How Companies Can Stay Ahead of Rising Cyber Security Threats

How Companies Can Stay Ahead of Rising Cyber Security Threats

There areย plenty of new challenges to keeping a company afloat while the worldย enduresย theย 2020ย coronavirusย pandemic. Here are just a few:ย 

  • Applying for government assistance to keep paying payroll.ย 
  • Developing a work-from-home system for employees following stay-at-home orders.ย 
  • Working out accommodations and new digital venues with customers and suppliers that will help everyone come throughย a cataclysmicย crisis still in business.ย 

Add to the list a new one: Cyber security threats to business.ย ย 

InterimExecsย RED Team executive and CISO,ย Zeeshan Kazmi,ย says times like these are prime for opportunistic hackers.ย 

Just look atย financial technology company, Finastra, to see a cyber security nightmare in action. After coronavirus hit, the company was in the middle of developing anย emergency plan to operate when hackers found a backdoor into their servers. Malware quickly spread locking down server after server on their network, taking down many of their customersย which include 90 of the worldโ€™s top 100 banks.ย ย ย 

โ€œWe havenโ€™t taken cyberย security threats as seriously as they should be taken,โ€ says Kazmi, who has spent 15ย years working in theย cyber security space. โ€œCompanies have been reactive. They protected their business transactions and their reputation. It became a corporate risk management function.โ€ย 

Executives would debate the cost/benefit of the risk probability and the cost of avoiding that risk. If the ratio was acceptable, they said โ€œwe canโ€™t be 100 percent,โ€ he says.ย 

Then came COVID-19โ€™s social distancing requirements. Suddenly, all of the secure transactions and communications that were relatively easy to protect in-house or in-person are being handledย by private computers over homeย wifiย or a vast array of vendor/supplier computers.ย 

Common Cyber Security Threats to Businessย 

There are many examples of cybersecurity threats that pose risk to business. Even something as simple as keeping hackers out of your email isnโ€™t so simple any more.ย 

In the office, an employee could have walked over the boss and asked, โ€œHey, did you send me this suspicious email?โ€ Human nature being what it is, the chances are much higher the worker at home will simply click on the email without first picking up the phone or sending a message to find out whether itโ€™s safe, added steps are psychological equivalent of “friction” Kazmi says.ย 

โ€œPhone calls, VPNs,ย Zoomย meetings, documents that are not secure, emails that may not be from the origin they say they are, transactions with suppliers and vendors that are not verified, unsecure emails, gratuitous phone calls. All are easy for hackers, and they understand how to prey on habitual weaknessesโ€ he says.ย 

But that isnโ€™t even the weakest link inย the cyber security chain. The weakest link is likely with suppliers, vendors, and customers conducting business and placing orders via their home computers or improperly secured terminals.ย 

Customers are using web browsers to access information. The customerโ€™s virus software might warn that a site is not secure, but the message can be so cryptic that the customer clicks anyway โ€œbecause thatโ€™s where they want to go.โ€ย ย 

Thatโ€™s when the hackers find a way in. Hereโ€™s how a cyber attack works:ย 

The hackers already know the customerโ€™s home computer is the weakest spot in this cyber security threat. Theyย observe what the customer isย doingย at homeย online and how he is interacting with the business. Then the hacker plays a game, getting the business toย trust that the hacker is a real person. Once that happens, the hacker can transmit a link to click or something similar and the business has been hacked. Once inside the businessโ€™ system, the hackers repeat the process. They look around the business, get into the CFOโ€™s computer, download the customer data sheets and more. The intent can be more thanย justย financialย details. Hackersย listen in and get product launch details, get pricing, intellectual property theft, make private information public, etc.ย 

What Happens When My Business Has Beenย Hackedย 

What can you do after your business discovers itโ€™s been hacked? Very little, Kazmi says. You can call your insurance company or the police, but they will ask: Did the hackers steal money? Did anyone get killed? Did they delete anything? The answers to all of those questions will be โ€œno,โ€ so neither the insurance company nor the police will get involved in the traditional way. Cyber insurance can help some, but even that has many caveats as we saw duringย NotPetya ransomware with Mersk,ย which to date is one of the most devastating pieces of malware weโ€™ve seen.ย 

And the hackers will have the data. Depending on what theyโ€™ve got, they can sell it on the black market or to a competitor, or use it to blackmail individuals, Kazmi says. (โ€œI know what disease/secret you have and if you donโ€™t pay, Iโ€™ll put it on the internet for everyone to see.โ€). If you see it in a different light, the FUD (fear, uncertainty, doubt) is not inherently in the Cybersecurity industry, but it is the primary tactic of predatory intent from cyber criminals.ย 

How to Manage and Improve Cyber Securityย 

The solution to this challenge?ย 

Managing cybersecurity threats come in several forms, Kazmi says.ย 

  1. Business leaders need to shift their thinking about cyber security threats. It is much more than a risk assessment equation. Cybersecurity should be part of the revenue conversation and the cost of security transactions should be rolled into the cost of the product.ย 
  2. Antiquated 1990s cyber security laws need to be updated to reflect the new realities of cyber safety so that police, insurance companies, and various law enforcement can have clear guidelines on harm and repudiation.ย 
  3. Companies need to develop a wholistic approach toย cyberย security. โ€œIt takes long term experience, human psychology, an understanding of selling, running organizations, technology and change management to make thisย cyberย security stuff work,โ€ Kazmi says.ย 

And, he says, thereโ€™s no time like the present to start.ย Hacking threats haveย jumped 15% a monthย since theย beginning of 2020,ย bumped up even more toย 20% in March, andย are predicted to keep going up.ย ย It could take 18 months or longer forย businessย to return to anything close to its pre-COVID-19 form. That means executives, employees and customers likely will be working remotely, using unsecure servers and homeย wifiย for many months to come.ย ย ย 

Even if it takes 3ย toย 4 months to get a strong cyber security โ€œthreat huntingโ€ program in place,ย Kazmi saysย there will beย many months of benefit from that before life returns to normal. Anย Interim CIOย or Interim CISO can be retainedย asย aย cyber security expertย without adding to permanent overhead to assess anย organizationย andย accelerateย implementationย ofย a cyber security plan.ย From hospitals to manufacturing, financial servicesย to restaurants,ย no industryย is immune to these threats, asย cyber criminals continue to prey on crisis-distracted owners and investors.ย ย 


InterimExecsย RED Team is an elite group of CEOs, CFOs, CIOs, and CISOs who help organizations through turnaround, growth (merger, acquisitions, ERP/CRM implementation, process improvement), or absence of leadership.ย Learn more aboutย InterimExecsย RED Team atย www.interimexecs.com/red-teamย or call +1 (847) 849-2800.ย 

More Resources:ย 
*Boards Must Address Technology Risks and Opportunitiesย 
*What is the Role of an Interim CIO? 5 Common Use Casesย