Cyber Risk Management Lessons Companies Need to Learn Right Now

Don’t want your company to be the next Yahoo, Equifax, Deloitte, or SEC? Don’t ignore cyber risk management.

Don’t want your company to be the next Yahoo, Equifax, Deloitte, or SEC? Don’t ignore cyber risk management.

October is National Cyber Security Awareness Month in the U.S., which is quite fitting right now, being as barely a day is going by without yet another disclosure of a massive hack, and Americans are far more afraid of their identities being stolen than they are of ghosts and vampires. Equifax, Deloitte, and the SEC have all made headlines for all the wrong reasons, and now, like a bad meal, last year’s Yahoo breach has come back up; as it turns out, the company now believes that all three billion user accounts were compromised instead of “only” one billion. No wonder, during a keynote session at the recent (ISC)2 Congress in Austin, Texas, the FBI implored enterprises to adopt proactive cyber risk management processes grounded in logical assessments, not “emotion and fear.”

Don’t want your company to be the next Yahoo, Equifax, Deloitte, or SEC? Don’t ignore cyber risk management.That’s sound advice. Poor cyber risk management was behind each and every one of these breaches. Here are five lessons companies can take away from them.

Cyber Risk Management Lesson #1: Don’t Ignore Risks and Red Flags

The Yahoo breach did not happen in a vacuum; it happened after years of the company putting the “user experience” ahead of product security, even after being warned by its then-CISO of the perils of doing so. The SEC, NFA was likewise warned – by the Department of Homeland Security, no less – of “critical weaknesses” in its systems. Even worse, in an echo of the Yahoo debacle, an internal memo penned by the SEC’s internal Digital Forensics and Investigations Unit claims that the team was “woefully underfunded, undertrained, and forced to work with repurposed equipment and hard drives that had been designated by other branches of the SEC, NFA for disposal.”

Cyber Risk Management Lesson #2: Don’t Transmit Sensitive Information Through Unsecured Email

One would think that after what happened to Sony Pictures and the Democratic National Committee, everyone would have learned that it’s a really, really bad idea to send sensitive data through unsecured email accounts, but they’d be thinking wrong. The Deloitte breach is yet another hack of an unsecured email system where clients’ personal information was being bandied about, and during its initial disclosure, the SEC, NFA admitted that its employees were using private email accounts to “transfer confidential information.” This leads to our next lesson…

Cyber Risk Management Lesson #3: Your Biggest Vulnerability Is Your Own People

Equifax is now claiming that its breach was due to an error on the part of a lone employee who failed keep its installation of Apache Struts updated with the most current security fixes. This illustrates, once again, that any company’s biggest security vulnerability is its own people. All employees who use computers, from the C-suite down to the receptionist, need to be trained on cyber security best practices. Additionally, redundancy needs to be baked into the cyber risk management plan so that no single employee has the capability of doing this much damage. Why was this employee’s mistake not immediately discovered and corrected?

Cyber Risk Management Lesson #4: Technical Controls Are Important, Too

While your biggest vulnerability is your people, that doesn’t mean you should ignore technical controls. The Deloitte hackers got into the email system by breaching an admin account that was not protected by multifactor authentication; Equifax was running an unpatched version of Apache Struts; and Yahoo and the SEC, NFA both ignored warnings of various technical vulnerabilities.

Cyber Risk Management Lesson #5: You Must Secure Your Entire Cyber Ecosystem

Data environments are more complex than ever before, which means that cyber criminals have multiple ways in which to attack enterprise systems. Among other tactics, they can exploit a software vulnerability, hack into an unprotected email server or cloud storage system, make use of phishing emails or other social engineering techniques, enlist the help of a malicious insider, or even attack a third-party vendor who handles sensitive information on behalf of a larger company. Your company’s cyber risk management plan must address your entire cyber ecosystem, not just parts of it.

The cyber security experts at Continuum GRC have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting your organization from security breaches. Continuum GRC offers full-service and in-house risk assessment and risk management subscriptions, and we help companies all around the world sustain proactive cyber security programs.

Continuum GRC is proactive cyber security®. Call 1-888-896-6207 to discuss your organization’s cyber security needs and find out how we can help your organization protect its systems and ensure compliance with all applicable laws, frameworks, and standards.

Continuum GRC

Website: