Anticipate, adapt, activate

April 2015 Information Security

Most organisations (67%) are facing rising threats in their information security risk environment, but over a third (37%) have no real-time insight on cyber risks necessary to combat these threats. This is one of the topline findings of EY’s annual Global Information Security survey, Get Ahead of Cybercrime, which this year surveys 1825 organisations in 60 countries.

“Cybercrime costs the South African economy billions of rand a year, making EY’s findings highly relevant to business and government in our country,” said Raghuvansh Swami, director, cyber security, EY Africa. “Additionally, fewer than half of all South African companies see cybercrime as a risk, raising concerns that they may not be equipped to deal with the rapidly changing threat landscape.”

This is confirmed by the results of the survey, which found that companies lack the agility, the budget and the skills to mitigate known vulnerabilities and successfully prepare for and proactively manage cyber security risks. Forty-three percent of respondents say that their organisation’s total information security budget will stay approximately the same in the coming 12 months despite increasing threats, which is only a marginal improvement to 2013 when 46% said budgets would not change.

Over half (53%) say that a lack of skilled resources is one of the main obstacles challenging their information security programme and only 5% of responding companies have a threat intelligence team with dedicated analysts. These figures also represent no material difference to 2013, when 50% highlighted a lack of skilled resources and 4% said they had a threat intelligence team with dedicated analysts.

‘Careless or unaware employees’ is revealed as the number one vulnerability companies face, with 38% of respondents saying it is their first priority, and ‘outdated information security controls or architecture’ and ‘cloud computing use’ are second and third respectively (35% and 17%). ‘Stealing financial information,’ ‘disrupting or defacing the organisation’ and ‘stealing intellectual property or data’ are the top three threats (28%, 25% and 20% respectively say it is their first priority).

This year’s survey finds that organisations need to do a better job of anticipating attacks in an environment where it is no longer possible to prevent all cyber breaches, and where threats come from ever more resourceful and well-funded sources.

Paul van Kessel, EY’s global risk leader, says: “Organisations will only develop a risk strategy of the future if they understand how to anticipate cybercrime. Cyber attacks have the potential to be far-reaching – not only financially, but also in terms of brand and reputation damage, the loss of competitive advantage and regulatory non-compliance. Organisations must undertake a journey from a reactive to a proactive posture, transforming themselves from easy targets for cybercriminals into more formidable adversaries.

“Too many organisations still fall short in mastering the foundational components of cyber security. In addition to a lack of focus at the top of the organisation and a lack of well-defined procedures and practices, too many of the organisations we surveyed reveal they do not have a security operations centre. This is a major cause for concern.”

The report encourages organisations to embrace cyber security as a core competitive capability. This requires keeping the organis­ation in a constant state of readiness, anticipating where new threats may arise and shedding the victim mindset of operating in a perpetual state of anxiety. To reach this state, the report recommends:

• Remaining alert to new threats: Leadership should address cyber threats/risks as a core business issue, and put in place a dynamic decision process that enables quick preventative action.

• Understanding the threat landscape: Organisations should have a comprehensive, yet targeted, awareness of the wider threat landscape and how it relates to the organisation, and invest in cyber threat intelligence.

• Knowing your ‘crown jewels’: There should be a common understanding across the organisation of the assets that are of greatest value to the business, and how they can be prioritised and protected.

• Focusing on incident and crisis response: Organisations should regularly test the organisation’s capabilities.

• Learning and evolving: Cyber security forensics is a critical piece of the puzzle. Organisations should closely study data from incidents and attacks, maintain and explore new collaborative relationships and refresh their strategy regularly.

Ken Allan, EY’s global cyber security leader, says: “Beyond internal threats, organisations also need to think broadly about their business ecosystem and how relationships with third parties and vendors can impact their security posture. It’s only by reaching an advanced stage of cyber security readiness that an organisation can start to reap the real benefits of its cyber security investments. By putting the building blocks in place and ensuring that the programme is able to adapt to change, companies can start to get ahead of cybercrime, adding capabilities before they are needed and preparing for threats before they arise.”

In a nutshell

• Over a third (37%) of organisations have no real-time insight on cyber risks, lacking agility, budget and skills to combat rising cybercrime.

• #1 vulnerability to cybercrime revealed as careless or unaware employees, while #1 threat is the theft of financial information.

• Organisations need to be in a constant state of readiness, anticipating where new threats may arise.

For more information, download the full publication at www.ow.ly/H014P





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.