their cybersecurity policies. Communication, training, and compliance are the three largest areas of focus for implementing cybersecurity policy.

Include Practice & Automation in Your Cybersecurity Policy

Cyber threats and attacks are a reality for every business. Even the best cybersecurity policy cannot prevent security attacks. 57% of companies experienced a phishing attack in the past year, while nearly half experienced a trojan or malware attack.

yber attacks suffered in past year

To account for the likelihood of cyber attacks, businesses need cybersecurity policies that include response protocols.

Practice Allows for Better Responses to Cyber Attacks

A cyber attack response plan should always be included in a cybersecurity policy. Well understood and practiced response protocols can ultimately determine the survival of your business after suffering a cyber attack.  

To Cripe, the way to prepare for a cyber attack is by practicing how to respond and scaling response through automation.

“The ability to [simulate] a cyber attack is very important. A policy has to include the processes and ability for responding at scale...It’s a process that’s best when predefined and pre-practiced. In times of crises, we do what we’ve practiced.”

Processes for responding to a cyber attack include:

  • Identifying the attacker, the data, and systems that were affected or possibly affected
  • Notifying the affected internal and external stakeholders

Automation Addresses Cybersecurity "Talent Gap"

Businesses need to invest in automation to curb the cybersecurity “talent gap,” the term commonly applied to the current, and increasing, lack of capable human cybersecurity resources.

Cripe cites a global deficit of 3.5 million jobs in cybersecurity that will not be filled in the next five years. Given the lack of cybersecurity talent, companies need to turn to automation to help shore up their cybersecurity.

“There’s not enough people. The one thing that I believe will impact our industry over the next 10 years is automation. We believe that the way to transform security operations and to optimize them is with automated detection and response.”

Automation helps businesses to combat an advanced adversary by strengthening prevention and response to cyber attacks.

View Cybersecurity as Single Business Function  

Although most cybersecurity awareness is a product of negative events, such as massive data breaches and hacks like Equifax, your business can use these negative experiences to learn and improve its policies.

Your business needs to:

  • Recognize cybersecurity as a core business function
  • Understand the cybersecurity adversary
  • Create a policy that includes response plan

Combine these four cybersecurity tactics and view them together as a single business process to strengthen cybersecurity on all fronts. 

 

- Grayson Kemper
Content Developer and Marketer, Clutch