ADVERTISEMENT

Cybersecurity is beyond IT. It is a strategy

Published Oct 2, 2023 04:52 pm

TECH4GOOD

Have you heard of the new mining industry?

The dreaded ransomware malware showed its deadly fangs again last month when a high-profile government insurance agency was attacked. I do not have a good handle on the circumstances, how the attack happened, and the extent of the damage done to the agency. All I know is the potential danger of having the agency's millions of members' personal identifiable information (PII) and medical records exposed to the dark web and made public. I am praying the data has not been compromised as the possibilities are unimaginable and scary. 

According to a recent Kaspersky article, ransomware attacks target organizations, big and small, every 11 seconds, causing $20 billion in annual damages globally. The damages caused may be in the form of ransom money paid, organizational productivity losses, reputational hit, or a combination of the three. 

“As always, leaked information in the hands of cyber criminals allows them to impersonate or deploy social engineering scams. With exposed data, hackers can get to you whether online or offline — they can send you messages, they know where you live, they can steal your identity and make unlawful financial transactions pretending to be you or hold on to your data to sell it for further financial gain,” says Yeo Siang Tiong, general manager for Southeast Asia at Kaspersky, a leading global cybersecurity and digital privacy company.

One of the most damaging malware today is ransomware which is a threat to both organizations and individuals alike. It typically spreads through phishing emails, malicious attachments, or infected websites. It is a type of malware that encrypts a victim’s files preventing or limiting users’ access to their system. The ransomware then displays a message demanding a ransom payment in exchange for the decryption key. In the case of the recent government agency attack, they actually got hit by the Medusa Ransomware variant. In some cases, victims have paid ransoms amounting to millions of dollars to recover their data. However, there is no guarantee that paying the ransom will actually lead to the decryption of the files.

In recent years, there have been a number of high-profile ransomware attacks, including the WannaCry attack in 2017 and the Colonial Pipeline attack in 2021. Most of these attacks are all about money. According to the same Kaspersky article, their researchers reported that the going rate on the dark web for personal details is $10 each, selfies (photos) with documents fetch for as high as $40 to $60 each, and medical records are sold and bought for as much as $30 each.

What makes organizations vulnerable to malware? 

The problem usually starts with the leadership team thinking that matters like cybersecurity is better left to its IT group. In this super-connected digital world, cybersecurity has become the accountability of the CEO. It is beyond IT because it is not just about protecting computers and networks. It is about protecting people, data, the reputation of the organization and its leaders, and its very existence. And because cybersecurity is a shared responsibility between all members of an organization, from the CEO to the front-line employees, it has to be a strategy. 

Cybersecurity has to be a strategy because it is a critical and proactive approach to protecting an organization’s assets from cyber threats. A cybersecurity strategy should be aligned with the organization's overall business strategy and should be regularly reviewed and updated to reflect changes in the threat landscape.

There are several ways of looking at the significance of cybersecurity. First, it is a business issue. Breaches can damage the reputation of the organization, cause regulatory liabilities, and lead to financial losses, and operational disruptions.

It is also a people issue as employees are often the weakest link in the cyber threat link. They can be fooled into checking phishing emails, opening malicious attachments, or sharing sensitive information with dark web players. Leaders should look at cybersecurity education and training as essentials for reducing the human factor in breaches.

Finally, cybersecurity is a data issue. Every organization today collects and stores large amounts of data, including customer information, financial data, operational data, and intellectual property. This data runs the organization and has become a target for ransomware criminals to hostage victims into paying ransom. Every organization needs to have strong data security measures in place to protect their data from unauthorized access, disclosure, manipulation, or destruction. 

A cybersecurity strategy, therefore, is essential for any organization that wants to protect its assets from cyber threats. It can help identify and mitigate cybersecurity risks, reduce the impact of breaches by providing a plan for responding to every incident and recovering from them, ensure that the organization is in compliance with cybersecurity and privacy regulations, and enhance the organization's reputation as a secure and reliable organization. ([email protected])

(The author is an executive member of the National Innovation Council, lead convenor of the Alliance for Technology Innovators for the Nation (ATIN), vice president of the Analytics and AI Association of the Philippines, and Vice President, UP System Information Technology Foundation.)

