Why apathy is your biggest cyberthreat
Why a lack of a proactive approach to security is putting organisations at risk
Just before Christmas, GoDaddy employees were instructed to complete a form to receive their $650 yearly bonus, or so they thought. Staff who clicked the email attachment were rewarded instead with a decidedly unfestive communique, informing them they'd failed a phishing test, and were told to retake security training.
Cruelty notwithstanding, there was a sliver of reason to the ploy: 94% of all cyber attacks use email, and phishing accounts for over 80% of reported security incidents. Put simply, phishing is low-effort, high-reward, and very, very common.
It's clear more needs to be done to adopt a proactive mindset for phishing detection and response. Cyber leaders have banged the phishing drum for years, yet the problem remains, suggesting the greatest threats are inertia and apathy.
"The age of awareness-raising of the cyber threat is long past - there's no excuse for not being aware of it, and I think most people are," says former head of the NCSC and managing director at Paladin Capital, Ciaran Martin. "The problem, and I'm sympathetic to business leaders on this, is not knowing what to do."
The age of awareness-raising of the cyber threat is long past - there's no excuse for not being aware of it
There persists a feeling among SMEs in particular, says James Sullivan, head of cyber research at RUSI, that they may not be the likeliest targets. This misconception can prove fatal: successful attacks cost an average of $200,000, making small businesses especially vulnerable to obliteration. And because supply chains are so intertwined, anyone is fair game - while an SME may not be the grand prize, their customers or partners could prove bountiful.
Professor Deeph Chana, co-director at the Institute for Security Science and the Centre for Financial Technology, both at Imperial College London, suggests a clearer conception of the nature of our interconnectedness would help: "It's very easy not to examine that, but it starts making you realise the risks your insecurity might bring to other people. That would start making sure people were a little more careful about where they store data and the kinds of tools they install."
One solution is elevating cyber into the realm of general business risk. Leaders are expected to understand complex matters such as commercial law or pension liabilities, but often baulk at technology, says Martin, so they'd do well to demystify cyber for themselves and strive to be a "little bit more technical". Part of elucidating these technicalities could be getting more familiar with the basic principles around network and compute - the "under the hood" stuff, says Chana, that will help leaders better formulate their cyber risk equations.
Risk management, adds Sullivan, is the process of identifying threats in a particular context and taking action to prevent or reduce them. You're "never going to completely eliminate the risk" of successful phishing attacks, he says, and that is generally true for many things in the complex, multifaceted, technology-dependent digital world.
To push back on inertia, then, organisations should set a realistic risk tolerance, a level of acceptable risks, and develop mitigation methods.
That means investment in technology and training, and leaders should understand that this is just the cost of doing business in the 21st century. Adopting a proactive culture at the leadership level will permeate organically throughout the organisation, adds Sullivan.
Technology is only one part of the equation, so while it's critical that technical controls such as secure email gateways, firewalls, and multi- factor authentication are instituted and properly configured, executives must also implement a high-level cyber risk strategy that includes training and reinforces a continuously vigilant culture - viewing all this holistically as an ongoing process, rather than a one-off, box-ticking exercise.
One approach, suggests Chana, could be onboarding employees with short training sessions surrounding risk - to understand how organisations manage, perceive, and analyse risk.
"It's something everybody could cover during their induction," he adds, "something that you could be made aware of formally. That could be a way of really helping, and then maybe making cyber become one exemplar of those kinds of risks."
That said, businesses should endeavour for balance: it's undesirable to enclave cyber as the sole consideration of the security team, but the buck can't be passed to staff either. It's the purpose of technology to take the bulk of responsibility away from most employees, who just wish to go about doing their jobs. Especially in the year of home-working, says Martin, security procedures should be easy to follow - if they're not, users will find insecure workarounds.
"The least appropriate, most useless and counterproductive phrase in cybersecurity is that 'people are the weakest link'," Martin says. "Never, ever, ever say that to your staff. It's like saying, 'that football team would be great if it wasn't for the players'."