The importance of cyber security awareness

21/06/23 Wavenet
The importance of cyber security awareness placeholder thumbnail

Every business is at risk of a cyber-attack.

In 2017, cyber attacks on organisations cost the UK economy £10 billion, with 7 out of 10 companies falling victim to a cyber-attack or breach[1]. When a CEO is confronted with a cyber-attack or data breach, they start to worry about their vulnerabilities in the technology they use and forget to look at the very people using those technologies everyday - their employees. According to the 2017 Data Breach Investigations Report, more than 90% of cyber-attacks were traced back to human error[2], suggesting that mistakes caused by humans both initiates and amplifies the risk of cyber-crime and the damage it poses to businesses. The best way for business directors, CEOs and managers to combat this threat is to create a risk-aware workplace culture, and that starts with cyber security awareness.


What is cyber security awareness?

 

Cyber security awareness is the combination of both knowing and doing something to protect a business’s information assets. When an enterprise’s employees are cyber security aware, it means they understand what cyber threats are, the potential impact a cyber-attack will have on their business and the steps required to reduce risk and prevent cyber-crime infiltrating their online workspace.

 

Creating a culture around cyber security awareness in the workplace doesn’t mean that you’ll be completely eradicating the risk of data theft or cyber-crime to your business. Malware has burgeoned, becoming more and more sophisticated as each new strand is developed, and we expect to see the evolution and growth of cyber-threats and malware to proliferate. It was reported that 123 new strains of malware were found everyday in 2005[3]. During that year, 10,000 of those threats were new strains of malware. 11 years later, research had shown that every second, four new strains of malicious malware were discovered in Q3 of 2016[4] - it’s crucial to highlight that these were the strains that cyber security companies had found and identified. As new strains of malware grow, enterprises need to ensure that they’re implementing the appropriate security measures, educating their employees and eliminating any weaknesses that make them vulnerable to an attack. Human error is an egregious exploit that can lead to fines and severe business damage.

 

Phishing scams: the most prevalent & successful method

 

Your organisation’s cyber security is only as strong as your weakest employee, and a data breach is more likely to come from human negligence rather than a criminal hack. When you strive to create a risk aware culture within the workplace, you’re preventing your employees from becoming unknowingly complicit in cyber-crime activity.

 

According to the 2018 Data Security Incident Response Report, phishing accounted for 34% of data breaches in 2017, making it the number one type of cyber-crime[5]. The report found that “phishing remained prevalent and successful, and employees and their vendors made common mistakes that placed sensitive information at risk.”[6] One form of phishing, known as spear-phishing, is becoming increasingly difficult for employees to detect, posing a huge risk to organisations all over the world. 

 

What is spear-phishing?

 

Spear-phishing is a malicious email-spoofing attack that aims to gain entry to software via malicious malware that’s downloaded through an attachment. The perpetrators target specific organisations or individuals with the goal of gaining unauthorised access to sensitive information. If the person opens the attachment on the email, malware is then downloaded onto the user’s computer. This gives hackers an entry into the organisation’s software, from which they can then move laterally in search of sensitive and valuable information. It is unusual for spear-phishing attempts to be initiated by random hackers with no end goal - they are more likely to be conducted by hackers who are out for financial gain, industry secrets and sensitive information.

 

While the act of spear-phishing sounds rudimental, it has evolved over the last few years, becoming extremely difficult to detect - especially if there’s no prior knowledge or spear-phishing protection software implemented. Victims are targeted via the personal information they put on the internet. For example, a hacker might find an employee’s email address, interests, job role, geographic location and any posts about new products they’ve just purchased, all available on their social media profiles. With all of this information, the hacker then acts as a friend or a familiar entity, and sends a convincing but fraudulent and malicious message to their target. There have been some instances where victims were asked to open a malicious attachment or click on a link that takes them to a spoofed website where they are asked to provide passwords, account numbers, PINs, and access codes.

 

WannaCry: the biggest phishing attack to date

 

In May 2017, one of the biggest phishing attacks in history left organisations such as the NHS, FedEx, Nissan and Hitachi crippled. This attack hit more than 150 countries and 200,000 computers worldwide, and was sent via an email that would trick the recipient into opening attachments, which then released phishing malware onto their system. The malware, WannaCry, was aligned with a stolen cyber weapon called EternalBlue. The weapon, developed by the US National Security Agency, propagated a vulnerability in older versions of Windows Microsoft Server Message Block protocol. This exploit of Windows’ SMB then tricked various nodes by specially crafted packets, which then triggered the nodes that were communicating on a network to buffer overflow, causing it to reload, leaving a vulnerability for the execution of arbitrary code. It is thought that this global attack could spur $53 billion in economic losses[7].