 

Related Tags

Monchito Ibrahim TECH4GOOD
ADVERTISEMENT
.most-popular .layout-ratio{ padding-bottom: 79.13%; } @media (min-width: 768px) and (max-width: 1024px) { .widget-title { font-size: 15px !important; } }

{{ articles_filter_1561_widget.title }}

.most-popular .layout-ratio{ padding-bottom: 79.13%; } @media (min-width: 768px) and (max-width: 1024px) { .widget-title { font-size: 15px !important; } }

{{ articles_filter_1562_widget.title }}

.most-popular .layout-ratio{ padding-bottom: 79.13%; } @media (min-width: 768px) and (max-width: 1024px) { .widget-title { font-size: 15px !important; } }

{{ articles_filter_1563_widget.title }}

{{ articles_filter_1564_widget.title }}

.mb-article-details { position: relative; } .mb-article-details .article-body-preview, .mb-article-details .article-body-summary{ font-size: 17px; line-height: 30px; font-family: "Libre Caslon Text", serif; color: #000; } .mb-article-details .article-body-preview iframe , .mb-article-details .article-body-summary iframe{ width: 100%; margin: auto; } .read-more-background { background: linear-gradient(180deg, color(display-p3 1.000 1.000 1.000 / 0) 13.75%, color(display-p3 1.000 1.000 1.000 / 0.8) 30.79%, color(display-p3 1.000 1.000 1.000) 72.5%); position: absolute; height: 200px; width: 100%; bottom: 0; display: flex; justify-content: center; align-items: center; padding: 0; } .read-more-background a{ color: #000; } .read-more-btn { padding: 17px 45px; font-family: Inter; font-weight: 700; font-size: 18px; line-height: 16px; text-align: center; vertical-align: middle; border: 1px solid black; background-color: white; } .hidden { display: none; }
function initializeAllSwipers() { // Get all hidden inputs with cms_article_id document.querySelectorAll('[id^="cms_article_id_"]').forEach(function (input) { const cmsArticleId = input.value; const articleSelector = '#article-' + cmsArticleId + ' .body_images'; const swiperElement = document.querySelector(articleSelector); if (swiperElement && !swiperElement.classList.contains('swiper-initialized')) { new Swiper(articleSelector, { loop: true, pagination: false, navigation: { nextEl: '#article-' + cmsArticleId + ' .swiper-button-next', prevEl: '#article-' + cmsArticleId + ' .swiper-button-prev', }, }); } }); } setTimeout(initializeAllSwipers, 3000); const intersectionObserver = new IntersectionObserver( (entries) => { entries.forEach((entry) => { if (entry.isIntersecting) { const newUrl = entry.target.getAttribute("data-url"); if (newUrl) { history.pushState(null, null, newUrl); let article = entry.target; // Extract metadata const author = article.querySelector('.author-section').textContent.replace('By', '').trim(); const section = article.querySelector('.section-info ').textContent.replace(' ', ' '); const title = article.querySelector('.article-title h1').textContent; // Parse URL for Chartbeat path format const parsedUrl = new URL(newUrl, window.location.origin); const cleanUrl = parsedUrl.host + parsedUrl.pathname; // Update Chartbeat configuration if (typeof window._sf_async_config !== 'undefined') { window._sf_async_config.path = cleanUrl; window._sf_async_config.sections = section; window._sf_async_config.authors = author; } // Track virtual page view with Chartbeat if (typeof pSUPERFLY !== 'undefined' && typeof pSUPERFLY.virtualPage === 'function') { try { pSUPERFLY.virtualPage({ path: cleanUrl, title: title, sections: section, authors: author }); } catch (error) { console.error('ping error', error); } } // Optional: Update document title if (title && title !== document.title) { document.title = title; } } } }); }, { threshold: 0.1 } ); function showArticleBody(button) { const article = button.closest("article"); const summary = article.querySelector(".article-body-summary"); const body = article.querySelector(".article-body-preview"); const readMoreSection = article.querySelector(".read-more-background"); // Hide summary and read-more section summary.style.display = "none"; readMoreSection.style.display = "none"; // Show the full article body body.classList.remove("hidden"); } document.addEventListener("DOMContentLoaded", () => { let loadCount = 0; // Track how many times articles are loaded const offset = [1, 2, 3, 4, 5, 6, 7, 8, 9, 10]; // Offset values const currentUrl = window.location.pathname.substring(1); let isLoading = false; // Prevent multiple calls if (!currentUrl) { console.log("Current URL is invalid."); return; } const sentinel = document.getElementById("load-more-sentinel"); if (!sentinel) { console.log("Sentinel element not found."); return; } function isSentinelVisible() { const rect = sentinel.getBoundingClientRect(); return ( rect.top < window.innerHeight && rect.bottom >= 0 ); } function onScroll() { if (isLoading) return; if (isSentinelVisible()) { if (loadCount >= offset.length) { console.log("Maximum load attempts reached."); window.removeEventListener("scroll", onScroll); return; } isLoading = true; const currentOffset = offset[loadCount]; window.loadMoreItems().then(() => { let article = document.querySelector('#widget_1690 > div:nth-last-of-type(2) article'); intersectionObserver.observe(article) loadCount++; }).catch(error => { console.error("Error loading more items:", error); }).finally(() => { isLoading = false; }); } } window.addEventListener("scroll", onScroll); });

Sign up by email to receive news.