Vulnerabilities / Threats
8/15/2017
10:30 AM
Connect Directly
Twitter
RSS
E-Mail vvv
50%
50%

Cybersecurity: The Responsibility of Everyone

The battle against cybercrime can only be won if we're all focused on the same goals. Here are four ways you can get involved.

Governments, businesses, and citizens around the world face an ever-increasing risk from cyberthreats. Recently, the WannaCry ransomware attack wreaked global havoc, affecting an estimated 200,000 organizations across 150 countries. Such attacks — which work by encrypting data until an organization or individual pays a ransom — are becoming more common, despite the best efforts of software companies, information security specialists, and government and law enforcement agencies to prevent them.

A recent Accenture survey of 2,000 cross-industry security executives revealed that roughly one in three targeted breach attempts are successful. Although the public sector shoulders the brunt of cybercrime activity — 50 times more attacks were launched against government in 2016 than any other industry — everyone, from corporate executives to consumers, has a role to play in preventing future attacks. Here are some ways to take action.

Understand the risks: Email has become one of the most common mechanisms by which security threats are delivered to unsuspecting recipients, in government, industry, and the general public. These threats, which often appear in the form of malicious attachments or links to harmful websites, are becoming increasingly sophisticated, so much so that even practiced security experts are now challenged to identify harmful content.

An Accenture survey of 5,400 citizens across six countries (the US, UK, Australia, Singapore, France, and Germany) found that 61% of respondents are concerned about identity theft and phishing when using digital services, and for 49%, a fear of financial-related fraud is causing them to limit their use of online services.

To reduce the number of people falling prey to such cybercrimes, government must help build user awareness, especially among more vulnerable populations. At the same time, increased efforts by Internet service providers to identify malicious payloads and links in email traffic will help lower the number of successful cyber attacks. For employers, this means training employees to recognize digital dangers at work and providing guidance on how to respond if an employee believes he or she is a victim. As a key part of this, employers should conduct regular checks to assess both employee adoption of and adherence to data security guidelines and policies. Software companies must also examine their role in driving threat awareness among customers, working in tandem with government and other industry stakeholders.

Adopt new security technologies and processes: Many PC users rely on outdated operating systems or fail to install updated antivirus software and security patches. Even those with up-to-date systems often ignore security alerts. While adopting a proactive approach will always be a key challenge within the general public, that can easily be addressed within the workplace. Employers must reinforce security behaviors for employees while enhancing existing security protocols to help employees cope with increasingly sophisticated cyber attacks. For example, strengthening email controls and passwords, and utilizing stronger spam filters can prevent malicious correspondence from reaching employees.

New cloud technologies can also improve security, including the use of cloud-based email analytics solutions to identify and quarantine known threats. Artificial intelligence (AI) and biometrics must also play a part. AI can dramatically increase security in IT environments by using behavioral profiling to detect anomalies that may indicate a threat.

Recently, there has been a dramatic upswing in research and development around how AI, machine learning, and predictive and behavioral analytics can be used to confront evolving threats. Citizens support these changes; recent research from Accenture found that two-thirds of US citizens (66%) said they would be willing to sacrifice convenience for increased data security, and nearly half (47%) support the use of biometric technologies to verify identity and enable secure access to services.                           

Secure IoT devices: While most citizens (53%) view Internet of Things technologies as a positive development in daily life, there are significant security considerations. First, when deploying IoT technologies, users must understand and prepare for associated security risks. Second, as the IoT (and the industrial IoT) becomes an integral part of critical national infrastructure, governments must develop defense and security measures to address threats. From a commercial perspective, device manufacturers must build security into their products, applications, and solutions to provide added protection and resilience.

Utilize citizen support: Some government agencies and private companies have begun to leverage citizen support to enhance cybersecurity defenses. Accenture's survey identified a strong desire among citizens to work with government to fight cybercrime and ensure data privacy and security. More than half of respondents (58%) said they would undertake national service of some kind to support security efforts, and 49% said they are willing to work for their national defense agencies to help secure citizen data and protect critical national infrastructure.

Bug bounty programs are another innovative way to harness citizen support to protect IT systems and infrastructure. A bug bounty program refers to an arrangement in which websites and software developers recognize or compensate individuals for reporting bugs or other vulnerabilities. These programs originated with software companies but have since expanded and are now used by government agencies. During the 2016 "Hack the Pentagon" event, nearly 140 vulnerabilities were reported to the US government.

In the UK, the National Cyber Security Centre (NCSC) recently launched its Vulnerability Co-ordination Pilot to facilitate public reporting, while both the NCSC agency in the Netherlands and the Australian Cyber Security Centre (ACSC) run similar programs. Crowdsourcing cybersecurity allows government and private-sector organizations to leverage a much wider range of expertise than any one entity alone could hope to possess.

In today's connected world, government, citizens, employees, and technology industry stakeholders must all be actively involved in preventing and fighting digital threats. Effective cybersecurity depends on all stakeholders working together to understand, prevent, and respond to these attacks. Although incidents like WannaCry will still occur, together we can help limit their impact.

Related Content:

Ger Daly is senior managing director for Accenture Defense and Public Safety, with global responsibility for defense, policing, and border and identity services. He leads a team of dedicated professionals who assist government and public service organizations that manage the ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.