Cybersecurity Risk Management Meets Physical Security
Cybersecurity Risk Management Meets Physical Security
A Closer Look at 2018 Trends: Who’s Responsible When Cybersecurity Risk Management Meets Physical Security?
Cyber threats reached an all-time high in 2017 according to Trend Micro’sTM 2017 Security Roundup. In this brave new world, cybersecurity and physical security are becoming synonymous.
Increasingly, industries ranging from nuclear power plants to self-driving cars are at the mercy of cyber attackers. Even our bodies are at risk since implanted medical devices like pacemakers, insulin pumps and brain implants are exposed to cyber attacks. The possibilities are frightening.
With this expanded threat comes bigger responsibilities across enterprises. Gone are the days when a silo like the IT department handled security for the entire firm. In fact, personnel from HR, to IT, to Procurement must be aware of the risks inherent in securing their physical and cyber-spaces – and be prepared to overcome them.
Our last post explored the changing role of security providers. Now we’ll delve into how physical security is changing to be increasingly cyber controlled – and how businesses are taking note.
Trend 9: Cyber Security Risk Management is Essential for Physical Security
The word “ransomware” can strike fear into the most prepared businesses. Recently, Washington D.C.’s police department fended off a potentially devastating ransomware attack. Just prior to the Presidential Inauguration in January 2017, hackers hijacked 70 percent of the D.C. police’s department’s networked video recorders and stopped them from recording. Engineers were able to fix each video recorder on site without having to pay the ransom, but the results could have been debilitating.
Cyber risk abounds. In October 2017, the U.S. Computer Emergency Readiness Team (US-CERT) warned users to update their devices because the agency had uncovered vulnerability in any updated, protected Wi-Fi network that could potentially harm every connected device by releasing emails, chat histories and even credit card numbers. Code-named KRACK (Key Reinstallation AttaCK), this malware had the potential to destroy any connected business’ data.
Cyber Security Risk Management Best Practices: How Can Security Providers Help?
How do we possibly prepare for doomsday scenarios like these? There are several important steps security providers can take. Most importantly, security providers must address network security by eliminating harmful traffic like denial of service attacks. They need to create systems that analyze possible deficiencies, seek out malware, assess security controls, design newer improved cyber safeguards, update protections and ensure that security stays top of mind for all stakeholders.
IST offers cyber security as a service to meet businesses’ growing need for cyber protection. We understand how one small breach can spell millions in lost revenue or even denigrate company’s name. We proactively work to eliminate these risks. You can trust IST to handle any of the new and still undiscovered cyber threats, as we work tirelessly to stay on top of them.
Trend 10: Everyone’s Responsible for Risk Management
Every business and every person is at risk. With so many avenues for cyber destruction, attackers can wreak havoc via credit card theft, embezzlement, workplace violence, worker’s compensation fraud, compliance control and information or data loss.
To counteract these risks, companies need a comprehensive approach to risk management and planning. This means that the traditional Chief Security Officer and Chief Information Officer will be involved, but it also means that IT, HR and other employees (plus vendors and service providers) need to weigh in as well. The companies that can best blend cyber and physical security will provide the tightest security, and that requires pulling from many different departments.
Risk Management Best Practices: How Can Security Providers Help?
With silos of security experts, it’s easy to see how critical security threats can fall through the cracks. With a coordinated effort like a dashboard, all security stakeholders can see and respond to potential issues in real time. Tools like social media, “dark web” criminal activity monitoring, arrest reports, court findings, as well as traditional sources of information need to be harnessed to build a full picture of the security landscape for a given company, both internally and externally.
Security providers are a member of this important team. It’s imperative to employ the most sophisticated security measures to counteract cyber threats, including ransomware and a potentially large cyber-attack. IST has helped numerous customers secure their networks to prevent these malicious attacks. We’re prepared to fight and eradicate any threat.
This post concludes our series about the top ten security trends to look for in 2018. There is unlimited potential in the coming months with the IoT’s connectivity and convenience. There is also an unlimited opportunity for security breaches. We continue to monitor these as well as any emerging trends that affect your business’ security. As a premier protector of people, property and data, IST is dedicated to your security. Contact us now to see how we can get you completely secure.