Anticipate, adapt, activate

April 2015 Information Security

Most organisations (67%) are facing rising threats in their information security risk environment, but over a third (37%) have no real-time insight on cyber risks necessary to combat these threats. This is one of the topline findings of EY’s annual Global Information Security survey, Get Ahead of Cybercrime, which this year surveys 1825 organisations in 60 countries.

“Cybercrime costs the South African economy billions of rand a year, making EY’s findings highly relevant to business and government in our country,” said Raghuvansh Swami, director, cyber security, EY Africa. “Additionally, fewer than half of all South African companies see cybercrime as a risk, raising concerns that they may not be equipped to deal with the rapidly changing threat landscape.”

This is confirmed by the results of the survey, which found that companies lack the agility, the budget and the skills to mitigate known vulnerabilities and successfully prepare for and proactively manage cyber security risks. Forty-three percent of respondents say that their organisation’s total information security budget will stay approximately the same in the coming 12 months despite increasing threats, which is only a marginal improvement to 2013 when 46% said budgets would not change.

Over half (53%) say that a lack of skilled resources is one of the main obstacles challenging their information security programme and only 5% of responding companies have a threat intelligence team with dedicated analysts. These figures also represent no material difference to 2013, when 50% highlighted a lack of skilled resources and 4% said they had a threat intelligence team with dedicated analysts.

‘Careless or unaware employees’ is revealed as the number one vulnerability companies face, with 38% of respondents saying it is their first priority, and ‘outdated information security controls or architecture’ and ‘cloud computing use’ are second and third respectively (35% and 17%). ‘Stealing financial information,’ ‘disrupting or defacing the organisation’ and ‘stealing intellectual property or data’ are the top three threats (28%, 25% and 20% respectively say it is their first priority).

This year’s survey finds that organisations need to do a better job of anticipating attacks in an environment where it is no longer possible to prevent all cyber breaches, and where threats come from ever more resourceful and well-funded sources.

Paul van Kessel, EY’s global risk leader, says: “Organisations will only develop a risk strategy of the future if they understand how to anticipate cybercrime. Cyber attacks have the potential to be far-reaching – not only financially, but also in terms of brand and reputation damage, the loss of competitive advantage and regulatory non-compliance. Organisations must undertake a journey from a reactive to a proactive posture, transforming themselves from easy targets for cybercriminals into more formidable adversaries.

“Too many organisations still fall short in mastering the foundational components of cyber security. In addition to a lack of focus at the top of the organisation and a lack of well-defined procedures and practices, too many of the organisations we surveyed reveal they do not have a security operations centre. This is a major cause for concern.”

The report encourages organisations to embrace cyber security as a core competitive capability. This requires keeping the organis­ation in a constant state of readiness, anticipating where new threats may arise and shedding the victim mindset of operating in a perpetual state of anxiety. To reach this state, the report recommends:

• Remaining alert to new threats: Leadership should address cyber threats/risks as a core business issue, and put in place a dynamic decision process that enables quick preventative action.

• Understanding the threat landscape: Organisations should have a comprehensive, yet targeted, awareness of the wider threat landscape and how it relates to the organisation, and invest in cyber threat intelligence.

• Knowing your ‘crown jewels’: There should be a common understanding across the organisation of the assets that are of greatest value to the business, and how they can be prioritised and protected.

• Focusing on incident and crisis response: Organisations should regularly test the organisation’s capabilities.

• Learning and evolving: Cyber security forensics is a critical piece of the puzzle. Organisations should closely study data from incidents and attacks, maintain and explore new collaborative relationships and refresh their strategy regularly.

Ken Allan, EY’s global cyber security leader, says: “Beyond internal threats, organisations also need to think broadly about their business ecosystem and how relationships with third parties and vendors can impact their security posture. It’s only by reaching an advanced stage of cyber security readiness that an organisation can start to reap the real benefits of its cyber security investments. By putting the building blocks in place and ensuring that the programme is able to adapt to change, companies can start to get ahead of cybercrime, adding capabilities before they are needed and preparing for threats before they arise.”

In a nutshell

• Over a third (37%) of organisations have no real-time insight on cyber risks, lacking agility, budget and skills to combat rising cybercrime.

• #1 vulnerability to cybercrime revealed as careless or unaware employees, while #1 threat is the theft of financial information.

• Organisations need to be in a constant state of readiness, anticipating where new threats may arise.

For more information, download the full publication at www.ow.ly/H014P





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...