 

Investigations found that many users (including the NHS) had not installed patches for Microsoft’s exploit, leaving them vulnerable to WannaCry’s rampage. Alongside this, the NHS were told that they were at risk of a cyber-attack, and did very little to prevent it.[8]

 

eBay: a cyber-attack that lasted more than 200 days

 

In 2014, eBay were subject to a leveraged phishing attack where sensitive information about more than 100 employees was stolen. This information was then used to gain access to eBay's internal network. Once the hackers had infiltrated the network, they extracted the names, passwords, email addresses, physical addresses, and other personal information of more than 145 million customers. It is thought that the attackers went undetected, with unfettered access to eBay's systems for 229 days. The hackers had installed a rogue certificate, allowing them to hide exfiltration in encrypted traffic. eBay didn’t have a HTTPS inspection solution with full access to all keys and certificates, which meant that the rogue certificates remained undetected for a long time. The aftermath of the breach meant that eBay had to lower its annual sales target by $200 million, and they struggled to recover customer confidence and brand value for months[9].

 

The importance of cyber security

 

Colleagues need to understand the role they play in strengthening a business’s cyber security. In most cases, it needs to be taken back to the very basics. Cyber-crime shows no signs of slowing down, and a cyber-attack has the potential to incapacitate an organisation. Training your employees and making them aware is not only your best defence - it also shows you’re paving your way to a more GDPR compliant future. Should you find your company has fallen victim to a cyber-attack, the ICO will look at the preventative measures you have put in place beforehand. It is crucial for businesses to implement the most basic cyber security measures, and cyber security awareness for employees is one of them.

 

TalkTalk: failing the basics

 

In October 2015, almost 157,000 TalkTalk customers had their personal data hacked. A further 15,656 customers had their bank account numbers and sort codes leaked, which meant fraudulent activity took place on their accounts. The hackers accessed this data via three vulnerable web pages within TalkTalk’s inherited infrastructure on their site. The infrastructure was not properly scanned for possible threats by TalkTalk, making them ignorant to these vulnerable pages, and therefore unaware that these pages enabled access to a database that held confidential customer information.

 

The hackers used a common technique known as SQLi (a SQL injection) to exploit TalkTalk’s vulnerabilities. Once the malicious SQL injections (also known as malicious payload) attacked, they had control of TalkTalk’s web application's database server.

 

During an investigation, the ICO stated that a SQL injection is a well understood cyber weapon and there are plenty of defences out there for businesses to protect themselves against it. They also said that TalkTalk ought to have known that SQLi posed a serious risk to their customers’ credentials and business data, but did next to nothing to protect this sensitive information. TalkTalk lost 101,000 customers and suffered a cost of £60 million. They were also fined £400,000.[10]

 

Cyber security awareness best practices

 

CEOs, directors and managers want to keep their data safe, it is up to them to educate their colleagues and create a workplace culture surrounding cyber security awareness. Here are some cyber security best practices every organisation should be following:

 

Implement basic cyber security training

 

Conducting training sessions will ensure that employees use approved software, and have strong passwords. You could also look at implementing common sense practices surrounding technology access and consider adding further levels of protection for staff with multi-factor authentication. This could be something as simple as not letting employees take their laptops home at the weekend, or enforce a two-step verification process.  

 

Have a data recovery strategy

 

A recent survey had shown that one in five businesses don’t have a procedure or back-up plan, should their data get lost or damaged. With more and more businesses relying on the cloud, it’s crucial that you ensure your cloud-based data is adequately protected and compliant with new GDPR regulations. Alongside this, you need to make sure your employees are clear on the strategy, and exactly who is responsible for what.

 

Detect and plan for what you can't prevent

 

Hackers will always try and find a vulnerability, and when they do you need to make sure you have the resources and knowledge to detect their activities as quickly as possible. This way, you can contain the damage  and get back to normal business without experiencing a  massive loss event. Implementing a security information and event management (SIEM) solution will aggregate logs from applications, operating systems, and network infrastructure appliances across the enterprise. It will then analyse the data to identify any questionable activity and flag it to the appropriate people. 

 

It’s clear that the weakest link in cyber security is the human factor, and if your employees are unable to make an informed and educated decision about something as simple as what network to connect to or which email attachment to open, you’re at risk of a potentially devastating cyber-attack. Your business’s cyber security is only as strong as your weakest employee - it is your responsibility to create a risk aware workplace culture surrounding cyber security awareness.

 

[1] https://www.gov.uk/

[2] http://www.verizonenterprise.com/

[3] https://www.pandasecurity.com

[4] https://www.darkreading.com

[5] https://www.itjungle.com/

[6] https://www.itjungle.com/

[7] https://www.reuters.com/

[8] https://www.thetelegraph.com

[9] https://www.theguardian.com/technology/

[10] https://ico.org.uk/

 

 

Backup & Recovery, Product Guides, Microsoft, IT & Technology, IT & Security, Cloud

Stay service-savvy

Get all the latest news and insights straight to your inbox.